-
1
-
-
79957635330
-
Integration of component fault trees into the UML
-
Dingel, J.; Solberg, A. (Eds.) Springer, Berlin/Heidelberg
-
Adler, R.; Domis, D.; Hfig, K.; Kemmann, S.; Kuhn, T.; Schwinn, J.P.; Trapp, M.; 2011. Integration of component fault trees into the UML. In: Dingel, J.; Solberg, A. (Eds.), Models in Software Engineering. Lecture Notes in Computer Science, vol. 6627. Springer, Berlin/Heidelberg, pp. 312-327.
-
(2011)
Models in Software Engineering. Lecture Notes in Computer Science
, vol.6627
, pp. 312-327
-
-
Adler, R.1
Domis, D.2
Hfig, K.3
Kemmann, S.4
Kuhn, T.5
Schwinn, J.P.6
Trapp, M.7
-
6
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
A. Avizienis, J.C. Laprie, B. Randell, and C. Landwehr Basic concepts and taxonomy of dependable and secure computing IEEE Trans Dependable Secur Comput 1 1 2004 11 33
-
(2004)
IEEE Trans Dependable Secur Comput
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.C.2
Randell, B.3
Landwehr, C.4
-
7
-
-
73549123101
-
Software & systems requirements engineering
-
1st ed. McGraw-Hill, Inc. New York, NY, USA
-
B. Berenbach, D. Paulish, J. Kazmeier, and A. Rudorfer Software & systems requirements engineering Practice 1st ed. 2009 McGraw-Hill, Inc. New York, NY, USA
-
(2009)
Practice
-
-
Berenbach, B.1
Paulish, D.2
Kazmeier, J.3
Rudorfer, A.4
-
8
-
-
79952012221
-
Systems engineering and safety - A framework
-
D. Black, M. Hull, and K. Jackson Systems engineering and safety - a framework Software, IET 5 1 2011 43 53
-
(2011)
Software, IET
, vol.5
, Issue.1
, pp. 43-53
-
-
Black, D.1
Hull, M.2
Jackson, K.3
-
9
-
-
3142750497
-
Tropos: An agent-oriented software development methodology
-
10.1023/B:AGNT.0000018806.20944.ef
-
P. Bresciani, A. Perini, P. Giorgini, F. Giunchiglia, and J. Mylopoulos Tropos: an agent-oriented software development methodology Autonomous Agents and Multi-Agent Systems 8 2004 203 236 10.1023/B:AGNT.0000018806.20944.ef
-
(2004)
Autonomous Agents and Multi-Agent Systems
, vol.8
, pp. 203-236
-
-
Bresciani, P.1
Perini, A.2
Giorgini, P.3
Giunchiglia, F.4
Mylopoulos, J.5
-
12
-
-
79952002261
-
A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
-
doi:10.1007/s00766-010-0115-7
-
M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements Requirements Engineering 16 2011 3 32 doi:10.1007/s00766-010-0115- 7
-
(2011)
Requirements Engineering
, vol.16
, pp. 3-32
-
-
Deng, M.1
Wuyts, K.2
Scandariato, R.3
Preneel, B.4
Joosen, W.5
-
13
-
-
71749096757
-
Hazard and operability (hazop) analysis a literature review
-
J. Dunj, V. Fthenakis, J.A. Vlchez, and J. Arnaldos Hazard and operability (hazop) analysis a literature review Journal of Hazardous Materials 173 1-3 2010 19 32
-
(2010)
Journal of Hazardous Materials
, vol.173
, Issue.13
, pp. 19-32
-
-
Dunj, J.1
Fthenakis, V.2
Vlchez, J.A.3
Arnaldos, J.4
-
14
-
-
84355162916
-
Towards developing consistent misuse case models
-
Special issue with selected papers from the 23rd Brazilian Symposium on Software Engineering
-
M. El-Attar Towards developing consistent misuse case models Journal of Systems and Software 85 2 2012 323 339 Special issue with selected papers from the 23rd Brazilian Symposium on Software Engineering
-
(2012)
Journal of Systems and Software
, vol.85
, Issue.2
, pp. 323-339
-
-
El-Attar, M.1
-
17
-
-
77950536938
-
A comparison of security requirements engineering methods
-
B. Fabian, S. Grses, M. Heisel, T. Santen, and H. Schmidt A comparison of security requirements engineering methods Requirements Engineering 15 2010 7 40
-
(2010)
