-
1
-
-
33746068596
-
Designing security requirements models through planning
-
Martinez, F.H., Pohl, K. (eds.) CAiSE 2006. Springer, Heidelberg
-
Bryl, V., Massacci, F., Mylopoulos, J., Zannone, N.: Designing security requirements models through planning. In: Martinez, F.H., Pohl, K. (eds.) CAiSE 2006. LNCS, vol. 4001, pp. 33-47. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4001
, pp. 33-47
-
-
Bryl, V.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
2
-
-
38149005089
-
Component composition through architectural patterns for problem frames
-
IEEE Computer Society, Washington, DC, USA
-
Choppy, C., Hatebur, D., Heisel, M.: Component composition through architectural patterns for problem frames. In: Proceedings of the Asia Pacific Software Engineering Conference (APSEC), pp. 27-34. IEEE Computer Society, Washington, DC, USA (2006)
-
(2006)
Proceedings of the Asia Pacific Software Engineering Conference (APSEC)
, pp. 27-34
-
-
Choppy, C.1
Hatebur, D.2
Heisel, M.3
-
4
-
-
84936941964
-
Relating software requirements and architectures using problem frames
-
IEEE Computer Society, Los Alamitos
-
Hall, J.G., Jackson, M., Laney, R.C., Nuseibeh, B., Rapanotti, L.: Relating software requirements and architectures using problem frames. In: Proceedings of the IEEE International Requirements Engineering Conference (RE), pp. 137-144. IEEE Computer Society, Los Alamitos (2002)
-
(2002)
Proceedings of the IEEE International Requirements Engineering Conference (RE)
, pp. 137-144
-
-
Hall, J.G.1
Jackson, M.2
Laney, R.C.3
Nuseibeh, B.4
Rapanotti, L.5
-
5
-
-
38549147623
-
An analysis of the security patterns landscape
-
IEEE Computer Society, Los Alamitos
-
Heyman, T., Yskout, K., Scandariato, R., Joosen, W.: An analysis of the security patterns landscape. In: Proceedings of the International Workshop on Software Engineering for Secure Systems (SESS), pp. 3-10. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
Proceedings of the International Workshop on Software Engineering for Secure Systems (SESS)
, pp. 3-10
-
-
Heyman, T.1
Yskout, K.2
Scandariato, R.3
Joosen, W.4
-
6
-
-
79551544610
-
The security twin peaks
-
Erlingsson, Ú., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. Springer, Heidelberg
-
Heyman, T., Yskout, K., Scandariato, R., Schmidt, H., Yu, Y.: The security twin peaks. In: Erlingsson, Ú., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol. 6542, pp. 167-180. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6542
, pp. 167-180
-
-
Heyman, T.1
Yskout, K.2
Scandariato, R.3
Schmidt, H.4
Yu, Y.5
-
9
-
-
84898314703
-
An Ontology for Secure Socio- Technical Systems. Information Science Reference
-
Massacci, F., Mylopoulos, J., Zannone, N.: An Ontology for Secure Socio- Technical Systems. Information Science Reference. In: Ontologies for Business Interaction, pp. 188-207 (2007)
-
(2007)
Ontologies for Business Interaction
, pp. 188-207
-
-
Massacci, F.1
Mylopoulos, J.2
Zannone, N.3
-
11
-
-
33751042207
-
UML 1.4 versus UML 2.0 as languages to describe software architectures
-
Oquendo, F., Warboys, B.C., Morrison, R. (eds.) EWSA 2004. Springer, Heidelberg
-
Pérez-Martínez, J.E., Sierra-Alonso, A.: UML 1.4 versus UML 2.0 as languages to describe software architectures. In: Oquendo, F., Warboys, B.C., Morrison, R. (eds.) EWSA 2004. LNCS, vol. 3047, pp. 88-102. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3047
, pp. 88-102
-
-
Pérez-Martínez, J.E.1
Sierra-Alonso, A.2
-
13
-
-
17044408781
-
Architecture-driven problem decomposition
-
IEEE Computer Society, Los Alamitos
-
Rapanotti, L., Hall, J.G., Jackson, M., Nuseibeh, B.: Architecture-driven problem decomposition. In: Proceedings of the IEEE International Requirements Engineering Conference (RE), pp. 80-89. IEEE Computer Society, Los Alamitos (2004)
-
(2004)
Proceedings of the IEEE International Requirements Engineering Conference (RE)
, pp. 80-89
-
-
Rapanotti, L.1
Hall, J.G.2
Jackson, M.3
Nuseibeh, B.4
|