-
1
-
-
33749469503
-
Outsourcing managed security services
-
CMU/SEI-SIM-012. 2003, Carnegie Mellon, Software Engineering Institute: Pittsburg, PA
-
Allen J, Gabbard D, and May C (2003) Outsourcing Managed Security Services In: Security improvement module, CMU/SEI-SIM-012. 2003, Carnegie Mellon, Software Engineering Institute: Pittsburg, PA.
-
(2003)
Security Improvement Module
-
-
Allen, J.1
Gabbard, D.2
May, C.3
-
4
-
-
84887912859
-
Design for quality
-
Linden FVd ed, Springer, Berlin Heidelberg New York
-
Bayer J (2003) Design for Quality. In: Linden FVd (ed) 5th Int'l Workshop on Product Family Engineering. Springer, Berlin Heidelberg New York
-
(2003)
5th Int'l Workshop on Product Family Engineering
-
-
Bayer, J.1
-
6
-
-
8844284465
-
Persistent software attributes
-
Bollinger T, Voas J, and Boasson M, Persistent Software Attributes. IEEE Software, 2004. 21(6): p. 16-18.
-
(2004)
IEEE Software
, vol.21
, Issue.6
, pp. 16-18
-
-
Bollinger, T.1
Voas, J.2
Boasson, M.3
-
9
-
-
0036036577
-
Security attribute evaluation method: A cost-benefit approach
-
ACM Press
-
Butler SA (2002) Security Attribute Evaluation Method: A Cost-Benefit Approach. In: International conference on software engineering. ACM Press. p. 232-240.
-
(2002)
International Conference on Software Engineering
, pp. 232-240
-
-
Butler, S.A.1
-
10
-
-
35048854612
-
Exploring the context of product line adoption
-
Linden FVd ed, Springer, Berlin Heidelberg New York
-
Bühne S, Chastek G, Käkölä T, Knauber P, Northrop L, and Thiel S (2003) Exploring the Context of Product Line Adoption. In: Linden FVd (ed) 5th International workshop on Product Family Engineering. Springer, Berlin Heidelberg New York. p. 19-31.
-
(2003)
5th International Workshop on Product Family Engineering
, pp. 19-31
-
-
Bühne, S.1
Chastek, G.2
Käkölä, T.3
Knauber, P.4
Northrop, L.5
Thiel, S.6
-
11
-
-
4243109556
-
A model for evaluating it security investments
-
Cavusoglu H, Mishra B, and Raghunathan S, A Model for Evaluating It Security Investments. Communications of the ACM, 2004. 47(7): p. 87-92.
-
(2004)
Communications of the ACM
, vol.47
, Issue.7
, pp. 87-92
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
13
-
-
0003696305
-
Non-functional requirements in software engineering (2000)
-
Kluwer Academic Publishers
-
Chung L, Nixon BA, Yu E, and Mylopoulos J, eds. Non-Functional Requirements in Software Engineering (2000). The Kluwer International Series in Software Engineering, Basili V (ed). Kluwer Academic Publishers. 439pp.
-
The Kluwer International Series in Software Engineering, Basili V
, pp. 439
-
-
Chung, L.1
Nixon, B.A.2
Yu, E.3
Mylopoulos, J.4
-
18
-
-
1242321281
-
Ddos attacks and defense mechanisms: Classification and state-of-the-art
-
Douligeris C and Mitrokotsa A, Ddos Attacks and Defense Mechanisms: Classification and State-of-the-Art. Computer Networks, 2004. 44(5): p. 643-666.
-
(2004)
Computer Networks
, vol.44
, Issue.5
, pp. 643-666
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
19
-
-
0032058031
-
Client/server benefits, problems, best practices
-
Duchessi P and Chengalur-Smith I, Client/Server Benefits, Problems, Best Practices. Communications of the ACM, 1998. 41(5): p. 87-94.
