-
1
-
-
79959767393
-
-
REFSQ-Workshop on Requirements Engineering for Software Quality (2007), Foundations of Software Quality
-
Herrmann, A., Kerkow, D., Doerr, J.: Exploring the Characteristics of NFR Methods-a Dialogue about two Approaches, REFSQ-Workshop on Requirements Engineering for Software Quality (2007), Foundations of Software Quality (2007).
-
(2007)
Exploring the Characteristics of NFR Methods-a Dialogue About Two Approaches
-
-
Herrmann, A.1
Kerkow, D.2
Doerr, J.3
-
2
-
-
38549168397
-
MOQARE: misuse-oriented quality requirements engineering
-
Herrmann, A., Paech B.: MOQARE: misuse-oriented quality requirements engineering. Requir. Eng. J. 13(1), 73-86 (2008).
-
(2008)
Requir. Eng. J.
, vol.13
, Issue.1
, pp. 73-86
-
-
Herrmann, A.1
Paech, B.2
-
4
-
-
85089791456
-
From laws to requirements
-
Siena, A., Mylopoulos, J., Perini, A., Susi, A.: From laws to requirements. In: 1st International Workshop on Requirements Engineering and Law (Relaw'08).
-
1st International Workshop On Requirements Engineering and Law (Relaw'08)
-
-
Siena, A.1
Mylopoulos, J.2
Perini, A.3
Susi, A.4
-
5
-
-
79959686783
-
-
Bundesdatenschutzgesetz - Federal Data Protection Act (as of 15 November 2006)
-
Bundesdatenschutzgesetz - Federal Data Protection Act (as of 15 November 2006), http://www.bfdi.bund.de.
-
-
-
-
6
-
-
84899251780
-
Arguing satisfaction of security requirements
-
Idea Publishing Group, Miami
-
Haley, C. B., Laney, R., Moffett, J. D., Nuseibeh, B.: Arguing satisfaction of security requirements. In: Integrating Security and Software Engineering: Advances and Future Visions, pp. 16-43. Idea Publishing Group, Miami (2006).
-
(2006)
Integrating Security and Software Engineering: Advances and Future Visions
, pp. 16-43
-
-
Haley, C.B.1
Laney, R.2
Moffett, J.D.3
Nuseibeh, B.4
-
7
-
-
40449096402
-
Security requirements engineering: a framework for representation and analysis
-
Haley C. B., Laney R. C., Moffett J. D., Nuseibeh B.: Security requirements engineering: a framework for representation and analysis. IEEE Trans. Softw. Eng. 34(1), 133-153 (2008).
-
(2008)
IEEE Trans. Softw. Eng.
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.B.1
Laney, R.C.2
Moffett, J.D.3
Nuseibeh, B.4
-
9
-
-
2942757657
-
Engineering security requirements
-
Firesmith, D.: Engineering security requirements. J. Obj. Technol. 2(1) http://www.jot.fm/issues/issues_2003_01/column6 (2003).
-
(2003)
J. Obj. Technol
, vol.2
, Issue.1
-
-
Firesmith, D.1
-
10
-
-
33751416458
-
A common criterion based security requirements engineering process for the development of secure information system
-
Mellado D., Medina E., Piattini M.: A common criterion based security requirements engineering process for the development of secure information system. Comput. Stand. Interfaces 29, 244-253 (2007).
-
(2007)
Comput. Stand. Interfaces
, vol.29
, pp. 244-253
-
-
Mellado, D.1
Medina, E.2
Piattini, M.3
-
12
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre G., Opdahl A. L.: Eliciting security requirements with misuse cases. Requir. Eng. 10(1), 34-44 (2005).
-
(2005)
Requir. Eng.
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
15
-
-
33746038490
-
Towards a comprehensive framework for secure systems development, CAiSE 2006
-
Springer, Berlin
-
Mouratidis, H., Jürjens, J., Fox, J.: Towards a comprehensive framework for secure systems development, CAiSE 2006. Lecture Notes in Computer Science, vol. 4001, pp. 48-62. Springer, Berlin (2006).