Requirements Engineering
, vol.15
, pp. 7-40
-
-
Fabian, B.1
Grses, S.2
Heisel, M.3
Santen, T.4
Schmidt, H.5
-
20
-
-
67349162622
-
Integrating cyber attacks within fault trees
-
The 18th European Safety and Reliability Conference, ESREL 2007
-
I.N. Fovino, M. Masera, and A.D. Cian Integrating cyber attacks within fault trees Reliability Engineering and System Safety 94 9 2009 1394 1402 The 18th European Safety and Reliability Conference, ESREL 2007
-
(2009)
Reliability Engineering and System Safety
, vol.94
, Issue.9
, pp. 1394-1402
-
-
Fovino, I.N.1
Masera, M.2
Cian, A.D.3
-
22
-
-
79951902650
-
Experience with model-based user-centered risk assessment for service robots
-
IEEE Computer Society, Washington, DC, USA
-
J. Guiochet, D. Martin-Guillerez, and D. Powell Experience with model-based user-centered risk assessment for service robots Proceedings of the 2010 IEEE 12th International Symposium on High-Assurance Systems Engineering, HASE'10 IEEE Computer Society, Washington, DC, USA 2010 104 113
-
(2010)
Proceedings of the 2010 IEEE 12th International Symposium on High-Assurance Systems Engineering, HASE'10
, pp. 104-113
-
-
Guiochet, J.1
Martin-Guillerez, D.2
Powell, D.3
-
23
-
-
78650760435
-
Integrating formal analysis and design to preserve security properties
-
R. Hassan, S. Bohner, S. El-Kassas, and M. Hinchey Integrating formal analysis and design to preserve security properties 42nd Hawaii International Conference on System Sciences, HICSS '09 2009 1 10
-
(2009)
42nd Hawaii International Conference on System Sciences, HICSS '09
, pp. 1-10
-
-
Hassan, R.1
Bohner, S.2
El-Kassas, S.3
Hinchey, M.4
-
24
-
-
78650895550
-
Failure mode and effect analysis based on electric and electronic architectures of vehicles to support the safety lifecycle ISO/DIS 26262
-
M. Hillenbrand, M. Heinz, N. Adler, J. Matheis, and K. Muller-Glaser Failure mode and effect analysis based on electric and electronic architectures of vehicles to support the safety lifecycle ISO/DIS 26262 21st IEEE International Symposium on Rapid System Prototyping (RSP) 2010 1 7
-
(2010)
21st IEEE International Symposium on Rapid System Prototyping (RSP)
, pp. 1-7
-
-
Hillenbrand, M.1
Heinz, M.2
Adler, N.3
Matheis, J.4
Muller-Glaser, K.5
-
26
-
-
27744602163
-
-
Technical Report. United States Federal Aviation Administration
-
Ibrahim, L.; Jarzombek, J.; Ashford, M.; Bate, R.; Croll, P.; Horn, M.; LaBruyere, L.; Wells, C.; 2004. Safety and Security Extensions for Integrated Capability Maturity Models. Technical Report. United States Federal Aviation Administration.
-
(2004)
Safety and Security Extensions for Integrated Capability Maturity Models
-
-
Ibrahim, L.1
Jarzombek, J.2
Ashford, M.3
Bate, R.4
Croll, P.5
Horn, M.6
Labruyere, L.7
Wells, C.8
-
28
-
-
84875278431
-
-
IEC 61025 Fault tree analysis (FTA). International Electrotechnical Commission, 2nd ed
-
IEC 61025, 2006. Fault tree analysis (FTA). International Electrotechnical Commission, 2nd ed.
-
(2006)
-
-
-
30
-
-
84875233443
-
-
IEC 62502, 2010. Analysis techniques for dependability - event tree analysis (ETA). International Electrotechnical Commission, 1st ed
-
IEC 62502, 2010. Analysis techniques for dependability - event tree analysis (ETA). International Electrotechnical Commission, 1st ed.
-
-
-
-
31
-
-
84875252517
-
-
ISO27002:2005, 2005. Information Technology-security techniques-code of practice for information security management
-
ISO27002:2005, 2005. Information Technology-security techniques-code of practice for information security management.
