-
3
-
-
0003669844
-
-
AS/NZS 4360, SAI Global
-
AS/NZS 4360 (2004) Risk management. SAI Global
-
(2004)
Risk Management
-
-
-
4
-
-
3142750497
-
TROPOS: An agentoriented software development methodology
-
Bresciani P, Giorgini P, Giunchiglia F, Mylopoulos J, Perin, A (2004) TROPOS: an agentoriented software development methodology. Autonomous Agents Multi-Agent Systems 8:203-236
-
(2004)
Autonomous Agents Multi-Agent Systems
, vol.8
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perin, A.5
-
6
-
-
84892226914
-
-
Accessed 21 Feb. 2010
-
CLUSIF (2007) MEHARI 2007: concepts and mechanisms. http://www.clusif. asso.fr/fr/production/ouvrages/pdf/CLUSIF-risk-management.pdf. Last Accessed 21 Feb. 2010
-
(2007)
MEHARI 2007: Concepts and Mechanisms.
-
-
-
7
-
-
0004272739
-
-
Addison-Wesley Longman Publishing Co., Boston, MA, USA
-
Cockburn A (2001) Writing effective use cases. Addison-Wesley Longman Publishing Co., Boston, MA, USA
-
(2001)
Writing Effective use Cases
-
-
Cockburn, A.1
-
11
-
-
84885676902
-
Contributions méthologiques pour l'amélioration de l'analyse des risques
-
Hermes Science Publications, Paris
-
Dubois E, Mayer N, Rifaut A, Rosener V (2006) Contributions méthologiques pour l'amélioration de l'analyse des risques. In: Enjeux de la sécurité multimédia (Traité IC2, série Informatique et systèmes d'information). Hermes Science Publications, Paris, pp 79-131
-
(2006)
Enjeux de la Sécurité Multimédia (Traité IC2, Série Informatique et Systèmes D'information)
, pp. 79-131
-
-
Dubois, E.1
Mayer, N.2
Rifaut, A.3
Rosener, V.4
-
12
-
-
77950520810
-
A vulnerability-centric requirements engineering framework: Analyzing security attacks, countermeasures, and requirements based on vulnerabilities
-
Elahi G, Yu E, Zannone N (2010) A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities.. Reqs Eng Journal 15(1):41-62
-
(2010)
Reqs Eng Journal
, vol.15
, Issue.1
, pp. 41-62
-
-
Elahi, G.1
Yu, E.2
Zannone, N.3
-
13
-
-
84870382271
-
-
Accessed 21 Feb. 2010
-
ENISA (European Network and Information Security Agency) (2006) Inventory of risk assessment and risk management methods. http://www.enisa.europa.eu/act/ rm/files/deliverables/inventory-of-risk-assessment-and-risk-management-methods. Last Accessed 21 Feb. 2010
-
(2006)
Inventory of Risk Assessment and Risk Management Methods.