-
(2006)
Lecture Notes In Computer Science
, vol.4001
, pp. 48-62
-
-
Mouratidis, H.1
Jürjens, J.2
Fox, J.3
-
16
-
-
23944475544
-
When security meets software engineering: a case of modelling secure information systems
-
Mouratidis H., Giorgini P., Manson G.: When security meets software engineering: a case of modelling secure information systems. Inf. Syst. Elsevier 30(8), 609-629 (2005).
-
(2005)
Inf. Syst. Elsevier
, vol.30
, Issue.8
, pp. 609-629
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
18
-
-
34548508691
-
Security Attack Testing (SAT)-testing the security of information systems at design time
-
Mouratidis H., Giorgini P.: Security Attack Testing (SAT)-testing the security of information systems at design time. Inf. Syst. 32(8), 1166-1183 (2007).
-
(2007)
Inf. Syst.
, vol.32
, Issue.8
, pp. 1166-1183
-
-
Mouratidis, H.1
Giorgini, P.2
-
20
-
-
34249004734
-
Secure tropos: a security-oriented extension of the tropos methodology
-
Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. (IJSEKE) 17(2), 285-309 (2007).
-
(2007)
Int. J. Softw. Eng. Knowl. Eng. (IJSEKE)
, vol.17
, Issue.2
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, P.2
-
21
-
-
79959722918
-
-
Information society, Summary of legislation, European Commission
-
Information society, Summary of legislation, European Commission, http://europa.eu/legislation_summaries/information_society/index_en.htm.
-
-
-
-
22
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer, J., Schroeder, M.: The protection of information in computer systems. Proc. IEEE 63(9), 1278-1308 (1975).
-
(1975)
Proc. IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
24
-
-
35348959376
-
Tools for Secure Systems Development with UML
-
Springer, Berlin
-
Jürjens, J., Shabalin, P.: Tools for Secure Systems Development with UML. FASE 2004/05 special issue of the International Journal on Software Tools for Technology Transfer, 9(5-6), 527-544. Springer, Berlin (2007).
-
(2007)
FASE 2004/05 Special Issue of the International Journal On Software Tools For Technology Transfer
, vol.9
, Issue.5-6
, pp. 527-544
-
-
Jürjens, J.1
Shabalin, P.2
-
26
-
-
0003696305
-
-
Kluwer Academic Publishers, Dordrecht
-
Chung L., Nixon B. A., Yu E., Mylopoulos, J.: Non-Functional Requirements in Software Engineering. Kluwer Academic Publishers, Dordrecht (1999).
-
(1999)
Non-Functional Requirements In Software Engineering
-
-
Chung, L.1
Nixon, B.A.2
Yu, E.3
Mylopoulos, J.4
-
28
-
-
79959717835
-
-
Medical Privacy-National Standards to Protect the Privacy of Personal Health Information. Office for Civil Rights, US Department of Health and Human Services
-
Medical Privacy-National Standards to Protect the Privacy of Personal Health Information. Office for Civil Rights, US Department of Health and Human Services. http://www.hhs.gov/ocr/hipaa/finalreg.html (2000).
-
(2000)
-
-
-
29
-
-
84899324292
-
Identifying security requirements using the security quality requirements engineering (SQUARE) method
-
Idea Publishing Group, Miami
-
Mead, N. R.: Identifying security requirements using the security quality requirements engineering (SQUARE) method. In: Integrating Security and Software Engineering, pp. 44-69. Idea Publishing Group, Miami (2006).
-
(2006)
Integrating Security and Software Engineering
, pp. 44-69
-
-
Mead, N.R.1
-
30
-
-
79959750883
-
-
Online news of November 15, 2004
-
Online news of November 15, 2004, http://digital.dmreview.com/dmreview.