-
-
-
-
32
-
-
84875241611
-
-
ISO73:2009, 2009. Risk management-vocabulary
-
ISO73:2009, 2009. Risk management-vocabulary.
-
-
-
-
33
-
-
28044436975
-
Problem frames and software engineering
-
Special Issue on Problem Frames
-
M. Jackson Problem frames and software engineering Information and Software Technology 47 14 2005 903 912 Special Issue on Problem Frames
-
(2005)
Information and Software Technology
, vol.47
, Issue.14
, pp. 903-912
-
-
Jackson, M.1
-
34
-
-
84862154113
-
Hazard analysis and risk assessment in the development of biomedical drug formulation equipment
-
doi:10.1007/s10439-011-0451-x
-
D. Johnson, M. Bidez, and L. DeLucas Hazard analysis and risk assessment in the development of biomedical drug formulation equipment Annals of Biomedical Engineering 40 2012 898 906 doi:10.1007/s10439-011-0451-x
-
(2012)
Annals of Biomedical Engineering
, vol.40
, pp. 898-906
-
-
Johnson, D.1
Bidez, M.2
Delucas, L.3
-
35
-
-
77956604734
-
Integrating system modelling with safety activities
-
E. Schoitsch, Springer Berlin/Heidelberg volume 6351 of Lecture Notes in Computer Science
-
B. Kaiser, V. Klaas, S. Schulz, C. Herbst, and P. Lascych Integrating system modelling with safety activities E. Schoitsch, Computer Safety, Reliability, and Security 2010 Springer Berlin/Heidelberg 452 465 volume 6351 of Lecture Notes in Computer Science
-
(2010)
Computer Safety, Reliability, and Security
, pp. 452-465
-
-
Kaiser, B.1
Klaas, V.2
Schulz, S.3
Herbst, C.4
Lascych, P.5
-
36
-
-
0003512056
-
-
Technical Report; Software Engineering Institute, Carnegie Mellon University, defense Technical Information Center OAI-PMH Repository
-
Kang, K.; Cohen, S.; Hess, J.; Novak, W.; Peterson, A.S.; 1990. Feature-oriented Domain Analysis (FODA) Feasibility Study. Technical Report; Software Engineering Institute, Carnegie Mellon University, defense Technical Information Center OAI-PMH Repository.
-
(1990)
Feature-oriented Domain Analysis (FODA) Feasibility Study
-
-
Kang, K.1
Cohen, S.2
Hess, J.3
Novak, W.4
Peterson, A.S.5
-
38
-
-
27644567603
-
-
Technical Report Joint Technical Report Keele University Technical Report TR/SE-0401 and NICTA Technical Report 0400011T.1. Software Engineering Group Department of Computer Science Keele University and Empirical Software Engineering National ICT Australia Ltd
-
Kitchenham, B.; 2004. Procedures for Performing Systematic Reviews. Technical Report Joint Technical Report Keele University Technical Report TR/SE-0401 and NICTA Technical Report 0400011T.1. Software Engineering Group Department of Computer Science Keele University and Empirical Software Engineering National ICT Australia Ltd.
-
(2004)
Procedures for Performing Systematic Reviews
-
-
Kitchenham, B.1
-
39
-
-
79952577498
-
Foundations of attackdefense trees
-
P. Degano, S. Etalle, J. Guttman, Springer Berlin/Heidelberg volume 6561 of Lecture Notes in Computer Science
-
B. Kordy, S. Mauw, S. Radomirovic, and P. Schweitzer Foundations of attackdefense trees P. Degano, S. Etalle, J. Guttman, Formal Aspects of Security and Trust 2011 Springer Berlin/Heidelberg 80 95 volume 6561 of Lecture Notes in Computer Science
-
(2011)
Formal Aspects of Security and Trust
, pp. 80-95
-
-
Kordy, B.1
Mauw, S.2
Radomirovic, S.3
Schweitzer, P.4
-
40
-
-
4544255381
-
Elaborating security requirements by construction of intentional anti-models
-
IEEE Computer Society, ICSE '04, Washington, DC, USA
-
A. van Lamsweerde Elaborating security requirements by construction of intentional anti-models Proceedings of the 26th International Conference on Software Engineering IEEE Computer Society, ICSE '04, Washington, DC, USA 2004 148 157
