-
3
-
-
49049105211
-
Risk as Dependability Metrics for the Evaluation of Business Solutions: A Modeldriven Approach
-
[Asnar et al., 2008]
-
[Asnar et al., 2008] Asnar, Y., Moretti, R., Sebastianis, M., and Zannone, N. (2008). Risk as Dependability Metrics for the Evaluation of Business Solutions: A Modeldriven Approach. In ARES, pages 1240-1247.
-
(2008)
ARES
, pp. 1240-1247
-
-
Asnar, Y.1
Moretti, R.2
Sebastianis, M.3
Zannone, N.4
-
4
-
-
0003669844
-
-
[AS/NZS 4360, 2004] AS/NZS 4360, SAI Global
-
[AS/NZS 4360, 2004] AS/NZS 4360 (2004). Risk Management. SAI Global.
-
(2004)
Risk Management
-
-
-
5
-
-
3142750497
-
TROPOS: An Agent-oriented Software Development Methodology
-
[Bresciani et al., 2004]
-
[Bresciani et al., 2004] Bresciani, P., Giorgini, P., Giunchiglia, F., Mylopoulos, J., and Perini, A. (2004). TROPOS: an Agent-oriented Software Development Methodology. Journal of Autonomous Agents and Multi-Agent Systems, 8:203-236.
-
(2004)
Journal of Autonomous Agents and Multi-Agent Systems
, vol.8
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perini, A.5
-
7
-
-
33751416458
-
A Common Criteria Based Security Requirements Engineering Process for the Development of Secure Information Systems
-
[D. Mellado, 2007]
-
[D. Mellado, 2007] D. Mellado, E. Fernndez-Medina, M. (2007). A Common Criteria Based Security Requirements Engineering Process for the Development of Secure Information Systems. Computer Standards and Interfaces, 29:244-253.
-
(2007)
Computer Standards and Interfaces
, vol.29
, pp. 244-253
-
-
Mellado, D.1
Fernndez-Medina, E.2
-
8
-
-
77955431422
-
Security Requirements Engineering Framework for Software Product Lines
-
[D. Mellado, 2010]
-
[D. Mellado, 2010] D. Mellado, E. Fernndez-Medina, M. (2010). Security Requirements Engineering Framework for Software Product Lines. Information and Software Technology, 52:1094-1117.
-
(2010)
Information and Software Technology
, vol.52
, pp. 1094-1117
-
-
Mellado, D.1
Fernndez-Medina, E.2
-
9
-
-
77950524618
-
A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs
-
[Elahi and Yu, 2007], Parent, C., Schewe, K.-D., Storey, V. C., and Thalheim, B., editors, Springer-Verlag Berlin Heidelberg
-
[Elahi and Yu, 2007] Elahi, G. and Yu, E. (2007). A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs. In Parent, C., Schewe, K.-D., Storey, V. C., and Thalheim, B., editors, Proceedings of the 26th International Conference on Conceptual Modelling (ER 2007), volume 4801, pages 87-101. Springer-Verlag Berlin Heidelberg.
-
(2007)
Proceedings of the 26th International Conference On Conceptual Modelling (ER 2007)
, vol.4801
, pp. 87-101
-
-
Elahi, G.1
Yu, E.2
-
10
-
-
38149109855
-
Towards More Extensible MetaCASE Tools
-
[Englebert and Heymans, 2007], Krogstie, J., Opdahl, A. L., and Sindre, G., editors
-
[Englebert and Heymans, 2007] Englebert, V. and Heymans, P. (2007). Towards More Extensible MetaCASE Tools. In Krogstie, J., Opdahl, A. L., and Sindre, G., editors, Proceedings of the 19th International Conference on Advanced Information Systems Engineering (CAiSE 2007), pages 454-468.
