-
1
-
-
84936873422
-
Model-based risk assessment to improve enterprise security
-
AAGEDAL, J. O., DEN BRABER, F., DIMITRAKOS, T., GRAN, B. A., RAPTIS, D., AND STOLEN, K. 2002. Model-based risk assessment to improve enterprise security. In Proceedings of the 6th International Enterprise Distributed Object Computing Conference. 51-62.
-
(2002)
Proceedings of the 6th International Enterprise Distributed Object Computing Conference
, pp. 51-62
-
-
Aagedal, J.O.1
Den Braber, F.2
Dimitrakos, T.3
Gran, B.A.4
Raptis, D.5
Stolen, K.6
-
2
-
-
33947420972
-
-
Software Engineering Institute, Carnegie Mellon University
-
ALBERTS, C. AND DOROFEE, A. 2001a. OCTAVE Criteria v2.0. Software Engineering Institute, Carnegie Mellon University.
-
(2001)
OCTAVE Criteria v2.0
-
-
Alberts, C.1
Dorofee, A.2
-
3
-
-
33746338083
-
Operationally critical threat, asset, and vulnerability evaluation (OCTAVESM)
-
Software Engineering Institute, Carnegie Mellon University
-
ALBERTS, C. AND DOROFEE, A. 2001b. Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVESM) Method Implementation Guide, v2.0. Software Engineering Institute, Carnegie Mellon University. http://www.cert.org/ octave/octavemethod.html.
-
(2001)
Method Implementation Guide v2.0
-
-
Alberts, C.1
Dorofee, A.2
-
4
-
-
0037240812
-
Misuse cases: Use cases with hostile intent
-
ALEXANDER, I. 2003. Misuse cases: Use cases with hostile intent. IEEE Softw. 20, 1, 58-66.
-
(2003)
IEEE Softw.
, vol.20
, Issue.1
, pp. 58-66
-
-
Alexander, I.1
-
7
-
-
0003727420
-
-
Cambridge University Press, Cambridge, UK
-
BAADER, F., CALVANESE, D., MCGUINESS, D., NARDI, D., AND PATEL-SCHNEIDER, P. 2002. The Description Logic Handbook: Theory, Implementation and Applications. Cambridge University Press, Cambridge, UK.
-
(2002)
The Description Logic Handbook: Theory, Implementation and Applications
-
-
Baader, F.1
Calvanese, D.2
McGuiness, D.3
Nardi, D.4
Patel-Schneider, P.5
-
9
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
BASKERVILLE, R. 1993. Information systems security design methods: Implications for information systems development. ACM Comput. Surv. 25, 4, 375-414.
-
(1993)
ACM Comput. Surv.
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
12
-
-
33144462443
-
Mission oriented risk and design analysis of critical information systems
-
BUCKSHAW, D. L., PARNELL, G. S., UNKENHOLZ, W. L., PARKS, D. L., WALLNER, J. M., AND SAYDJARI, O. S. 2005. Mission oriented risk and design analysis of critical information systems. Milit. Op. Resear. 10, 2.
-
(2005)
Milit. Op. Resear.
, vol.10
, pp. 2
-
-
Buckshaw, D.L.1
Parnell, G.S.2
Unkenholz, W.L.3
Parks, D.L.4
Wallner, J.M.5
Saydjari, O.S.6
-
14
-
-
70350663440
-
-
NIST Special Publication Series, SP 800-55, Rev 1
-
CHEW, E., SWANSON, M., STINE, K., BARTOL N., BROWN, A., AND ROBINSON, W. 2008. Performance Measurement Guide for Information Security. NIST Special Publication Series, SP 800-55 Rev 1.
-
(2008)
Performance Measurement Guide for Information Security
-
-
Chew, E.1
Swanson, M.2
Stine, K.3
Bartol, N.4
Brown, A.5
Robinson, W.6
-
16
-
-
80053513661
-
Common criteria for information technology security evaluation: Part 1
-
COMMON CRITERIA
-
COMMON CRITERIA. 2006. Common criteria for information technology security evaluation: Part 1 Introduction and General Model, v3.1-rev 1.
-
(2006)
Introduction and General Model, v3.1-rev 1
-
-
-
17
-
-
3042581036
-
Nonfunctional requirements: From elicitation to conceptual models
-
CYSNEIROS, L. M. AND LEITE, J. C. S. P. 2004. Nonfunctional requirements: From elicitation to conceptual models. IEEE Trans. Softw. Engin. 30, 5.
-
(2004)
IEEE Trans. Softw. Engin.