-
(2004)
Proceedings of the 26th International Conference on Software Engineering
, pp. 148-157
-
-
Van Lamsweerde, A.1
-
42
-
-
84857334492
-
Fault tree synthesis from UML models for reliability analysis at early design stages
-
C. Lauer, R. German, and J. Pollmer Fault tree synthesis from UML models for reliability analysis at early design stages SIGSOFT Softw Eng Notes 36 1 2011 1 8
-
(2011)
SIGSOFT Softw Eng Notes
, vol.36
, Issue.1
, pp. 1-8
-
-
Lauer, C.1
German, R.2
Pollmer, J.3
-
43
-
-
84857369483
-
Task descriptions versus use cases
-
10.1007/s00766-011-0140-1
-
S. Lauesen, and M. Kuhail Task descriptions versus use cases Requirements Engineering 17 2012 3 18 10.1007/s00766-011-0140-1
-
(2012)
Requirements Engineering
, vol.17
, pp. 3-18
-
-
Lauesen, S.1
Kuhail, M.2
-
44
-
-
83755171647
-
Safety requirements analysis for control law development of UAV flight control systems
-
The 2nd International Symposium on Aircraft Airworthiness
-
G. Lei, and Z. Shuguang Safety requirements analysis for control law development of UAV flight control systems Procedia Engineering 17 0 2011 505 514 The 2nd International Symposium on Aircraft Airworthiness
-
(2011)
Procedia Engineering
, vol.17
, Issue.0
, pp. 505-514
-
-
Lei, G.1
Shuguang, Z.2
-
45
-
-
0038349056
-
Deriving operational software specifications from system goals
-
E. Letier, and A. van Lamsweerde Deriving operational software specifications from system goals SIGSOFT Softw Eng Notes 27 6 2002 119 128
-
(2002)
SIGSOFT Softw Eng Notes
, vol.27
, Issue.6
, pp. 119-128
-
-
Letier, E.1
Van Lamsweerde, A.2
-
46
-
-
84942929509
-
Introducing abuse frames for analysing security requirements
-
L. Lin, B. Nuseibeh, D. Ince, M. Jackson, and J. Moffett Introducing abuse frames for analysing security requirements Proceedings. 11th IEEE International Requirements Engineering Conference 2003 371 372
-
(2003)
Proceedings. 11th IEEE International Requirements Engineering Conference
, pp. 371-372
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
Moffett, J.5
-
47
-
-
17044370046
-
-
Technical Report 2003/10. Department of Computing, Faculty of Mathematics and Computing, The Open University; Walton Hall, Milton Keynes, MK7 6AA, United Kingdom
-
Lin, L.; Nuseibeh, B.A.; Ince, D.C.; Jackson, M.; Moffett, J.D.; 2003. Analysing Security Threats and Vulnerabilities Using Abuse Frames. Technical Report 2003/10. Department of Computing, Faculty of Mathematics and Computing, The Open University; Walton Hall, Milton Keynes, MK7 6AA, United Kingdom.
-
(2003)
Analysing Security Threats and Vulnerabilities Using Abuse Frames
-
-
Lin, L.1
Nuseibeh, B.A.2
Ince, D.C.3
Jackson, M.4
Moffett, J.D.5
-
49
-
-
80053016464
-
Computer-aided PHA, FTA and FMEA for automotive embedded systems
-
F. Flammini, S. Bologna, V. Vittorini, Springer Berlin/Heidelberg volume 6894 of Lecture Notes in Computer Science
-
R. Mader, E. Armengaud, A. Leitner, C. Kreiner, Q. Bourrouilh, G. Grienig, C. Steger, and R. Wei Computer-aided PHA, FTA and FMEA for automotive embedded systems F. Flammini, S. Bologna, V. Vittorini, Computer Safety, Reliability, and Security 2011 Springer Berlin/Heidelberg 113 127 volume 6894 of Lecture Notes in Computer Science
-
(2011)
Computer Safety, Reliability, and Security
, pp. 113-127
-
-
Mader, R.1
Armengaud, E.2
Leitner, A.3
Kreiner, C.4
Bourrouilh, Q.5
Grienig, G.6
Steger, C.7
Wei, R.8
-
50
-
-
80051981496
-
