-
1
-
-
9944262089
-
-
version 2.0. Technical report CMU/SEI-2001-TR-016, Carnegie Mellon University
-
Alberts, C.J., Davey, J.: OCTAVE criteria version 2.0. Technical report CMU/SEI-2001-TR-016, Carnegie Mellon University (2004)
-
(2004)
OCTAVE Criteria
-
-
Alberts, C.J.1
Davey, J.2
-
2
-
-
0001094070
-
The use of the CCTA risk analysis and management methodology CRAMM in health information systems
-
North-Holland
-
Barber, B., Davey, J.: The use of the CCTA risk analysis and management methodology CRAMM in health information systems. In: 7th International Congress on Medical Informatics (MEDINFO 1992), pp. 1589-1593. North-Holland (1992)
-
(1992)
7th International Congress on Medical Informatics (MEDINFO 1992)
, pp. 1589-1593
-
-
Barber, B.1
Davey, J.2
-
3
-
-
77956063392
-
Modular analysis and modelling of risk scenarios with dependencies
-
Brændeland, G., Refsdal, A., Stølen, K.: Modular analysis and modelling of risk scenarios with dependencies. Journal of Systems and Software 83(10), 1995-2013 (2010)
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.10
, pp. 1995-2013
-
-
Brændeland, G.1
Refsdal, A.2
Stølen, K.3
-
4
-
-
84865619448
-
MoVEing forward: Towards an architecture and processes for a Living Models infrastructure
-
Breu, M., Breu, R., Löw, S.: MoVEing forward: Towards an architecture and processes for a Living Models infrastructure. International Journal On Advances in Life Sciences 3(1-2), 12-22 (2011)
-
(2011)
International Journal on Advances in Life Sciences
, vol.3
, Issue.1-2
, pp. 12-22
-
-
Breu, M.1
Breu, R.2
Löw, S.3
-
9
-
-
84946150482
-
Using indicators to monitor security risk in systems of systems: How to capture and measure the impact of service dependencies on the security of provided services
-
IGI Global to appear
-
Ligaarden, O.S., Refsdal, A., Stølen, K.: Using indicators to monitor security risk in systems of systems: How to capture and measure the impact of service dependencies on the security of provided services. In: IT Security Governance Innovations: Theory and Research. IGI Global (to appear, 2012)
-
(2012)
IT Security Governance Innovations: Theory and Research
-
-
Ligaarden, O.S.1
Refsdal, A.2
Stølen, K.3
-
10
-
-
77953097363
-
Evolution in relation to risk and trust management
-
Lund, M.S., Solhaug, B., Stølen, K.: Evolution in relation to risk and trust management. Computer 43(5), 49-55 (2010)
-
(2010)
Computer
, vol.43
, Issue.5
, pp. 49-55
-
-
Lund, M.S.1
Solhaug, B.2
Stølen, K.3
-
12
-
-
80054085878
-
Risk Analysis of Changing and Evolving Systems Using CORAS
-
Aldini, A., Gorrieri, R. (eds.) FOSAD VI. Springer, Heidelberg
-
Lund, M.S., Solhaug, B., Stølen, K.: Risk Analysis of Changing and Evolving Systems Using CORAS. In: Aldini, A., Gorrieri, R. (eds.) FOSAD VI. LNCS, vol. 6858, pp. 231-274. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6858
, pp. 231-274
-
-
Lund, M.S.1
Solhaug, B.2
Stølen, K.3
-
13
-
-
73849097284
-
Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology
-
Ras, Z.W., Tsay, L.-S. (eds.) Springer, Heidelberg
-
Massacci, F., Mylopoulos, J., Zannone, N.: Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology. In: Ras, Z.W., Tsay, L.-S. (eds.) Advances in Intelligent Information Systems. SCI, vol. 265, pp. 147-174. Springer, Heidelberg (2010)
-
(2010)
Advances in Intelligent Information Systems. SCI
, vol.265
, pp. 147-174
-
-
Massacci, F.1
Mylopoulos, J.2
Zannone, N.3
-
14
-
-
77649321736
-
-
Microsoft Solutions for Security and Compliance and Microsoft Security Center of Excellence
-
Microsoft Solutions for Security and Compliance and Microsoft Security Center of Excellence: The Security Risk Management Guide (2006)
-
(2006)
The Security Risk Management Guide
-
-
-
15
-
-
50949102921
-
-
Object Management Group: Version 2.2, OMG Document: formal/2009-02-02
-
Object Management Group: OMG Unified Modeling Language (OMG UML), Superstructure. Version 2.2, OMG Document: formal/2009-02-02 (2009)
-
(2009)
OMG Unified Modeling Language (OMG UML), Superstructure
-
-
|