-
(2007)
Proceedings of the 19th International Conference On Advanced Information Systems Engineering (CAiSE 2007)
, pp. 454-468
-
-
Englebert, V.1
Heymans, P.2
-
12
-
-
47949111490
-
Discovering and Understanding Multi-dimensional Correlations among Certification Requirements with application to Risk Assessment
-
[Gandhi and Lee, 2007]
-
[Gandhi and Lee, 2007] Gandhi, R. A. and Lee, S.-W. (2007). Discovering and Understanding Multi-dimensional Correlations among Certification Requirements with application to Risk Assessment. Requirements Engineering, IEEE International Conference on, 0:231-240.
-
(2007)
Requirements Engineering, IEEE International Conference On
, vol.0
, pp. 231-240
-
-
Gandhi, R.A.1
Lee, S.-W.2
-
13
-
-
40449096402
-
Security Requirements Engineering: A Framework for Representation and Analysis
-
[Haley et al., 2008]
-
[Haley et al., 2008] Haley, C., Laney, R., Moffett, J., and Nuseibeh, B. (2008). Security Requirements Engineering: A Framework for Representation and Analysis. IEEE Transactions on Software Engineering, 34(1):133-153.
-
(2008)
IEEE Transactions On Software Engineering
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.1
Laney, R.2
Moffett, J.3
Nuseibeh, B.4
-
18
-
-
3342920504
-
-
[ISO/IEC Guide 73, 2002] ISO/IEC Guide 73, International Organisation for Standardisation
-
[ISO/IEC Guide 73, 2002] ISO/IEC Guide 73 (2002). Risk management - Vocabulary - Guidelines for Use in Standards. International Organisation for Standardisation.
-
(2002)
Risk Management - Vocabulary - Guidelines For Use In Standards
-
-
-
20
-
-
17044394774
-
Using Abuse Frames to Bound the Scope of Security Problems
-
[Lin et al., 2004], IEEE Computer Society
-
[Lin et al., 2004] Lin, L., Nuseibeh, B., Ince, D., and Jackson, M. (2004). Using Abuse Frames to Bound the Scope of Security Problems. In Proceedings of the 12th IEEE international Conference on Requirements Engineering (RE'04), pages 354-355. IEEE Computer Society.
-
(2004)
Proceedings of the 12th IEEE International Conference On Requirements Engineering (RE'04)
, pp. 354-355
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
-
21
-
-
84942866002
-
Security and Privacy Requirements Analysis within a Social Setting
-
[Liu et al., 2003], IEEE Computer Society
-
[Liu et al., 2003] Liu, L., Yu, E., and Mylopoulos, J. (2003). Security and Privacy Requirements Analysis within a Social Setting. In Proceedings of the 11th IEEE International Requirements Engineering Conference (RE'03), page 151. IEEE Computer Society.
-
(2003)
Proceedings of the 11th IEEE International Requirements Engineering Conference (RE'03)
, pp. 151
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
22
-
-
79955143136
-
SecureUML: A UML-based Modeling Language for Model-driven Security
-
[Lodderstedt et al., 2002], Springer-Verlag
-
[Lodderstedt et al., 2002] Lodderstedt, T., Basin, D. A., and Doser, J. (2002). SecureUML: A UML-based Modeling Language for Model-driven Security. In Proceedings of the 5th International Conference on the Unified Modelling Language (UML'02), pages 426-441. Springer-Verlag.
-
(2002)
Proceedings of the 5th International Conference On the Unified Modelling Language (UML'02)
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.A.2
Doser, J.3
-
23
-
-
45849117958
-
Alignment of Misuse Cases with Security Risk Management
-
[Matulevǐcius et al., 2008a], IEEE Computer Society
-
[Matulevǐcius et al., 2008a] Matulevičius, R., Mayer, N., and Heymans, P. (2008a). Alignment of Misuse Cases with Security Risk Management. In Proceedings of the ARES 2008 Symposium on Requirements Engineering for Information Security (SREIS 2008), pages 1397-1404. IEEE Computer Society.