A computer-aided approach to preliminary hazard analysis for automotive embedded systems
-
R. Mader, G. Griessnig, A. Leitner, C. Kreiner, Q. Bourrouilh, E. Armengaud, C. Steger, and R. Weiss A computer-aided approach to preliminary hazard analysis for automotive embedded systems 18th IEEE International Conference and Workshops on Engineering of Computer Based Systems (ECBS) 2011 169 178
-
(2011)
18th IEEE International Conference and Workshops on Engineering of Computer Based Systems (ECBS)
, pp. 169-178
-
-
Mader, R.1
Griessnig, G.2
Leitner, A.3
Kreiner, C.4
Bourrouilh, Q.5
Armengaud, E.6
Steger, C.7
Weiss, R.8
-
53
-
-
79953033529
-
Secure software systems engineering: The secure tropos approach
-
H. Mouratidis Secure software systems engineering: the secure tropos approach Journal of Software 6 2011 331 339
-
(2011)
Journal of Software
, vol.6
, pp. 331-339
-
-
Mouratidis, H.1
-
55
-
-
70450206834
-
Enhancing secure tropos to effectively deal with security requirements in the development of multiagent systems
-
M. Barley, H. Mouratidis, A. Unruh, D. Spears, P. Scerri, F. Massacci, Springer Berlin/Heidelberg volume 4324 of Lecture Notes in Computer Science
-
H. Mouratidis, and P. Giorgini Enhancing secure tropos to effectively deal with security requirements in the development of multiagent systems M. Barley, H. Mouratidis, A. Unruh, D. Spears, P. Scerri, F. Massacci, Safety and Security in Multiagent Systems 2009 Springer Berlin/Heidelberg 8 26 volume 4324 of Lecture Notes in Computer Science
-
(2009)
Safety and Security in Multiagent Systems
, pp. 8-26
-
-
Mouratidis, H.1
Giorgini, P.2
-
57
-
-
85023009798
-
Requirements engineering: A roadmap
-
ACM, ICSE, New York, NY, USA
-
B. Nuseibeh, and S. Easterbrook Requirements engineering: a roadmap Proceedings of the Conference on The Future of Software Engineering ACM, ICSE, New York, NY, USA 2000 35 46
-
(2000)
Proceedings of the Conference on the Future of Software Engineering
, pp. 35-46
-
-
Nuseibeh, B.1
Easterbrook, S.2
-
59
-
-
84875260999
-
The integration of safety and security requirements
-
K. Kanoun, Springer Berlin/Heidelberg Volume 1698 of Lecture Notes in Computer Science
-
A. Pasquini, D. Eames, and J. Moffett The integration of safety and security requirements K. Kanoun, Computer Safety, Reliability and Security 1999 Springer Berlin/Heidelberg 685 Volume 1698 of Lecture Notes in Computer Science
-
(1999)
Computer Safety, Reliability and Security
, pp. 685
-
-
Pasquini, A.1
Eames, D.2
Moffett, J.3
-
60
-
-
78751538732
-
Modeling safety and security interdepedencies with BDMP (Boolean logic Driven Markov Processes)
-
Istanbul, Turkey
-
L. Piètre-Cambacédès, and M. Bouissou Modeling safety and security interdepedencies with BDMP (Boolean logic Driven Markov Processes) Proceeding of the 2010 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2010) Istanbul, Turkey 2010 2852 2861
-
(2010)
Proceeding of the 2010 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2010)
, pp. 2852-2861
-
-
Piètre-Cambacédès, L.1
Bouissou, M.2
-
62
-
-
84875257514
-
The SEMA referential framework: Avoiding ambiguities when dealing with security and safety issues
-
Washington, DC, USA Not included in the conference proceedings (selected for publication in IJCIP)
-
Piètre-Cambacédès L.; Chaudet C. The SEMA referential framework: avoiding ambiguities when dealing with security and safety issues. In: 4th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection (CIP 2010). Washington, DC, USA Not included in the conference proceedings (selected for publication in IJCIP).