-
-
-
14
-
-
77950536938
-
A comparison of security requirements engineering methods
-
Fabian B, Gürses S, Heisel M, Santen T, Schmidt H (2010) A comparison of security requirements engineering methods. Reqs Eng Journal 15(1):7-40
-
(2010)
Reqs Eng Journal
, vol.15
, Issue.1
, pp. 7-40
-
-
Fabian, B.1
Gürses, S.2
Heisel, M.3
Santen, T.4
Schmidt, H.5
-
15
-
-
32044443362
-
-
CMU/SEI-2003-TN-033 Carnegie Mellon University, Software Engineering Institute, Pittsburgh, PA
-
Firesmith DG (2003) Common concepts underlying safety, security, and survivability engineering. CMU/SEI-2003-TN-033 Carnegie Mellon University, Software Engineering Institute, Pittsburgh, PA
-
(2003)
Common Concepts Underlying Safety, Security, and Survivability Engineering
-
-
Firesmith, D.G.1
-
17
-
-
84924413055
-
Security and trust requirements engineering
-
LNCS, Springer
-
Giorgini P, Massacci F, Zannone N (2005) Security and trust requirements engineering. In: Foundations of security analysis and design III. LNCS, vol 3655. Springer, pp 237-272
-
(2005)
Foundations of Security Analysis and Design III
, vol.3655
, pp. 237-272
-
-
Giorgini, P.1
Massacci, F.2
Zannone, N.3
-
18
-
-
40449096402
-
Security requirements engineering: A framework for representation and analysis
-
Haley CB, Laney RC, Moffett JD, Nuseibeh B (2008) Security requirements engineering: a framework for representation and analysis. IEEE Trans Softw Eng 34:133-153
-
(2008)
IEEE Trans Softw Eng
, vol.34
, pp. 133-153
-
-
Haley, C.B.1
Laney, R.C.2
Moffett, J.D.3
Nuseibeh, B.4
-
19
-
-
70350130621
-
A framework for security requirements engineering
-
ACM
-
Haley CB, Moffett JD, Laney RC, Nuseibeh B (2006) A framework for security requirements engineering. In: Proceedings of the 2nd international workshop on software engineering for secure systems (SESS'06), ACM, pp 35-42
-
(2006)
Proceedings of the 2nd International Workshop on Software Engineering for Secure Systems (SESS'06)
, pp. 35-42
-
-
Haley, C.B.1
Moffett, J.D.2
Laney, R.C.3
Nuseibeh, B.4
-
20
-
-
7244261750
-
Meaningful modeling: What's the semantics of "semantics"?
-
Harel D, Rumpe B (2004) Meaningful modeling: what's the semantics of "semantics"? Computer 37:64-72
-
(2004)
Computer
, vol.37
, pp. 64-72
-
-
Harel, D.1
Rumpe, B.2
-
24
-
-
84892322842
-
Environmental management systems - Requirements with guidance for use
-
ISO 14001, Geneva
-
ISO 14001 (2004) Environmental management systems - requirements with guidance for use. International Organization for Standardization, Geneva
-
(2004)
International Organization for Standardization
-
-
-
30
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
van Lamsweerde A, Letier E (2000) Handling obstacles in goal-oriented requirements engineering. IEEE Trans Softw Eng 26:978-1005
-
(2000)
IEEE Trans Softw Eng
, vol.26
, pp. 978-1005
-
-
Van Lamsweerde, A.1
Letier, E.2
-
31
-
-
17044394774
-
Using abuse frames to bound the scope of security problems
-
IEEE Computer Society
-
Lin L, Nuseibeh B, Ince D, Jackson M (2004) Using abuse frames to bound the scope of security problems. In: Proceedings of the 12th IEEE international conference on requirements engineering (RE'04), IEEE Computer Society, pp 354-355
-
(2004)
Proceedings of the 12th IEEE International Conference on Requirements Engineering (RE'04)
, pp. 354-355
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
-
32
-
-
17044370046
-
Analysing security threats and vulnerabilities using abuse frames
-
Open University
-
Lin L, Nuseibeh B, Ince D, Jackson M, Moffett JD (2003) Analysing security threats and vulnerabilities using abuse frames. Technical report No: 2003/10, Open University
-
(2003)
Technical Report No: 2003/10
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
Moffett, J.D.5
-
33
-
-
84942929509
-
Introducing abuse frames for analysing security requirements
-
IEEE Computer Society
-
Lin L, Nuseibeh B, Ince D, Jackson M, Moffett JD (2003) Introducing abuse frames for analysing security requirements. In: Proceedings of the 11th IEEE international conference on requirements engineering (RE'03), IEEE Computer Society, pp 371-372
-
(2003)
Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE'03)
