-
7
-
-
84885676902
-
Contributions méthodologiques pour l'amélioration de l'analyse des risques
-
Ebrahimi, T., Leprévost, F., Warusfel, B., eds Hermes
-
Dubois, E., Mayer, N., Rifaut, A., Rosener, V.: Contributions méthodologiques pour l'amélioration de l'analyse des risques. In Ebrahimi, T., Leprévost, F., Warusfel, B., eds.: Enjeux de la sécurité multimédia (Traité IC2, série Informatique et systèmes d'information). Hermes (2006) 79-131
-
(2006)
Enjeux de la Sécurité Multimédia (Traité IC2, Série Informatique et Systèmes d'Information)
, pp. 79-131
-
-
Dubois, E.1
Mayer, N.2
Rifaut, A.3
Rosener, V.4
-
8
-
-
45849131284
-
Design of a modelling language for information system security risk management
-
Ouarzazate, Morocco
-
Mayer, N., Heymans, P., Matulevičius, R.: Design of a modelling language for information system security risk management. In: Proceedings of the 1st International Conference on Research Challenges in Information Science (RCIS '07), Ouarzazate, Morocco (2007) 121-132
-
(2007)
Proceedings of the 1st International Conference on Research Challenges in Information Science (RCIS '07)
, pp. 121-132
-
-
Mayer, N.1
Heymans, P.2
Matulevičius, R.3
-
9
-
-
45849117958
-
Alignment of misuse cases with security risk management
-
IEEE Computer Society
-
Matulevičius, R., Mayer, N., Heymans, P.: Alignment of Misuse Cases with security risk management. In: Proceedings of the 3rd International Conference on Availability, Security and Reliability (ARES '08), Symposium on Requirements Engineering for Information Security (SREIS '08). IEEE Computer Society (2008) 1397-1404
-
(2008)
Proceedings of the 3rd International Conference on Availability, Security and Reliability (ARES '08), Symposium on Requirements Engineering for Information Security (SREIS '08)
, pp. 1397-1404
-
-
Matulevičius, R.1
Mayer, N.2
Heymans, P.3
-
10
-
-
77950516944
-
Adapting secure tropos for security risk management during early phases of the information systems development
-
Springer
-
Matulevičius, R., Mayer, N., Mouratidis, H., Dubois, E., Heymans, P., Genon, N.: Adapting Secure Tropos for security risk management during early phases of the information systems development. In: Proceedings of the 20th International Conference on Advanced Information Systems Engineering (CAiSE '08). Springer (2008)
-
(2008)
Proceedings of the 20th International Conference on Advanced Information Systems Engineering (CAiSE '08)
-
-
Matulevičius, R.1
Mayer, N.2
Mouratidis, H.3
Dubois, E.4
Heymans, P.5
Genon, N.6
-
11
-
-
0003219646
-
The goal question metric approach
-
John Wiley & Sons, Inc.
-
Basili, V.R., Caldiera, G., Rombach, H.D.: The goal question metric approach. In: Encyclopedia of Software Engineering. John Wiley & Sons, Inc. (1994) 532-538
-
(1994)
Encyclopedia of Software Engineering
, pp. 532-538
-
-
Basili, V.R.1
Caldiera, G.2
Rombach, H.D.3
-
13
-
-
79958125759
-
-
National Institute of Standards and Technology, Gaithersburg
-
Stoneburner, G., Goguen, A., Feringa, A.: NIST Special Publication 800-30: Risk Management Guide for Information Technology Systems. National Institute of Standards and Technology, Gaithersburg (2002)
-
(2002)
NIST Special Publication 800-30: Risk Management Guide for Information Technology Systems
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
15
-
-
77950516725
-
Assessing enterprise risk level: The CORAS approach
-
Khadraoui, D., Herrmann, F., eds Idea group
-
Vraalsen, F., Mahler, T., Lund, M.S., Hogganvik, I., den Braber, F., Stølen, K.: Assessing enterprise risk level: The CORAS approach. In Khadraoui, D., Herrmann, F., eds.: Advances in Enterprise Information Technology Security. Idea group (2007) 311-333
-
(2007)
Advances in Enterprise Information Technology Security
, pp. 311-333
-
-
Vraalsen, F.1
Mahler, T.2
Lund, M.S.3
Hogganvik, I.4
Den Braber, F.5
Stølen, K.6
-
16
-
-
84885591035
-
-
Information Systems Audit and Control Association
-
ISACA: CISA Review Manual 2006. Information Systems Audit and Control Association (2006)
-
(2006)
ISACA: Cisa Review Manual 2006
-
-
-
18
-
-
33750953854
-
Return on security investment (ROSI): A practical quantitative model
-
Fernández-Medina, E., Castro, J.C.H., Castro, L.J.G., eds INSTICC Press
-
Sonnenreich, W., Albanese, J., Stout, B.: Return on security investment (ROSI): A practical quantitative model. In Fernández-Medina, E., Castro, J.C.H., Castro, L.J.G., eds.: WOSIS, INSTICC Press (2005) 239-252
-
(2005)
WOSIS
, pp. 239-252
-
-
Sonnenreich, W.1
Albanese, J.2
Stout, B.3
-
20
-
-
84885628277
-
Information system security risk management metrics definition
-
Mayer, N.: Information system security risk management metrics definition, http://www.nmayer.eu/publis/ISSRMmetrics-TR-11-06.pdf. Technical report, CRP Henri Tudor (2008)
-
(2008)
Technical Report, CRP Henri Tudor
-
-
Mayer, N.1
-
22
-
-
27144534308
-
Cost-benefit trade-off analysis using BBN for aspect-oriented risk-driven development
-
Shangai, IEEE Computer Society
-
Houmb, S.H., Georg, G., France, R., Bieman, J., Jürjens, J.: Cost-benefit trade-off analysis using BBN for aspect-oriented risk-driven development. In: Proceedings of the 10th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'05), Shangai, IEEE Computer Society (2005) 195-204
-
(2005)
Proceedings of the 10th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'05)
, pp. 195-204
-
-
Houmb, S.H.1
Georg, G.2
France, R.3
Bieman, J.4
Jürjens, J.5
|