-
-
-
-
31
-
-
3142750497
-
TROPOS: An agent oriented software development methodology
-
Kluwer Academic Publishers, Dordrecht
-
Bresciani, P., Giorgini, P., Giunchiglia, F., Mylopoulos, J., Perini, A.: TROPOS: an agent oriented software development methodology. In: Journal of Autonomous Agents and Multi-Agent Systems, 8(3), 203-236. Kluwer Academic Publishers, Dordrecht (2004).
-
(2004)
Journal of Autonomous Agents and Multi-Agent Systems
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perini, A.5
-
33
-
-
27644537252
-
Modelling security requirements through ownership, permission and delegation
-
IEEE Computer Society Press, 29 August-2 September
-
Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modelling security requirements through ownership, permission and delegation. In: Proceedings of the 13th IEEE International Requirements Engineering Conference (RE'05), IEEE Computer Society Press, 29 August-2 September (2005).
-
(2005)
Proceedings of the 13th IEEE International Requirements Engineering Conference (RE'05)
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
35
-
-
79959724230
-
-
Privacy Guidelines for Developing Software Products and Services, Version 3. 1, September, 2008
-
Privacy Guidelines for Developing Software Products and Services, Version 3. 1, September, 2008, http://download.microsoft.com.
-
-
-
-
37
-
-
79959760833
-
Security requirements addressing security risks for improving software quality
-
Technical Report TUM-I0811, Technische Universität München, 2008, Munich, Germany
-
Islam, S., Dong, W.: Security requirements addressing security risks for improving software quality. In: Workshop-Band Software-Qualitätsmodellierung und -bewertung (SQMB '08), Technical Report TUM-I0811, Technische Universität München, 2008, Munich, Germany (2008).
-
(2008)
Workshop-Band Software-Qualitätsmodellierung Und -bewertung (SQMB '08)
-
-
Islam, S.1
Dong, W.2
-
38
-
-
79959717366
-
Incorporating security requirements from legal regulations into UMLsec model, Modelling Security Workshop (MODSEC08)
-
France, September
-
Islam, S., Jürjens, J.: Incorporating security requirements from legal regulations into UMLsec model, Modelling Security Workshop (MODSEC08). In: Association with MODELS '08, Toulouse, France, September (2008).
-
(2008)
Association With MODELS '08, Toulouse
-
-
Islam, S.1
Jürjens, J.2
-
39
-
-
38149067484
-
Towards a framework for tracking legal compliance in healthcare
-
In: Krogstie, J., Opdahl, A. L., Sindre, G. (eds.), Springer, Berlin
-
Ghanavati, S., Amyot, D., Peyton, L.: Towards a framework for tracking legal compliance in healthcare. In: Krogstie, J., Opdahl, A. L., Sindre, G. (eds.) 19th International Conference on Advanced Information Systems Engineering (CAiSE'07), pp. 218-232. Springer, Berlin (2007).
-
(2007)
19th International Conference On Advanced Information Systems Engineering (CAiSE'07)
, pp. 218-232
-
-
Ghanavati, S.1
Amyot, D.2
Peyton, L.3
-
41
-
-
40449096076
-
Analyzing regulator rules for privacy and security requirements
-
Breaux, T. D, Antón, A. I.: Analyzing regulator rules for privacy and security requirements. IEEE Trans. Softw. Eng. 34(1), 5-20 (2008).
-
(2008)
IEEE Trans. Softw. Eng.
, vol.34
, Issue.1
, pp. 5-20
-
-
Breaux, T.D.1
Antón, A.I.2
-
43
-
-
0002953848
-
Fundamental legal conceptions as applied in judicial reasoning
-
Hohfeld, W. N.: Fundamental legal conceptions as applied in judicial reasoning. Yale Law J. 23(1) (1913).
-
(1913)
Yale Law J
, vol.23
, Issue.1
-
-
Hohfeld, W.N.1
|