-
2
-
-
77950210156
-
SOABSE: An approach to realizing business-oriented security requirements with Web Service security policies
-
Phan, T., Han, J., et al.: SOABSE: An approach to realizing business-oriented security requirements with Web Service security policies. In: Proc. Int. Conf. on Service-Oriented Computing and Applications, Taipei, Taiwan, pp. 1-10 (2009)
-
(2009)
Proc. Int. Conf. on Service-Oriented Computing and Applications, Taipei, Taiwan
, pp. 1-10
-
-
Phan, T.1
Han, J.2
-
3
-
-
84944220091
-
Towards Development of Secure Systems Using UMLsec
-
Hussmann, H. (ed.) FASE 2001. Springer, Heidelberg
-
Jürjens, J.: Towards Development of Secure Systems Using UMLsec. In: Hussmann, H. (ed.) FASE 2001. LNCS, vol. 2029, pp. 187-200. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2029
, pp. 187-200
-
-
Jürjens, J.1
-
4
-
-
77954504239
-
From goal-driven security requirements engineering to secure design
-
Mouratidis, H., Jurjens, J.: From goal-driven security requirements engineering to secure design. Int. Journal of Intelligent Systems 25, 813-840 (2010)
-
(2010)
Int. Journal of Intelligent Systems
, vol.25
, pp. 813-840
-
-
Mouratidis, H.1
Jurjens, J.2
-
6
-
-
84871387200
-
Pre-patched software
-
Guo, J., Yuan, J., Johnson, R.: Pre-patched software. In: Proc. 4th USENIX Conf. on Hot Topics in Security, Canada, p. 6 (2009)
-
(2009)
Proc. 4th USENIX Conf. on Hot Topics in Security, Canada
, pp. 6
-
-
Guo, J.1
Yuan, J.2
Johnson, R.3
-
7
-
-
70350303567
-
Taming Dynamically Adaptive Systems using models and aspects
-
Morin, B., Barais, O., et al.: Taming Dynamically Adaptive Systems using models and aspects. In: Proc. 31st IEEE Int. Conf. on Software Engineering, Vancouver, BC, pp. 122-132 (2009)
-
(2009)
Proc. 31st IEEE Int. Conf. on Software Engineering, Vancouver, BC
, pp. 122-132
-
-
Morin, B.1
Barais, O.2
-
8
-
-
56649117258
-
A Model-Based Framework for Security Policy Specification, Deployment and Testing
-
Czarnecki, K., Ober, I., Bruel, J.-M., Uhl, A., Völter, M. (eds.) MODELS 2008. Springer, Heidelberg
-
Mouelhi, T., Fleurey, F., Baudry, B., Le Traon, Y.: A Model-Based Framework for Security Policy Specification, Deployment and Testing. In: Czarnecki, K., Ober, I., Bruel, J.-M., Uhl, A., Völter, M. (eds.) MODELS 2008. LNCS, vol. 5301, pp. 537-552. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5301
, pp. 537-552
-
-
Mouelhi, T.1
Fleurey, F.2
Baudry, B.3
Le Traon, Y.4
-
9
-
-
73149108190
-
SeAAS - A Reference Architecture for Security Services in SOA
-
Hafner, M., Memon, M., et al.: SeAAS - A Reference Architecture for Security Services in SOA. Journal of Universal Computer Science 15, 2916-2936 (2009)
-
(2009)
Journal of Universal Computer Science
, vol.15
, pp. 2916-2936
-
-
Hafner, M.1
Memon, M.2
-
10
-
-
78649790488
-
Security-driven model-based dynamic adaptation
-
Morin, B., Mouelhi, T., et al.: Security-driven model-based dynamic adaptation. In: Proc. 25th Int. Conf. on Automated Software Engineering, Belgium, pp. 205-214 (2010)
-
(2010)
Proc. 25th Int. Conf. on Automated Software Engineering, Belgium
, pp. 205-214
-
-
Morin, B.1
Mouelhi, T.2
-
11
-
-
17744386105
-
System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering
-
Lamsweerde, A., Brohez, S., et al.: System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering. In: Proc. RE 2003 Workshop on Requirements for High Assurance Systems, Monterey, pp. 49-56 (2003)
-
(2003)
Proc. RE 2003 Workshop on Requirements for High Assurance Systems, Monterey
, pp. 49-56
-
-
Lamsweerde, A.1
Brohez, S.2
-
12
-
-
84860672038
-
Secure!'*: Engineering Secure Software Systems through Social Analysis
-
Liu, L., Eric, S., et al.: Secure!'*: Engineering Secure Software Systems through Social Analysis. Int. Journal of Software and Informatics 3, 89-120 (2009)
-
(2009)
Int. Journal of Software and Informatics
, vol.3
, pp. 89-120
-
-
Liu, L.1
Eric, S.2
-
14
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre, G., Opdahl, A.: Eliciting security requirements with misuse cases. Journal RE 10, 34-44 (2005)
-
(2005)
Journal RE
, vol.10
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.2
-
15
-
-
79955143136
-
SecureUML: A UML-Based Modeling Language for Model-Driven Security
-
Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. Springer, Heidelberg
-
Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426-441. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
16
-
-
84866913797
-
Supporting Automated Vulnerability Analysis using Formalized Vulnerability Signatures
-
Almorsy, M., Grundy, J., Ibrahim, A.S.: Supporting Automated Vulnerability Analysis using Formalized Vulnerability Signatures. In: Proc. 27th Int. Conf. on Automated Software Engineering, Essen, Germany (2012)
-
Proc. 27th Int. Conf. on Automated Software Engineering, Essen, Germany (2012)
-
-
Almorsy, M.1
Grundy, J.2
Ibrahim, A.S.3
-
17
-
-
84866948395
-
Supporting Automated Software Re-Engineering Using Re-Aspects
-
Almorsy, M., Grundy, J., Ibrahim, A.S.: Supporting Automated Software Re-Engineering Using Re-Aspects. In: Proc. 27th Int. Conf. on Automated Software Engineering, Essen, Germany (2012)
-
Proc. 27th Int. Conf. on Automated Software Engineering, Essen, Germany (2012)
-
-
Almorsy, M.1
Grundy, J.2
Ibrahim, A.S.3
|