, vol.30
, Issue.5
-
-
Cysneiros, L.M.1
Leite, J.C.S.P.2
-
19
-
-
80053550794
-
-
DOD 5200.28-STD. 1985. Department of Defense trusted computer system evaluation criteria
-
DOD 5200.28-STD. 1985. Department of Defense trusted computer system evaluation criteria.
-
-
-
-
20
-
-
80053463301
-
-
DOD 5200.40. 1997. Department of Defense information technology certification and accreditation (DITSCAP), 1997
-
DOD 5200.40. 1997. Department of Defense information technology certification and accreditation (DITSCAP), 1997.
-
-
-
-
21
-
-
80053477935
-
-
DOD 8510.01. 2007. Department of Defense information assurance certification and accreditation process (DIACAP) Instruction
-
DOD 8510.01. 2007. Department of Defense information assurance certification and accreditation process (DIACAP) Instruction.
-
-
-
-
22
-
-
80053483119
-
-
DODI 8500.2. 2003. IA implementation
-
DODI 8500.2. 2003. IA implementation.
-
-
-
-
23
-
-
31044434638
-
A practical framework for eliciting and modeling system dependability requirements: Experience from the NASA high dependability computing project
-
DOI 10.1016/j.jss.2005.03.011, PII S0164121205000208
-
DONZELLI, P. AND BASILI, V. 2006. A practical framework for eliciting and modeling system dependability requirements: Experience from the NASA high dependability computing project. J. Syst. Softw. 79, 1, 107-119. (Pubitemid 43121112)
-
(2006)
Journal of Systems and Software
, vol.79
, Issue.1
, pp. 107-119
-
-
Donzelli, P.1
Basili, V.2
-
27
-
-
7744242790
-
Quantitative risk-based requirements reasoning
-
DOI 10.1007/s00766-002-0160-y
-
FEATHER, M. S. AND CORNFORD, S. L. 2003. Quantitative risk-based requirements reasoning. Require. Engin. J. 8, 4, 248-265. (Pubitemid 37554177)
-
(2003)
Require. Engin.
, vol.8
, Issue.4
, pp. 248-265
-
-
Feather, M.S.1
Cornford, S.L.2
-
29
-
-
0347380853
-
Risk management is still where the money is
-
GEER, D. 2003. Risk management is still where the money is. IEEE Computer 36, 12, 129-131.
-
(2003)
IEEE Computer
, vol.36
, Issue.12
, pp. 129-131
-
-
Geer, D.1
-
30
-
-
48749148075
-
Structure-mapping: A theoretical framework for analogy
-
GENTNER, D. 1983. Structure-mapping: A theoretical framework for analogy. Cogn. Sci. 7, 155-170.
-
(1983)
Cogn. Sci.
, vol.7
, pp. 155-170
-
-
Gentner, D.1
-
33
-
-
0035418268
-
Defining and applying measures of distance between specifications
-
DOI 10.1109/32.940565
-
JILANI, L. L., DESHARNAIS, J., AND MILI, A. 2001. Defining and applying measures of distance between specifications. IEEE Trans. Softw. Engin. 27, 8, 673-703. (Pubitemid 32829710)
-
(2001)
IEEE Transactions on Software Engineering
, vol.27
, Issue.8
, pp. 673-703
-
-
Jilani, L.L.1
Desharnais, J.2
Mili, A.3
-
35
-
-
9444279007
-
FCA in knowledge technologies: Experiences and opportunities
-
Concept Lattices
-
KALFOGLOU, Y., DASMAHAPATRA, S., AND CHEN-BURGER, J. 2004. FCA in knowledge technologies: Experiences and opportunities. In Proceedings of the 2nd International Conference on FCA. 252-260. (Pubitemid 38271480)
-
(2004)
Lecture Notes in Computer Science
, Issue.2961
, pp. 252-260
-
-
Kalfoglou, Y.1
Dasmahapatra, S.2
Chen-Burger, Y.-H.3
-
36
-
-
33846560895
-
Life cycle security and DITSCAP
-
KIMBELL, J. AND WALRATH, M. 2001. Life Cycle Security and DITSCAP. In IANewsletter 4, 2. http://iac.dtic.mil/iatac.
-
(2001)
IANewsletter
, vol.4
, pp. 2
-
-
Kimbell, J.1
Walrath, M.2
-
38
-
-
84962859109
-
The role of abstraction in software engineering
-
ACM, New York, NY
-
KRAMER, J. AND HAZZAN, O. 2006. The role of abstraction in software engineering. In Proceedings of the International Workshop on Role of Abstraction in Software Engineering at the 28th International Conference on Software Engineering, Shanghai. ACM, New York, NY, 1-2.
