-
2
-
-
47949100642
-
Secure and dependable patterns in organizations: An empirical approach
-
Asnar, Y., Giorgini, P., Massacci, F., Saidane, A., Bonato, R., Meduri, V., Ricucci, V.: Secure and dependable patterns in organizations: An empirical approach. In: Proc. of RE 2007, pp. 287-292 (2007)
-
(2007)
Proc. of RE 2007
, pp. 287-292
-
-
Asnar, Y.1
Giorgini, P.2
Massacci, F.3
Saidane, A.4
Bonato, R.5
Meduri, V.6
Ricucci, V.7
-
3
-
-
72449133279
-
A systematic mapping study on empirical evaluation of software requirements specifications techniques
-
Condori-Fernandez, N., Daneva, M., Sikkel, K., Wieringa, R., Dieste, O., Pastor, O.: A systematic mapping study on empirical evaluation of software requirements specifications techniques. In: Proc. of ESEM 2009, pp. 502-505 (2009)
-
(2009)
Proc. of ESEM 2009
, pp. 502-505
-
-
Condori-Fernandez, N.1
Daneva, M.2
Sikkel, K.3
Wieringa, R.4
Dieste, O.5
Pastor, O.6
-
4
-
-
27644537252
-
Modeling security requirements through ownership, permission and delegation
-
Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modeling security requirements through ownership, permission and delegation. In: Proc. of RE 2005, pp. 167-176 (2005)
-
(2005)
Proc. of RE 2005
, pp. 167-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
5
-
-
81255185570
-
Reducing the effort to comprehend risk models: Text labels are often preferred over graphical means
-
Grondahl, I.H., Lund, M.S., Stolen, K.: Reducing the effort to comprehend risk models: Text labels are often preferred over graphical means. Risk Analysis 31(11), 1813-1831 (2011)
-
(2011)
Risk Analysis
, vol.31
, Issue.11
, pp. 1813-1831
-
-
Grondahl, I.H.1
Lund, M.S.2
Stolen, K.3
-
6
-
-
40449096402
-
Security requirements engineering: A framework for representation and analysis
-
Haley, C., Laney, R., Moffett, J., Nuseibeh, B.: Security requirements engineering: A framework for representation and analysis. IEEE Transactions on Software Engineering 34(1), 133-153 (2008)
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.1
Laney, R.2
Moffett, J.3
Nuseibeh, B.4
-
7
-
-
38549147623
-
An analysis of the security patterns landscape
-
IEEE Computer Society
-
Heyman, T., Yskout, K., Scandariato, R., Joosen, W.: An analysis of the security patterns landscape. In: Proc. of the 3rd Int. Workshop on Soft. Eng. for Secure Systems, SESS 2007, p. 3. IEEE Computer Society (2007)
-
(2007)
Proc. of the 3rd Int. Workshop on Soft. Eng. for Secure Systems, SESS 2007
, pp. 3
-
-
Heyman, T.1
Yskout, K.2
Scandariato, R.3
Joosen, W.4
-
8
-
-
33750384757
-
A Graphical Approach to Risk Identification, Motivated by Empirical Investigations
-
Wang, J., Whittle, J., Harel, D., Reggio, G. (eds.) MoDELS 2006. Springer, Heidelberg
-
Hogganvik, I., Stølen, K.: A Graphical Approach to Risk Identification, Motivated by Empirical Investigations. In: Wang, J., Whittle, J., Harel, D., Reggio, G. (eds.) MoDELS 2006. LNCS, vol. 4199, pp. 574-588. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4199
, pp. 574-588
-
-
Hogganvik, I.1
Stølen, K.2
-
10
-
-
79955163100
-
UMLsec: Extending UML for Secure Systems Development
-
Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. Springer, Heidelberg
-
Jürjens, J.: UMLsec: Extending UML for Secure Systems Development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412-425. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2460
, pp. 412-425
-
-
Jürjens, J.1
-
11
-
-
79955143136
-
SecureUML: A UML-Based Modeling Language for Model-Driven Security
-
Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. Springer, Heidelberg
-
Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426-441. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
12
-
-
80053603795
-
A guided tour of the coras method
-
Springer
-
Lund, M.S., Solhaug, B., Stolen, K.: A guided tour of the coras method. In: Model- Driven Risk Analysis, pp. 23-43. Springer (2011)
-
(2011)
Model- Driven Risk Analysis
, pp. 23-43
-
-
Lund, M.S.1
Solhaug, B.2
Stolen, K.3
-
14
-
-
33751189883
-
Security quality requirements engineering (square) methodology
-
Mead, N.R., Stehney, T.: Security quality requirements engineering (square) methodology. SIGSOFT Softw. Eng. Notes 30(4), 1-7 (2005)
-
(2005)
SIGSOFT Softw. Eng. Notes
, vol.30
, Issue.4
, pp. 1-7
-
-
Mead, N.R.1
Stehney, T.2
-
16
-
-
35048845022
-
Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems
-
Eder, J., Missikoff, M. (eds.) CAiSE 2003. Springer, Heidelberg
-
Mouratidis, H., Giorgini, P., Manson, G.: Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol. 2681, pp. 1031-1031. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2681
, pp. 1031-1031
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
18
-
-
60949097689
-
Experimental comparison of attack trees and misuse cases for security threat identification
-
Opdahl, A.L., Sindre, G.: Experimental comparison of attack trees and misuse cases for security threat identification. Inf. Softw. Technol. 51(5), 916-932 (2009)
-
(2009)
Inf. Softw. Technol.
, vol.51
, Issue.5
, pp. 916-932
-
-
Opdahl, A.L.1
Sindre, G.2
-
19
-
-
0009629259
-
Software-engineering research revisited
-
Potts, C.: Software-engineering research revisited. IEEE Softw. 10(5), 19-28 (1993)
-
(1993)
IEEE Softw.
, vol.10
, Issue.5
, pp. 19-28
-
-
Potts, C.1
|