-
(2008)
Proceedings of the ARES 2008 Symposium On Requirements Engineering For Information Security (SREIS 2008)
, pp. 1397-1404
-
-
Matulevičius, R.1
Mayer, N.2
Heymans, P.3
-
24
-
-
77950516944
-
Adapting Secure Tropos for Security Risk Management during Early Phases of the Information Systems Development
-
[Matulevǐcius et al., 2008b], Springer-Verlag Berlin Heidelberg
-
[Matulevǐcius et al., 2008b] Matulevičius, R., Mayer, N., Mouratidis, H., Dubois, E., Heymans, P., and Genon, N. (2008b). Adapting Secure Tropos for Security Risk Management during Early Phases of the Information Systems Development. In Proceedings of the 20th International Conference on Advanced Information System Engineering (CAiSE 2008). Springer-Verlag Berlin Heidelberg.
-
(2008)
Proceedings of the 20th International Conference On Advanced Information System Engineering (CAiSE 2008)
-
-
Matulevičius, R.1
Mayer, N.2
Mouratidis, H.3
Dubois, E.4
Heymans, P.5
Genon, N.6
-
25
-
-
70349961164
-
-
[Mayer, 2009], PhD thesis, University of Namur, Namur, Belgium
-
[Mayer, 2009] Mayer, N. (2009). Model-Based Management of Information System Security Risk. PhD thesis, University of Namur, Namur, Belgium.
-
(2009)
Model-Based Management of Information System Security Risk
-
-
Mayer, N.1
-
26
-
-
45849131284
-
Design of a Modelling Language for Information System Security Risk Management
-
[Mayer et al., 2007]
-
[Mayer et al., 2007] Mayer, N., Heymans, P., and Matulevǐcius, R. (2007). Design of a Modelling Language for Information System Security Risk Management. In Proceedings of the 1st International Conference on Research Challenges in Information Science (RCIS 2007), pages 121-131.
-
(2007)
Proceedings of the 1st International Conference On Research Challenges In Information Science (RCIS 2007)
, pp. 121-131
-
-
Mayer, N.1
Heymans, P.2
Matulevǐcius, R.3
-
28
-
-
73549107313
-
Complexity Effects on End User Understanding of Data Models: An Experimental Comparison of Large Data Model Represetation Mehods
-
[Moody, 2002]
-
[Moody, 2002] Moody, D. L. (2002). Complexity Effects on End User Understanding of Data Models: an Experimental Comparison of Large Data Model Represetation Mehods. In Proceedings of the 10th European Conferece on Information Systems (ECIS'2002).
-
(2002)
Proceedings of the 10th European Conferece On Information Systems (ECIS'2002)
-
-
Moody, D.L.1
-
29
-
-
73449140991
-
The "Physics" of Notations: Toward a Scientific Basis for Constructing Visual Notations in Software Engineering
-
[Moody, 2009]
-
[Moody, 2009] Moody, D. L. (2009). The "Physics" of Notations: Toward a Scientific Basis for Constructing Visual Notations in Software Engineering. IEEE Transactions on Software Engineering, 35(6):756-777.
-
(2009)
IEEE Transactions On Software Engineering
, vol.35
, Issue.6
, pp. 756-777
-
-
Moody, D.L.1
-
30
-
-
33644807921
-
-
[Mouratidis, 2004], PhD thesis, Department of Computer Science, University of Sheffield, UK
-
[Mouratidis, 2004] Mouratidis, H. (2004). A Security Oriented Approach in the Development of Multiagent Systems: Applied to the Management of the Health and Social Care Needs of Older People In England. PhD thesis, Department of Computer Science, University of Sheffield, UK.
-
(2004)
A Security Oriented Approach In the Development of Multiagent Systems: Applied to the Management of The Health and Social Care Needs of Older People In England
-
-
Mouratidis, H.1
-
32
-
-
34249004734
-
Secure Tropos: A Security-oriented Extension of the Tropos Methodology
-
[Mouratidis and Giorgini, 2007a]
-
[Mouratidis and Giorgini, 2007a] Mouratidis, H. and Giorgini, P. (2007a). Secure Tropos: A Security-oriented Extension of the Tropos Methodology. International Journal of Software Engineering and Knowledge Engineering (IJSEKE), 17(2):285-309.
