-
1
-
-
77950545414
-
Strategies for developing policies and requirements for secure electronic commerce systems
-
[Antón, 00], ACM
-
[Antón, 00] A. Antón, and J. Earp, Strategies for developing policies and requirements for secure electronic commerce systems. 1st Workshop on security and privacy in e-commerce. ACM, 2000.
-
(2000)
1st Workshop On Security and Privacy In E-commerce
-
-
Antón, A.1
Earp, J.2
-
2
-
-
84866246200
-
Business Process Patterns and Frameworks: Reusing Knowledge in Process Innovation
-
[Barros, 04], Technical Report 56, Universidad de Chile, 2004
-
[Barros, 04] O. Barros, Business Process Patterns and Frameworks: Reusing Knowledge in Process Innovation, Technical Report 56, Universidad de Chile, 2004. [Cocoon, 02] Cocoon XML publishing framework, 2002, http://xml.apache.org/cocoon/
-
(2002)
[Cocoon, 02] Cocoon XML Publishing Framework
-
-
Barros, O.1
-
3
-
-
0002131454
-
Design for Privacy in Ubiquitous Computing Environments
-
[Bellotti, 93], In: Michelis, G., Simone, C., Schmidt, Kjeld (ed.)
-
[Bellotti, 93] V. Bellotti, A. Sellen, Design for Privacy in Ubiquitous Computing Environments, In: Michelis, G., Simone, C., Schmidt, Kjeld (ed.), Proceedings of the Third European Conference on Computer Supported Cooperative Work - ECSCW 93 pp. 93108,1993.
-
(1993)
Proceedings of the Third European Conference On Computer Supported Cooperative Work - ECSCW
, vol.93
, pp. 93108
-
-
Bellotti, V.1
Sellen, A.2
-
4
-
-
40449096076
-
Analyzing Regulator Rules for privacy and Security Requirements
-
[Breaux, 08], January-February
-
[Breaux, 08] T. D. Breaux and A. I. Antón, Analyzing Regulator Rules for privacy and Security Requirements, IEEE transactions on software engineering, Vol. 34, No. 1, January-February 2008.
-
(2008)
IEEE Transactions On Software Engineering
, vol.34
, Issue.1
-
-
Breaux, T.D.1
Antón, A.I.2
-
6
-
-
84979855000
-
Dealing with security requirements during the development of information systems
-
[Chung, 93], CAiSE'93, Paris, France, Springer Verlag LNCS 685
-
[Chung, 93] L. Chung, Dealing with security requirements during the development of information systems. The 5th international conference of advanced information systems engineering, CAiSE'93, Paris, France, Springer Verlag LNCS 685, pp: 234-251,1993.
-
(1993)
The 5th International Conference of Advanced Information Systems Engineering
, pp. 234-251
-
-
Chung, L.1
-
7
-
-
84866234347
-
IT-Security and Privacy
-
[Fischer-Hübner, 01], Lecture Notes in Computer Science, Springer-Verlag, Berlin, 2001
-
[Fischer-Hübner, 01] S. Fischer-Hübner, IT-Security and Privacy, Design and Use of Privacy Enhancing Security Mechanisms. Lecture Notes in Computer Science, Vol. 1958. Springer-Verlag, Berlin, 2001.
-
(1958)
Design and Use of Privacy Enhancing Security Mechanisms
-
-
Fischer-Hübner, S.1
-
8
-
-
84899251780
-
Arguing Satisfaction of Security Requirements
-
[Haley, 06], Idea Publishing Group
-
[Haley, 06] C.B. Haley, R. Laney, J.D. Moffett and B. Nuseibeh, Arguing Satisfaction of Security Requirements, in Integrating Security and Software Engineering: Advances and Future Visions, pp. 16-43, Idea Publishing Group, 2006.
-
(2006)
Integrating Security and Software Engineering: Advances and Future Visions
, pp. 16-43
-
-
Haley, C.B.1
Laney, R.2
Moffett, J.D.3
Nuseibeh, B.4
-
10
-
-
77950516884
-
Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec
-
[Houmb, 10], March
-
[Houmb, 10] S. H. Houmb, S. Islam, E. Knauss, J. Jürjens, and K. Schneider. Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec. Requirements Engineering Journal, 15(1):63-93, March 2010.
-
(2010)
Requirements Engineering Journal
, vol.15
, Issue.1
, pp. 63-93
-
-
Houmb, S.H.1
Islam, S.2
Knauss, E.3
Jürjens, J.4
Schneider, K.5
-
12
-
-
77955462130
-
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations
-
[Islam, 10a], Springer-Verlag, 2010. Essen, Germany
-
[Islam, 10a] S. Islam, H. Mouratidis and S. Wagner, Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations, In Proc. of 16th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ '10), Springer-Verlag, 2010. Essen, Germany.