-
(1998)
Communications of the ACM
, vol.41
, Issue.5
, pp. 87-94
-
-
Duchessi, P.1
Chengalur-Smith, I.2
-
21
-
-
33744905133
-
A pattern language for security models
-
Fernandez EB and Pan R (2001) A Pattern Language for Security Models. In: PLoP 2001.
-
(2001)
PLoP 2001
-
-
Fernandez, E.B.1
Pan, R.2
-
22
-
-
32044443362
-
-
CMU/SEI-2003-TN-033. 2003, Software Engineering Institute, Carnegie Mellon University
-
Firesmith DG (2003) Common Concepts Underlying Safety, Security, and Survivability Engineering Technical note, CMU/SEI-2003-TN-033. 2003, Software Engineering Institute, Carnegie Mellon University
-
(2003)
Common Concepts Underlying Safety, Security, and Survivability Engineering Technical Note
-
-
Firesmith, D.G.1
-
25
-
-
35048892011
-
Patterns in product family architecture design
-
Springer Verlag Linden FVd
-
Hallsteinsen S, Fægri TE, and Syrstad M (2003) Patterns in Product Family Architecture Design. In: Linden FVd (ed) PFE-5. Springer Verlag. p. 261-268.
-
(2003)
PFE-5
, pp. 261-268
-
-
Hallsteinsen, S.1
Fægri, T.E.2
Syrstad, M.3
-
26
-
-
35048892011
-
Patterns in product family architecture design
-
5th International workshop on Product Family Engineering. Springer, Berlin Heidelberg New York
-
Hallsteinsen S, Fægri TE, and Syrstad M (2003) Patterns in Product Family Architecture Design. In: Linden FVd (ed) 5th International workshop on Product Family Engineering. Springer, Berlin Heidelberg New York. p. 261-268.
-
(2003)
Linden FVd
, pp. 261-268
-
-
Hallsteinsen, S.1
Fægri, T.E.2
Syrstad, M.3
-
30
-
-
4644328140
-
Measuring software product quality: A survey of iso/iec 9126
-
Jung H-W, Kim S-G, and Chung C-S, Measuring Software Product Quality: A Survey of Iso/Iec 9126. IEEE Software, 2004. 21(5): p. 88-92.
-
(2004)
IEEE Software
, vol.21
, Issue.5
, pp. 88-92
-
-
Jung, H.-W.1
Kim, S.-G.2
Chung, C.-S.3
-
34
-
-
0036641895
-
Software product families in Europe: The Esaps and Café projects
-
Linden Fvd, Software Product Families in Europe: The Esaps and Café Projects. IEEE Software, 2002. 19(4): p. 41-49.
-
(2002)
IEEE Software
, vol.19
, Issue.4
, pp. 41-49
-
-
Van Der Linden, F.1
-
36
-
-
3042781449
-
Towards reliable user authentication through biometrics
-
Matyás V and Ríha Z, Towards Reliable User Authentication through Biometrics. IEEE Security & Privacy, 2003. 1(3): p. 45-49.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.3
, pp. 45-49
-
-
Matyás, V.1
Ríha, Z.2
-
38
-
-
84887954009
-
-
Microsoft (2002) Building Secure Asp. Net Applications. Microsoft: www.microsoft.com.
-
Microsoft
-
-
-
39
-
-
84887878740
-
-
Microsoft (2003) Enterprise Solution Patterns Using Microsoft. Net. Microsoft Corp.: http://msdn. microsoft.com/library/default.asp?url=/library/en- us/dnpatterns/html/Esp.asp.
-
Net. Microsoft Corp.
-
-
-
40
-
-
35048859740
-
Secure system architecture based on dynamic resource reallocation
-
Chae K and Yung M eds, Springer
-
Min BJ, Kim SK, and Choi J-S (2003) Secure System Architecture Based on Dynamic Resource Reallocation. In: Chae K and Yung M (eds) Information Security Applications, 4th International Workshop, WISA 2003. Springer. p. 174-187.