-
4th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection (CIP 2010)
-
-
Piètre-Cambacédès, L.1
Chaudet, C.2
-
64
-
-
84864207296
-
A combined process for elicitation and analysis of safety and security requirements
-
I. Bider, T. Halpin, J. Krogstie, S. Nurcan, E. Proper, R. Schmidt, P. Soffer, S. Wrycza, W. Aalst, J. Mylopoulos, M. Rosemann, M.J. Shaw, C. Szyperski, W. Aalst, J. Mylopoulos, M. Rosemann, M.J. Shaw, C. Szyperski, Springer Berlin/Heidelberg Volume 113 of Lecture Notes in Business Information Processing
-
C. Raspotnig, P. Karpati, and V. Katta A combined process for elicitation and analysis of safety and security requirements I. Bider, T. Halpin, J. Krogstie, S. Nurcan, E. Proper, R. Schmidt, P. Soffer, S. Wrycza, W. Aalst, J. Mylopoulos, M. Rosemann, M.J. Shaw, C. Szyperski, W. Aalst, J. Mylopoulos, M. Rosemann, M.J. Shaw, C. Szyperski, Enterprise, Business-Process and Information Systems Modeling 2012 Springer Berlin/Heidelberg 347 361 Volume 113 of Lecture Notes in Business Information Processing
-
(2012)
Enterprise, Business-Process and Information Systems Modeling
, pp. 347-361
-
-
Raspotnig, C.1
Karpati, P.2
Katta, V.3
-
65
-
-
84875236223
-
-
Project report HWR-1002, revision 2; Halden Reactor Project; 2012. Internal report for HRP members until 2016
-
Raspotnig, C.; Katta, V.; Opdahl, A.L.; Stålhane, T 2012b. Towards Approaches for Analysis and Argumentation of Systems Safety and Security: Comparison of Techniques and Conceptual Model. Project report HWR-1002, revision 2; Halden Reactor Project; 2012. Internal report for HRP members until 2016.
-
(2012)
Towards Approaches for Analysis and Argumentation of Systems Safety and Security: Comparison of Techniques and Conceptual Model
-
-
Raspotnig, C.1
Katta, V.2
Opdahl, A.L.3
Stålhane, T.4
-
66
-
-
84858327591
-
Supporting failure mode and effect analysis: A case study with failure sequence diagrams
-
B. Regnell, D. Damian, Springer Berlin Heidelberg Volume 7195 of Lecture Notes in Computer Science
-
C. Raspotnig, and A. Opdahl Supporting failure mode and effect analysis: A case study with failure sequence diagrams B. Regnell, D. Damian, Requirements Engineering: Foundation for Software Quality 2012 Springer Berlin Heidelberg 117 131 Volume 7195 of Lecture Notes in Computer Science
-
(2012)
Requirements Engineering: Foundation for Software Quality
, pp. 117-131
-
-
Raspotnig, C.1
Opdahl, A.2
-
67
-
-
84864067797
-
A goal based methodology for hazop analysis
-
Symbio Community Forum and Harbin Engineering University
-
N. Rossing, M. Lind, N. Jensen, and S. Jrgensen A goal based methodology for hazop analysis Nuclear Safety and Simulation 1 2 2010 134 142 Symbio Community Forum and Harbin Engineering University
-
(2010)
Nuclear Safety and Simulation
, vol.1
, Issue.2
, pp. 134-142
-
-
Rossing, N.1
Lind, M.2
Jensen, N.3
Jrgensen, S.4
-
68
-
-
84878255698
-
Safety and security interdependencies in complex systems and SoS: Challenges and perspectives
-
O. Hammami, D. Krob, J.L. Voirin, Springer Berlin/Heidelberg
-
S. Sadvandi, N. Chapon, and L. Pitre-Cambacds Safety and security interdependencies in complex systems and SoS: challenges and perspectives O. Hammami, D. Krob, J.L. Voirin, Complex Systems Design and Management 2012 Springer Berlin/Heidelberg 229 241
-
(2012)
Complex Systems Design and Management
, pp. 229-241
-
-
Sadvandi, S.1
Chapon, N.2
Pitre-Cambacds, L.3
-
70
-
-
84858317718
-
-
SAM2004 Eurocontrol Safety Assessment Methodology Task Force, 2nd ed
-
SAM2004, 2004. Functional hazard assessment guidance material b1. Eurocontrol Safety Assessment Methodology Task Force, 2nd ed.
-
(2004)
Functional Hazard Assessment Guidance Material b1
-
-
-
71
-
-
56449123347
-
-
SAM2006 Eurocontrol Safety Assessment Methodology Task Force, 2nd ed
-
SAM2006, 2006. Air navigation safety assessment methodology. Eurocontrol Safety Assessment Methodology Task Force, 2nd ed.