-
Proc. of 16th International Working Conference On Requirements Engineering: Foundation For Software Quality (REFSQ '10)
-
-
Islam, S.1
Mouratidis, H.2
Wagner, S.3
-
13
-
-
77957316220
-
Integrating Risk Management Activities into Requirements Engineering
-
[Islam, 10b], Nice, France
-
[Islam, 10b] S. Islam and S. H. Houmb, Integrating Risk Management Activities into Requirements Engineering, In Proc. of the 4th IEEE Research International Conference on Research Challenges in IS (RCIS2010), Nice, France.
-
Proc. of the 4th IEEE Research International Conference On Research Challenges In is (RCIS2010)
-
-
Islam, S.1
Houmb, S.H.2
-
14
-
-
79959729769
-
A Framework to Support Alignment of Secure Software Engineering with Legal Regulations
-
[Islam, 11], NFPinDSML, Springer-Verlag
-
[Islam, 11] S. Islam, H. Mouratidis and J. Jürjens, A Framework to Support Alignment of Secure Software Engineering with Legal Regulations, Journal of Software and Systems Modeling (SoSyM), Theme Section on Non-Functional System Properties in Domain-Specific Modeling Languages (NFPinDSML), 2011, Springer-Verlag.
-
(2011)
Journal of Software and Systems Modeling (SoSyM), Theme Section On Non-Functional System Properties In Domain-Specific Modeling Languages
-
-
Islam, S.1
Mouratidis, H.2
Jürjens, J.3
-
15
-
-
33646345792
-
-
[Jensen, 05], Georgia Institute of Technology, GIT-GVU05-02
-
[Jensen, 05] C. Jensen, J. Tullio, C. Potts and E. Mynatt, STRAP: A Structured Analysis Framework for Privacy. GVU Technical Report, Georgia Institute of Technology, GIT-GVU05-02, 2005.
-
(2005)
STRAP: A Structured Analysis Framework For Privacy. GVU Technical Report
-
-
Jensen, C.1
Tullio, J.2
Potts, C.3
Mynatt, E.4
-
17
-
-
50949085110
-
Addressing privacy requirements in system design: The PriS method
-
[Kalloniatis, 08]
-
[Kalloniatis, 08] C. Kalloniatis, E. Kavakli, and S. Gritzalis, Addressing privacy requirements in system design: The PriS method, Requirements Engineering, 13(3): 241-255, 2008.
-
(2008)
Requirements Engineering
, vol.13
, Issue.3
, pp. 241-255
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
18
-
-
70849084080
-
Proceedings of the PCI 2009 13th Pan-Hellenic Conference on Informatics (with international participation)
-
[Kalloniatis, 09], N. Alexandris, V. Chryssikopoulos, C. Douligeris, N. Kanellopoulos (Eds.), September, Corfu: Greece, IEEE CPS Conference Publishing Services
-
[Kalloniatis, 09] C. Kalloniatis, E. Kavakli, S. Gritzalis, Methods for Designing Privacy Aware Information Systems: A review, Proceedings of the PCI 2009 13th Pan-Hellenic Conference on Informatics (with international participation), N. Alexandris, V. Chryssikopoulos, C. Douligeris, N. Kanellopoulos (Eds.), September 2009, Corfu: Greece, IEEE CPS Conference Publishing Services.
-
(2009)
Methods For Designing Privacy Aware Information Systems: A Review
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
19
-
-
84992927367
-
Protecting Privacy in System Design: The Electronic Voting Case, Transforming Government: People
-
[Kavakli, 07]
-
[Kavakli, 07] E. Kavakli, S. Gritzalis, and C. Kalloniatis, C. (2007), Protecting Privacy in System Design: The Electronic Voting Case, Transforming Government: People, Process and Policy, 1(4): 307-332.
-
(2007)
Process and Policy
, vol.1
, Issue.4
, pp. 307-332
-
-
Kavakli, E.1
Gritzalis, S.2
Kalloniatis, C.3
-
20
-
-
84866234352
-
Privacy Enhancing Technologies, White paper for Decision Makers
-
[Koorn, 04], the Netherlands, December
-
[Koorn, 04] R. Koorn, H. van Gils, J. ter Hart, P. Overbeek, and R. Tellegen, Privacy Enhancing Technologies, White paper for Decision Makers. Ministry of the Interior and Kingdom Relations, the Netherlands, December 2004.
-
(2004)
Ministry of the Interior and Kingdom Relations
-
-
Koorn, R.1
van Gils, H.2
ter Hart, J.3
Overbeek, P.4
Tellegen, R.5
-
22
-
-
2542438623
-
From Information Modelling to Enterprise Modelling
-
[Loucopoulos, 00], Springer
-
[Loucopoulos, 00] P. Loucopoulos, From Information Modelling to Enterprise Modelling. In: IS Engineering: State of the Art and Research Themes. Springer, 2000, 67-78.
