-
1
-
-
33746338083
-
-
Version 2.0. Carnegie Mellon University - Software Engineering Institute, Pennsylvania
-
Alberts, C.J., Dorofee, A.J.: OCTAVE Method Implementation Guide Version 2.0. Carnegie Mellon University - Software Engineering Institute, Pennsylvania (2001)
-
(2001)
OCTAVE Method Implementation Guide
-
-
Alberts, C.J.1
Dorofee, A.J.2
-
2
-
-
34548171255
-
From Trust to Dependability through Risk Analysis
-
IEEE Computer Society
-
Asnar, Y., Giorgini, P., Massacci, F., Zannone, N.: From Trust to Dependability through Risk Analysis. In: Proceedings of ARES 2007, pp. 19-26. IEEE Computer Society (2007)
-
(2007)
Proceedings of ARES 2007
, pp. 19-26
-
-
Asnar, Y.1
Giorgini, P.2
Massacci, F.3
Zannone, N.4
-
3
-
-
84911359364
-
AS/NZS 4360, Risk management
-
AS/NZS 4360, Risk management. SAI Global (2004)
-
(2004)
SAI Global
-
-
-
4
-
-
33947368645
-
Model-based Security Analysis in Seven Steps-a Guided Tour to the CORAS Method
-
Braber, F., Hogganvik, I., Lund, M.S., Stølen, K., Vraalsen, F.: Model-based Security Analysis in Seven Steps-a Guided Tour to the CORAS Method. BT Technology Journal 25(1), 101-117 (2007)
-
(2007)
BT Technology Journal
, vol.25
, Issue.1
, pp. 101-117
-
-
Braber, F.1
Hogganvik, I.2
Lund, M.S.3
Stølen, K.4
Vraalsen, F.5
-
5
-
-
84858311224
-
Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions
-
Regnell, B., Damian, D. (eds.) REFSQ 2011. Springer, Heidelberg
-
Chowdhury, M.J.M., Matulevičius, R., Sindre, G., Karpati, P.: Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions. In: Regnell, B., Damian, D. (eds.) REFSQ 2011. LNCS, vol. 7195, pp. 132-139. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7195
, pp. 132-139
-
-
Chowdhury, M.J.M.1
Matulevičius, R.2
Sindre, G.3
Karpati, P.4
-
6
-
-
84911355743
-
Common Criteria
-
version 2.3, CCMB-2005-08-002
-
Common Criteria version 2.3, Common Criteria for Information Technology Security Evaluation, CCMB-2005-08-002 (2005), http://www.tse.org.tr/turkish/ belgelendirme/ortakkriter/ccpart2v2.3.pdf
-
(2005)
Common Criteria for Information Technology Security Evaluation
-
-
-
7
-
-
84892326872
-
A Systematic Approach to Define the Domain of Information System Security Risk Management
-
Springer
-
Dubois, E., Heymans, P., Mayer, N., Matulevičius, R.: A Systematic Approach to Define the Domain of Information System Security Risk Management. In: Intentional Perspectives on Information Systems Engineering, pp. 289-306. Springer (2010)
-
(2010)
Intentional Perspectives on Information Systems Engineering
, pp. 289-306
-
-
Dubois, E.1
Heymans, P.2
Mayer, N.3
Matulevičius, R.4
-
9
-
-
40449096402
-
Security Requirements Engineering: A Framework for Representation and Analysis
-
Haley, C.B., Laney, R.C., Moffett, J.D., Nuseibeh, B.: Security Requirements Engineering: A Framework for Representation and Analysis. IEEE Transactions on Software Engineering 34, 133-153 (2008)
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, pp. 133-153
-
-
Haley, C.B.1
Laney, R.C.2
Moffett, J.D.3
Nuseibeh, B.4
-
10
-
-
84864680030
-
Risk and Business Goal Based Security Requirement and Countermeasure Prioritization
-
Niedrite, L., Strazdina, R., Wangler, B. (eds.) BIR Workshops 2011. Springer, Heidelberg
-
Herrmann, A., Morali, A., Etalle, S., Wieringa, R.: Risk and Business Goal Based Security Requirement and Countermeasure Prioritization. In: Niedrite, L., Strazdina, R., Wangler, B. (eds.) BIR Workshops 2011. LNBIP, vol. 106, pp. 64-76. Springer, Heidelberg (2012)