-
(2006)
Proceedings of the International Workshop on Role of Abstraction in Software Engineering at the 28th International Conference on Software Engineering, Shanghai
, pp. 1-2
-
-
Kramer, J.1
Hazzan, O.2
-
40
-
-
33845297655
-
Requirements as enablers for software assurance
-
LEE S. W. AND GANDHI, R. A. 2006. Requirements as enablers for software assurance. CrossTalk J. Def. Softw. Engin. 19, 12, 20-24. (Pubitemid 44878659)
-
(2006)
CrossTalk
, vol.19
, Issue.12
, pp. 20-24
-
-
Lee, S.-W.1
Gandhi, R.A.2
-
41
-
-
24944496493
-
Missing requirements and relationship discovery through proxy viewpoints model
-
LEE S. W. AND RINE, D. C. 2004a. Missing requirements and relationship discovery through proxy viewpoints model. Int. J. Informatics 3, 3, 315-342.
-
(2004)
Int. J. Informatics
, vol.3
, Issue.3
, pp. 315-342
-
-
Lee, S.W.1
Rine, D.C.2
-
43
-
-
33845292826
-
Building decision support problem domain ontology from natural language requirements for software assurance
-
DOI 10.1142/S0218194006003051, PII S0218194006003051
-
LEE S.W., MUTHURAJAN, D., GANDHI, R. A., YVAGAL, D., AND AHN, G. J. 2006. Building decision support problem domain ontology from natural language requirements for software assurance. Int. J. Engin 16, 6, 851-884. (Pubitemid 46181435)
-
(2006)
International Journal of Software Engineering and Knowledge Engineering
, vol.16
, Issue.6
, pp. 851-884
-
-
Lee, S.-W.1
Muthurajan, D.2
Gandhi, R.A.3
Yavagal, D.4
Ahn, G.-J.5
-
44
-
-
34247487097
-
Certification process artifacts defined as measurable units for software assurance
-
DOI 10.1002/spip.313
-
LEE S. W., GANDHI, R. A., AND AHN, G. J. 2007a. certification process artifacts defined as measurable units for software assurance. Soft. Process: Improv. Pract. 12, 2, 165-189. (Pubitemid 46659453)
-
(2007)
Software Process Improvement and Practice
, vol.12
, Issue.2
, pp. 165-189
-
-
Lee, S.-W.1
Gandhi, R.A.2
Ahn, G.-J.3
-
45
-
-
47949083988
-
R-AnalytiCA: Requirements analytics for certification & accreditation
-
LEE S. W., GANDHI, R. A., WAGLE, S. J., AND MURTY, A. B. 2007b. r-AnalytiCA: Requirements analytics for certification & accreditation. In Proceedings of 15th IEEE International Requirements Engineering Conference Posters, Demos and Exhibits Session. 383-384.
-
(2007)
Proceedings of 15th IEEE International Requirements Engineering Conference Posters, Demos and Exhibits Session
, pp. 383-384
-
-
Lee, S.W.1
Gandhi, R.A.2
Wagle, S.J.3
Murty, A.B.4
-
47
-
-
17044394774
-
Using abuse frames to bound the scope of security problems
-
Proceedings - 12th IEEE International Requirements Engineering Conference. RE 2004
-
LIN, L., NUSEIBEH, B., INCE, D., AND JACKSON, M. 2004. Using abuse frames to bound the scope of security problems. In Proceedings of the 12th International Conference on Requirements Engineering. 354-355. (Pubitemid 40498805)
-
(2004)
Proceedings of the IEEE International Conference on Requirements Engineering
, pp. 354-355
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
-
51
-
-
85088409477
-
-
Tech. rep. (CMU/SEI-2005-TR-009), Software Engineering Institute, CarnegieMellonUniversity, Pittsburgh, PA
-
MEAD, N. R., HOUGH, E., AND STEHNEY, T. 2005. Security quality requirements Engineering (SQUARE) methodology. Tech. rep. (CMU/SEI-2005-TR-009), Software Engineering Institute, CarnegieMellonUniversity, Pittsburgh, PA.
-
(2005)
Security Quality Requirements Engineering (SQUARE) Methodology
-
-
Mead, N.R.1
Hough, E.2
Stehney, T.3
-
52
-
-
80053551877
-
Using DITSCAP regulations to address HIPAA
-
MITCHELL, R. N. 2005. Using DITSCAP regulations to address HIPAA. Advance for Health Information Executives. http://health-information.advanceweb.com/ Editorial/Content/Editorial.aspx?CC=57412.