-
(2000)
IS Engineering: State of the Art and Research Themes
, pp. 67-78
-
-
Loucopoulos, P.1
-
23
-
-
33644508508
-
Enterprise Knowledge Management and Conceptual Modelling
-
[Loucopoulos, 99], Springer
-
[Loucopoulos, 99] P. Loucopoulos, V. Kavakli, Enterprise Knowledge Management and Conceptual Modelling. LNCS Vol. 1565. Springer,123-143,1999.
-
(1999)
LNCS
, vol.1565
, pp. 123-143
-
-
Loucopoulos, P.1
Kavakli, V.2
-
24
-
-
84866260932
-
-
[Massey, 09], Requirements Engineering Journal, Special issues security requirements engineering
-
[Massey, 09] A. K. Massey, P. N. Otto, L. J. Hayward, and A. I. Antón, Evaluating existing security and privacy requirements for legal compliance, Requirements Engineering Journal, Special issues security requirements engineering, 2009.
-
(2009)
Evaluating Existing Security and Privacy Requirements For Legal Compliance
-
-
Massey, A.K.1
Otto, P.N.2
Hayward, L.J.3
Antón, A.I.4
-
25
-
-
84899324292
-
Identifying Security Requirements Using the Security Quality Requirements Engineering (SQUARE) Method
-
[Mead, 06], Idea Publishing Group
-
[Mead, 06] N.R. Mead, Identifying Security Requirements Using the Security Quality Requirements Engineering (SQUARE) Method, Integrating Security and Software Engineering, pp. 44-69, Idea Publishing Group, 2006.
-
(2006)
Integrating Security and Software Engineering
, pp. 44-69
-
-
Mead, N.R.1
-
26
-
-
33751416458
-
A common criterion based security requirements engineering process for the development of secure information system
-
[Mellado, 07], June
-
[Mellado, 07] D. Mellado, E. Medina, and M. Piattini, A common criterion based security requirements engineering process for the development of secure information system. Computer standards & interfaces, 29:244- 253, June 2007.
-
(2007)
Computer Standards & Interfaces, 29:244-
, pp. 253
-
-
Mellado, D.1
Medina, E.2
Piattini, M.3
-
27
-
-
12344314483
-
A framework for security requirements engineering
-
[Moffett, 95], University of York, YCS
-
[Moffett, 95] D. Moffett and B. Nuseibeh, A framework for security requirements engineering. Department of computer science, University of York, YCS 368, 2003.
-
(2003)
Department of Computer Science
, pp. 368
-
-
Moffett, D.1
Nuseibeh, B.2
-
30
-
-
34548508691
-
Security Attack Testing (SAT) - testing the security of information systems at design time.
-
[Mouratidis, 07b]
-
[Mouratidis, 07b] H. Mouratidis and P. Giorgini, Security Attack Testing (SAT) - testing the security of information systems at design time. Inf. Syst. 32(8): 1166-1183, 2007.
-
(2007)
Inf. Syst
, vol.32
, Issue.8
, pp. 1166-1183
-
-
Mouratidis, H.1
Giorgini, P.2
-
31
-
-
84866234350
-
Designing Law-Compliant Software Requirement
-
[Siena, 09], Volume 5829/2009, 28th International Conference on Conceptual Modeling (ER2009), Gramado, Brazil
-
[Siena, 09] A. Siena, J. Mylopoulos, A. Perini, and A. Susi. Designing Law-Compliant Software Requirement, LNCS, Volume 5829/2009, 28th International Conference on Conceptual Modeling (ER2009), Gramado, Brazil.
-
LNCS
-
-
Siena, A.1
Mylopoulos, J.2
Perini, A.3
Susi, A.4
-
32
-
-
13644252644
-
Eliciting Security Requirements with Misuse Cases
-
[Sindre, 05]
-
[Sindre, 05] G. Sindre and A. L. Opdahl, Eliciting Security Requirements with Misuse Cases, Requirements Engineering, 10(1):34-44, January 2005.
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
33
-
-
85026689401
-
Modeling organisations for information systems requirements engineering
-
[Yu, 93]
-
[Yu, 93] E. Yu. Modeling organisations for information systems requirements engineering. 1st IEEE International Symposium on Requirements Engineering pp: 34-41, 1993.
-
(1993)
1st IEEE International Symposium On Requirements Engineering
, pp. 34-41
-
-
Yu, E.1
-
34
-
-
0003944811
-
-
[Yu, 95], Ph.D. thesis, Department of Computer Science, University of Toronto, Canada
-
[Yu, 95] E. Yu, Modelling Strategic Relationships for Process Reengineering, Ph.D. thesis, Department of Computer Science, University of Toronto, Canada, 1995.
-
(1995)
Modelling Strategic Relationships For Process Reengineering
-
-
Yu, E.1
|