-
(2012)
LNBIP
, vol.106
, pp. 64-76
-
-
Herrmann, A.1
Morali, A.2
Etalle, S.3
Wieringa, R.4
-
13
-
-
45849117958
-
Alignment of Misuse Cases with Security Risk Management
-
IEEE
-
Matulevičius, R., Mayer, N., Heymans, P.: Alignment of Misuse Cases with Security Risk Management. In: Proceedings of ARES 2008, pp. 1397-1404. IEEE (2008)
-
(2008)
Proceedings of ARES 2008
, pp. 1397-1404
-
-
Matulevičius, R.1
Mayer, N.2
Heymans, P.3
-
14
-
-
45849134150
-
Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development
-
Bellahsène, Z., Léonard, M. (eds.) CAiSE 2008. Springer, Heidelberg
-
Matulevičius, R., Mayer, N., Mouratidis, H., Martinez, F.H., Heymans, P., Genon, N.: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development. In: Bellahsène, Z., Léonard, M. (eds.) CAiSE 2008. LNCS, vol. 5074, pp. 541-555. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5074
, pp. 541-555
-
-
Matulevičius, R.1
Mayer, N.2
Mouratidis, H.3
Martinez, F.H.4
Heymans, P.5
Genon, N.6
-
16
-
-
70349683196
-
Security Requirements Specification in Service-oriented Business Process Management
-
Menzel, M., Thomas, I., Meinel, C.: Security Requirements Specification in Service-oriented Business Process Management. In: ARES 2009, pp. 41-49 (2009)
-
(2009)
ARES 2009
, pp. 41-49
-
-
Menzel, M.1
Thomas, I.2
Meinel, C.3
-
17
-
-
84864647111
-
Security Requirements Engineering for Secure Business Processes
-
Niedrite, L., Strazdina, R., Wangler, B. (eds.) BIR Workshops 2011. Springer, Heidelberg
-
Paja, E., Giorgini, P., Paul, S., Meland, P.H.: Security Requirements Engineering for Secure Business Processes. In: Niedrite, L., Strazdina, R., Wangler, B. (eds.) BIR Workshops 2011. LNBIP, vol. 106, pp. 77-89. Springer, Heidelberg (2012)
-
(2012)
LNBIP
, vol.106
, pp. 77-89
-
-
Paja, E.1
Giorgini, P.2
Paul, S.3
Meland, P.H.4
-
18
-
-
47749085299
-
-
Queensland University of Technology, TR
-
Remco, M., Dijkman, R.M., Dumas, M., Ouyang, C.: Formal Semantics and Analysis of BPMN Process Models using Petri Nets. Queensland University of Technology, TR (2007)
-
(2007)
Formal Semantics and Analysis of BPMN Process Models Using Petri Nets
-
-
Remco, M.1
Dijkman, R.M.2
Dumas, M.3
Ouyang, C.4
-
19
-
-
34247151648
-
A BPMN Extension for the Modeling of Security Requirements in Business Processes
-
Rodríguez, A., Fernández-Medina, E., Piattini, M.: A BPMN Extension for the Modeling of Security Requirements in Business Processes. IEICE - Transactions on Information and Systems E90-D(4), 745-752 (2007)
-
(2007)
IEICE - Transactions on Information and Systems
, vol.E90-D
, Issue.4
, pp. 745-752
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
20
-
-
38049100950
-
UbiComp 2007
-
Rodríguez, A., Fernández-Medina, E., Piattini, M.: UbiComp 2007. LNCS, vol. 4717, pp. 408-415 (2007)
-
(2007)
LNCS
, vol.4717
, pp. 408-415
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
22
-
-
79958125759
-
-
National Institute of Standards and Technology, Gaithersburg
-
Stoneburner, G., Goguen, A., Feringa, A.: NIST Special Publication 800-30: Risk Management Guide for Information Technology Systems. National Institute of Standards and Technology, Gaithersburg (2002)
-
(2002)
NIST Special Publication 800-30: Risk Management Guide for Information Technology Systems
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
|