-
(2005)
Advance for Health Information Executives
-
-
Mitchell, R.N.1
-
58
-
-
85020200328
-
Towards a secure system engineering methodology
-
SALTER, C., SAYDJARI, O., SCHNEIER, B., AND WALLNER. J. 1998. Towards a secure system engineering methodology. In Proceedings of the New Security Paradigms Workshop.
-
(1998)
Proceedings of the New Security Paradigms Workshop
-
-
Salter, C.1
Saydjari, O.2
Schneier, B.3
Wallner, J.4
-
62
-
-
0034497420
-
Eliciting security requirements by misuse cases
-
SINDRE, G. AND OPDAHL, A. 2000. Eliciting security requirements by misuse cases. In Proceedings of TOOLS Pacific. 120-130.
-
(2000)
Proceedings of TOOLS Pacific
, pp. 120-130
-
-
Sindre, G.1
Opdahl, A.2
-
64
-
-
1842829828
-
-
NIST Special Publication Series, SP
-
STONEBURNER, G., GOGUEN, A., AND FERINGA, A. 2002. Risk Management Guide for Information Technology Systems. NIST Special Publication Series, SP 800-30.
-
(2002)
Risk Management Guide for Information Technology Systems
, pp. 800-30
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
65
-
-
0041848279
-
Using a concept lattice of decomposition slices for program understanding and impact analysis
-
TONELLA, P. 2003. Using a concept lattice of decomposition slices for program understanding and impact analysis. IEEE Trans. Softw. Engin. 29, 6.
-
(2003)
IEEE Trans. Softw. Engin.
, vol.29
, pp. 6
-
-
Tonella, P.1
-
68
-
-
80053471745
-
-
US GAO 05-700. 2005. Department of homeland security needs to fully implement its security program. Report from The US Government Accountability Office
-
US GAO 05-700. 2005. Department of homeland security needs to fully implement its security program. Report from The US Government Accountability Office.
-
-
-
-
72
-
-
4344569744
-
Risk analysis in software design
-
VERDON, D. AND MCGRAW, G. 2004. Risk analysis in software design. IEEE Secur. Priv. Mag. 2, 4, 79-84.
-
(2004)
IEEE Secur. Priv. Mag.
, vol.2
, Issue.4
, pp. 79-84
-
-
Verdon, D.1
McGraw, G.2
-
73
-
-
0032639499
-
Certifying software for high-assurance environments
-
VOAS, J. 1999. Certifying software for high-assurance environments. IEEE Software 16, 4, 48-54.
-
(1999)
IEEE Software
, vol.16
, Issue.4
, pp. 48-54
-
-
Voas, J.1
-
74
-
-
34748829296
-
A case study in systematic improvement of language for requirements
-
DOI 10.1109/RE.2006.5, 1704044, Proceedings - 14th IEEE International Requirements Engineering Conference, RE'06
-
WASSON, K. S. 2006. A case study in systematic improvement of language for requirements. In Proceedings of the 14th International Requirements Engineering Conference. 6-15. (Pubitemid 351424195)
-
(2006)
Proceedings of the IEEE International Conference on Requirements Engineering
, pp. 6-15
-
-
Wasson, K.S.1
-
75
-
-
84860994379
-
Conceptual graphs and formal concept analysis
-
Conceptual Structures: Fulfilling Peirce's Dream
-
WILLE, R. 1997. Conceptual graphs and formal concept analysis. In Proceedings of the International Conference on Conceptual Structures. 290-303. (Pubitemid 127103229)
-
(1997)
Lecture Notes in Computer Science
, Issue.1257
, pp. 290-303
-
-
Wille, R.1
-
77
-
-
0003673547
-
-
2nd Ed. Applied Social ResearchMethods Series, Sage Publications
-
YIN, R. K. 1994. Case Study Research: Design andMethods 2nd Ed. Applied Social ResearchMethods Series, 5, Sage Publications.
-
(1994)
Case Study Research: Design AndMethods
, vol.5
-
-
Yin, R.K.1
-
78
-
-
85041539040
-
-
DIT- 06-008, University of Trento
-
YUDISTIRA, A., GIORGINI, P., AND MYLOPOULOS, J. 2006. Risk modelling and reasoning in goal models. DIT-06-008, University of Trento.
-
(2006)
Risk Modelling and Reasoning in Goal Models
-
-
Yudistira, A.1
Giorgini, P.2
Mylopoulos, J.3
|