, pp. 371-372
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
Moffett, J.D.5
-
36
-
-
45849117958
-
Alignment of misuse cases with security risk management
-
IEEE Computer Society
-
Matulevicius R, Mayer N, Heymans P (2008) Alignment of misuse cases with security risk management. In: Proceedings of the 3rd international conference on availability, reliability and security (ARES'08), IEEE Computer Society, pp 1397-1404
-
(2008)
Proceedings of the 3rd International Conference on Availability, Reliability and Security (ARES'08)
, pp. 1397-1404
-
-
Matulevicius, R.1
Mayer, N.2
Heymans, P.3
-
37
-
-
45849134150
-
Adapting secure tropos for security risk management during early phases of the information systems development
-
LNCS, Springer
-
Matulevicius R, Mayer N, Mouratidis H, Dubois E, Heymans P, Genon N (2008) Adapting secure tropos for security risk management during early phases of the information systems development.. In: Proceedings of the 20th international conference on advanced information systems engineering (CAiSE'08). LNCS, vol 5074. Springer, pp 541-555
-
(2008)
Proceedings of the 20th International Conference on Advanced Information Systems Engineering (CAiSE'08)
, vol.5074
, pp. 541-555
-
-
Matulevicius, R.1
Mayer, N.2
Mouratidis, H.3
Dubois, E.4
Heymans, P.5
Genon, N.6
-
43
-
-
33750131444
-
Security quality requirements engineering (SQUARE) methodology
-
ESC-TR-2005-009Carnegie Mellon University - Software Engineering Institute, Pittsburgh, PA
-
Mead NR, Hough ED, Stehney TR (2005) Security quality requirements engineering (SQUARE) methodology. Technical report CMU/SEI-2005-TR-009, ESC-TR-2005-009Carnegie Mellon University - Software Engineering Institute, Pittsburgh, PA
-
(2005)
Technical Report CMU/SEI-2005-TR-009
-
-
Mead, N.R.1
Hough, E.D.2
Stehney, T.R.3
-
45
-
-
73449140991
-
Evidence-based notation design: Towards a scientific basis for constructing visual notations in software engineering
-
Moody DL (2009) Evidence-based notation design: towards a scientific basis for constructing visual notations in software engineering.. IEEE Trans Softw Eng 35(6):756-779
-
(2009)
IEEE Trans Softw Eng
, vol.35
, Issue.6
, pp. 756-779
-
-
Moody, D.L.1
-
46
-
-
84892265795
-
Extending I and tropos to model security
-
Yu E, Giorgini P, Maiden N, Mylopoulos J eds, MIT in press, Cambridge, Massachusetts USA
-
Mouratidis H, Giorgini P (2010) Extending i. and tropos to model security. In: Yu E, Giorgini P, Maiden N, Mylopoulos J (eds) Social modeling for requirements engineering. MIT (in press), Cambridge, Massachusetts (USA)
-
(2010)
Social Modeling for Requirements Engineering
-
-
Mouratidis, H.1
Giorgini, P.2
-
49
-
-
0004310802
-
-
Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA
-
Olle TW, Hagelstein J, Macdonald IG., Rolland C, Sol HG, Van Assche FJM, Verrijn-Stuart AA (1992) Information systems methodology: a framework for understanding, 2nd edn. Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA
-
(1992)
Information Systems Methodology: A Framework for Understanding, 2nd Edn
-
-
Olle, T.W.1
Hagelstein, J.2
Macdonald, I.G.3
Rolland, C.4
Sol, H.G.5
Van Assche, F.J.M.6
Verrijn-Stuart, A.A.7
-
51
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre G, Opdahl AL (2004) Eliciting security requirements with misuse cases. Reqs Eng J 10(1):34-44
-
(2004)
Reqs Eng J
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
55
-
-
77950516725
-
Assessing enterprise risk level: The CORAS approach
-
Khadraoui D, Herrmann F eds, Idea Group, IGI Global, Hershey, Pennsylvania
-
Vraalsen F, Mahler T, Lund MS, Hogganvik I, den Braber F, Stalen K (2007) Assessing enterprise risk level: the CORAS approach. In: Khadraoui D, Herrmann F (eds) Advances in enterprise information technology security. Idea Group, IGI Global, Hershey, Pennsylvania pp 311-333
-
(2007)
Advances in Enterprise Information Technology Security
, pp. 311-333
-
-
Vraalsen, F.1
Mahler, T.2
Lund, M.S.3
Hogganvik, I.4
Den Braber, F.5
Stalen, K.6
-
56
-
-
84892225312
-
-
Wikipedia (2008) Information system definition. http://en. wikipedia.org/wiki/Information-system
-
(2008)
Information System Definition
-
-
|