-
(2007)
International Journal of Software Engineering and Knowledge Engineering (IJSEKE)
, vol.17
, Issue.2
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, P.2
-
33
-
-
34548508691
-
Security Attack Testing (SAT) - Testing the Security of Information Systems at Design Time
-
[Mouratidis and Giorgini, 2007b]
-
[Mouratidis and Giorgini, 2007b] Mouratidis, H. and Giorgini, P. (2007b). Security Attack Testing (SAT) - Testing the Security of Information Systems at Design Time. Information Systems, 32(8):1166-1183.
-
(2007)
Information Systems
, vol.32
, Issue.8
, pp. 1166-1183
-
-
Mouratidis, H.1
Giorgini, P.2
-
34
-
-
1142293428
-
A Natural Extension of Tropos Methodology for Modelling Security
-
[Mouratidis et al., 2002a]
-
[Mouratidis et al., 2002a] Mouratidis, H., Giorgini, P., Gordon, M., and Philp, I. (2002a). A Natural Extension of Tropos Methodology for Modelling Security. In Proceedings of the Agent Oriented Methodologies Workshop (OOPSLA 2002).
-
(2002)
Proceedings of the Agent Oriented Methodologies Workshop (OOPSLA 2002)
-
-
Mouratidis, H.1
Giorgini, P.2
Gordon, M.3
Philp, I.4
-
35
-
-
79952750459
-
Using Tropos Methodology to Model an Integrated Health Assessment System
-
[Mouratidis et al., 2002b]
-
[Mouratidis et al., 2002b] Mouratidis, H., Giorgini, P., and Manson, G. (2002b). Using Tropos Methodology to Model an Integrated Health Assessment System. In Proceedings of the Fourth International Bi-Conference on Agent-oriented Information Systems (AOIS'02).
-
(2002)
Proceedings of the Fourth International Bi-Conference On Agent-oriented Information Systems (AOIS'02)
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
36
-
-
35048845022
-
Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems
-
[Mouratidis et al., 2003a], Springer-Verlag
-
[Mouratidis et al., 2003a] Mouratidis, H., Giorgini, P., and Manson, G. (2003a). Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. In Proceedings of the 15th Conference On Advanced Information Systems Engineering (CAiSE'03), pages 63-78. Springer-Verlag.
-
(2003)
Proceedings of the 15th Conference On Advanced Information Systems Engineering (CAiSE'03)
, pp. 63-78
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
37
-
-
8444240069
-
Using Security Attacks Scenarios to Analyse Security during Information Systems Design
-
[Mouratidis et al., 2004]
-
[Mouratidis et al., 2004] Mouratidis, H., Giorgini, P., and Manson, G. A. (2004). Using Security Attacks Scenarios to Analyse Security during Information Systems Design. In Proceedings of the 6th International Conference on Enterprise Information Systems 2004 (ICEIS'04).
-
(2004)
Proceedings of the 6th International Conference On Enterprise Information Systems 2004 (ICEIS'04)
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.A.3
-
38
-
-
23944475544
-
When Security Meets Software Engineering: A Case of Modelling Secure Information Systems
-
[Mouratidis et al., 2005]
-
[Mouratidis et al., 2005] Mouratidis, H., Giorgini, P., and Manson, G. A. (2005). When Security Meets Software Engineering: a Case of Modelling Secure Information Systems. Information Systems, 30(8):609-629.