-
(2006)
Air Navigation Safety Assessment Methodology
-
-
-
77
-
-
84875267907
-
Safety and security; Two sides of the same coin: Properties and relations? characteristics to refine? structure of terminology and its perception
-
L. Schnieder, E. Schnieder, and C. Stein Safety and security; two sides of the same coin: properties and relations? characteristics to refine? structure of terminology and its perception 5th Future Security Conference 2010
-
(2010)
5th Future Security Conference
-
-
Schnieder, L.1
Schnieder, E.2
Stein, C.3
-
78
-
-
38049047671
-
-
Ralyt'e9, J.; Brinkkemper, S.; Henderson-Sellers, B. (Eds.) Situational Method Engineering: Fundamentals and Experiences Springer Boston. volume 244 of IFIP International Federation for Information Processing
-
Sindre, G.; 2007. A look at misuse cases for safety concerns. In: Ralyt'e9, J.; Brinkkemper, S.; Henderson-Sellers, B. (Eds.). Situational Method Engineering: Fundamentals and Experiences. Springer Boston. volume 244 of IFIP International Federation for Information Processing, pp. 252-266.
-
(2007)
A look at misuse cases for safety concerns
, pp. 252-266
-
-
Sindre, G.1
-
79
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre, and A.L. Opdahl Eliciting security requirements with misuse cases Requirements Engineering 10 2005 34 44
-
(2005)
Requirements Engineering
, vol.10
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
81
-
-
35048899397
-
Effective security requirements analysis: Hazop and use cases
-
K. Zhang, Y. Zheng, Springer Berlin/Heidelberg Volume 3225 of Lecture Notes in Computer Science
-
T. Srivatanakul, J. Clark, and F. Polack Effective security requirements analysis: Hazop and use cases K. Zhang, Y. Zheng, Information Security 2004 Springer Berlin/Heidelberg 416 427 Volume 3225 of Lecture Notes in Computer Science
-
(2004)
Information Security
, pp. 416-427
-
-
Srivatanakul, T.1
Clark, J.2
Polack, F.3
-
84
-
-
70349294308
-
Security-aware software development life cycle (SaSDLC)-processes and tools
-
A. Talukder, V. Maurya, B. Santhosh, E. Jangam, S. Muni, K. Jevitha, S. Saurabh, and A. Pais Security-aware software development life cycle (SaSDLC)-processes and tools IFIP International Conference on Wireless and Optical Communications Networks, WOCN '09 2009 1 5
-
(2009)
IFIP International Conference on Wireless and Optical Communications Networks, WOCN '09
, pp. 1-5
-
-
Talukder, A.1
Maurya, V.2
Santhosh, B.3
Jangam, E.4
Muni, S.5
Jevitha, K.6
Saurabh, S.7
Pais, A.8
-
86
-
-
77957132657
-
An analysis of selected software safety standards
-
D. Wallace, D. Kuhn, and L. Ippolito An analysis of selected software safety standards Computer Assurance, 1992. COMPASS '92. Proceedings of the Seventh Annual Conference on 'Systems Integrity, Software Safety and Process Security: Building the System Right.' 1992 123 136
-
(1992)
Computer Assurance, 1992. COMPASS '92. Proceedings of the Seventh Annual Conference on 'Systems Integrity, Software Safety and Process Security: Building the System Right.'
, pp. 123-136
-
-
Wallace, D.1
Kuhn, D.2
Ippolito, L.3
-
87
-
-
84957036337
-
Security assessments of safety critical systems using HAZOPs
-
Springer-Verlag, London, UK
-
R. Winther, O.A. Johnsen, and B.A. Gran Security assessments of safety critical systems using HAZOPs Proceedings of the 20th International Conference on Computer Safety, Reliability and Security, SAFECOMP '01 Springer-Verlag, London, UK 2001 14 24
-
(2001)
Proceedings of the 20th International Conference on Computer Safety, Reliability and Security, SAFECOMP '01
, pp. 14-24
-
-
Winther, R.1
Johnsen, O.A.2
Gran, B.A.3
-
89
-
-
0003673547
-
-
4th ed. Volume 5 of Applied Social Research Methods Series. SAGE Publications
-
Yin, R.; 2008. Case Study Research: Design and Methods, 4th ed. Volume 5 of Applied Social Research Methods Series. SAGE Publications.
-
(2008)
Case Study Research: Design and Methods
-
-
Yin, R.1
|