-
(2003)
Information Security Applications, 4th International Workshop, WISA 2003
, pp. 174-187
-
-
Min, B.J.1
Kim, S.K.2
Choi, J.-S.3
-
42
-
-
10044293457
-
Comparing passwords, tokens, and biometrics for user authentication
-
O'Gorman L, Comparing Passwords, Tokens, and Biometrics for User Authentication. Proceedings of the IEEE, 2003. 91 (12).
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.12
-
-
O'Gorman, L.1
-
44
-
-
84994391858
-
Role-based access control on the web
-
Park JS, Sandhu R, and Ahn G-J, Role-Based Access Control on the Web. ACM Transactions on information and system security, 2001. 4(1): p. 37-71.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.1
, pp. 37-71
-
-
Park, J.S.1
Sandhu, R.2
Ahn, G.-J.3
-
49
-
-
0016081584
-
Protection and the control of information sharing in multics
-
Saltzer JH, Protection and the Control of Information Sharing in Multics. Communications of the ACM, 1974. 17(7): p. 388-402.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
, pp. 388-402
-
-
Saltzer, J.H.1
-
51
-
-
0038601427
-
Patterns, frameworks, and middleware: Their synergistic relationships
-
IEEE Computer Society
-
Schmidt DC and Buschmann F (2003) Patterns, Frameworks, and Middleware: Their Synergistic Relationships. In: International conference on software engineering. IEEE Computer Society. p. 694-704.
-
(2003)
International Conference on Software Engineering
, pp. 694-704
-
-
Schmidt, D.C.1
Buschmann, F.2
-
52
-
-
0033489648
-
Security architecture-based system design
-
ACM Press
-
Schneider EA (1999) Security Architecture-Based System Design. In: New security paradigms workshop. ACM Press. p. 25-31.
-
(1999)
New Security Paradigms Workshop
, pp. 25-31
-
-
Schneider, E.A.1
-
54
-
-
33746064515
-
Security engineering with patterns: Origins, theoretical model, and new applications
-
Springer Verlag
-
Shumacher M, ed. Security Engineering with Patterns: Origins, Theoretical Model, and New Applications (2003). Lecture Notes in Computer Science. Vol. 2754. Springer Verlag pp.
-
(2003)
Lecture Notes in Computer Science
, vol.2754
-
-
Shumacher, M.1
-
55
-
-
3042740017
-
Humans in the loop: Human-computer interaction and security
-
Smith SW, Humans in the Loop: Human-Computer Interaction and Security. IEEE Security & privacy, 2003. 1(3): p. 75-79.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.3
, pp. 75-79
-
-
Smith, S.W.1
-
57
-
-
21644486638
-
Security is harder than you think
-
Viega J and Messier M, Security Is Harder Than You Think, in ACM Queue. 2004. p. 60-65.
-
(2004)
ACM Queue
, pp. 60-65
-
-
Viega, J.1
Messier, M.2
-
60
-
-
0032099518
-
Security control for cots components
-
Zhong Q and Edwards N, Security Control for Cots Components. IEEE computer, 1998. 31(6): p. 67-73.
-
(1998)
IEEE Computer
, vol.31
, Issue.6
, pp. 67-73
-
-
Zhong, Q.1
Edwards, N.2
-
62
-
-
84936873422
-
Model-based risk assessment to improve enterprise security
-
Aagedal JØ, Braber Fd, Dimitrakos T, Gran BA, Raptis D, and Stølen K (2002) Model-Based Risk Assessment to Improve Enterprise Security. In: Sixth International Enterprise Distributed Object Computing Conference (EDOC'02). p. 51-62.
-
(2002)
Sixth International Enterprise Distributed Object Computing Conference (EDOC'02)
, pp. 51-62
-
-
Aagedal, J.Ø.1
De Braber, F.2
Dimitrakos, T.3
Gran, B.A.4
Raptis, D.5
Stølen, K.6
|