-
(2005)
Information Systems
, vol.30
, Issue.8
, pp. 609-629
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.A.3
-
39
-
-
33746038490
-
Towards a Comprehensive Framework for Secure Systems Development
-
[Mouratidis et al., 2006], Dubois, E. and Pohl, K., editors, Springer-Verlag
-
[Mouratidis et al., 2006] Mouratidis, H., Jurjens, J., and Fox, J. (2006). Towards a Comprehensive Framework for Secure Systems Development. In Dubois, E. and Pohl, K., editors, Proceedings of the 18th International Conference on Advanced Information Systems Engineering (CAiSE'06), pages 48-62. Springer-Verlag.
-
(2006)
Proceedings of the 18th International Conference On Advanced Information Systems Engineering (CAiSE'06)
, pp. 48-62
-
-
Mouratidis, H.1
Jurjens, J.2
Fox, J.3
-
40
-
-
84990316932
-
A Novel Agent-Based System to Support the Single Assessment Process of Older People
-
[Mouratidis et al., 2003b]
-
[Mouratidis et al., 2003b] Mouratidis, H., Philp, I., and Manson, G. (2003b). A Novel Agent-Based System to Support the Single Assessment Process of Older People. Journal of Health Informatics, 9(3):149-162.
-
(2003)
Journal of Health Informatics
, vol.9
, Issue.3
, pp. 149-162
-
-
Mouratidis, H.1
Philp, I.2
Manson, G.3
-
41
-
-
16344385743
-
-
[Object Management Group (OMG), 2004] Object Management Group (OMG)
-
[Object Management Group (OMG), 2004] Object Management Group (OMG) (2004). Unified Modeling Language: Superstructure, version 2.0.
-
(2004)
Unified Modeling Language: Superstructure, Version 2.0
-
-
-
45
-
-
13644252644
-
Eliciting Security Requirements with Misuse Cases
-
[Sindre and Opdahl, 2005]
-
[Sindre and Opdahl, 2005] Sindre, G. and Opdahl, A. L. (2005). Eliciting Security Requirements with Misuse Cases. Requirements Engineering Journal, 10(1):34-44.
-
(2005)
Requirements Engineering Journal
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
46
-
-
0034837933
-
Goal-Oriented Requirements Engineering: A Guided Tour
-
[van Lamsweerde, 2001], Washington, DC, USA. IEEE Computer Society
-
[van Lamsweerde, 2001] van Lamsweerde, A. (2001). Goal-Oriented Requirements Engineering: A Guided Tour. In Proceedings of the 5th IEEE International Conference on Requirements Engineering (RE'01), page 249, Washington, DC, USA. IEEE Computer Society.
-
(2001)
Proceedings of the 5th IEEE International Conference On Requirements Engineering (RE'01)
, pp. 249
-
-
van Lamsweerde, A.1
-
47
-
-
4544255381
-
Elaborating Security Requirements by Construction of Intentional Anti-models
-
[van Lamsweerde, 2004], IEEE Computer Society
-
[van Lamsweerde, 2004] van Lamsweerde, A. (2004). Elaborating Security Requirements by Construction of Intentional Anti-models. In Proceedings of the 26th International Conference on Software Engineering (ICSE'04), pages 148-157. IEEE Computer Society.
-
(2004)
Proceedings of the 26th International Conference On Software Engineering (ICSE'04)
, pp. 148-157
-
-
van Lamsweerde, A.1
-
48
-
-
77950516725
-
Assessing enterprise risk level: The CORAS approach
-
[Vraalsen et al., 2007], Khadraoui, D. and Herrmann, F., editors, Idea group
-
[Vraalsen et al., 2007] Vraalsen, F., Mahler, T., Lund, M. S., Hogganvik, I., den Braber, F., and Stølen, K. (2007). Assessing enterprise risk level: The CORAS approach. In Khadraoui, D. and Herrmann, F., editors, Advances in Enterprise Information Technology Security, pages 311-333. Idea group.
-
(2007)
Advances In Enterprise Information Technology Security
, pp. 311-333
-
-
Vraalsen, F.1
Mahler, T.2
Lund, M.S.3
Hogganvik, I.4
den Braber, F.5
Stølen, K.6
|