-
1
-
-
84867672691
-
-
Software Engineering Institute, Carnegie Mellon, Tech. Rep.
-
S. E. Institute, "2011 cybersecurity watch survey," Software Engineering Institute, Carnegie Mellon, Tech. Rep., 2011. [Online]. Available: http://www.cert.org/archive/pdf/CyberSecuritySurvey2011Data.pdf
-
(2011)
2011 Cybersecurity Watch Survey
-
-
Institute, S.E.1
-
2
-
-
84878421633
-
-
Software Engineering Institute, Carnegie Mellon, Tech. Rep. CMU/SEI-2012-TR-012, December
-
G. Silowash, D. Cappelli, A. Moore, R. F. Trzeciak, T. J. Shimeall, and L. Flynn, "Common sense guide to mitigating insider threats," Software Engineering Institute, Carnegie Mellon, Tech. Rep. CMU/SEI-2012-TR-012, December 2012. [Online]. Available: Http://www.sei.cmu.edu/library/abstracts/ reports/12tr012.cfm
-
(2012)
Common Sense Guide to Mitigating Insider Threats
-
-
Silowash, G.1
Cappelli, D.2
Moore, A.3
Trzeciak, R.F.4
Shimeall, T.J.5
Flynn, L.6
-
3
-
-
73849097284
-
Security requirements engineering : the si*modeling language and the secure tropos methodology
-
Z. Ras and L.-S. Tsay, Eds. Springer Berlin / Heidelberg
-
F. Massacci, J. Mylopoulos, and N. Zannone, "Security Requirements Engineering : The SI*Modeling Language and the Secure Tropos Methodology," in Advances in Intelligent Information Systems, ser. Studies in Computational Intelligence, Z. Ras and L.-S. Tsay, Eds. Springer Berlin / Heidelberg, 2010, vol. 265, pp. 147-174.
-
(2010)
Advances in Intelligent Information Systems, Ser. Studies in Computational Intelligence
, vol.265
, pp. 147-174
-
-
Massacci, F.1
Mylopoulos, J.2
Zannone, N.3
-
4
-
-
80455127276
-
Computer aided threat identification
-
Washington, DC, USA: IEEE Computer Society
-
Y. Asnar, T. Li, F. Massacci, and F. Paci, "Computer aided threat identification," in Proceedings of the 2011 IEEE 13th Conference on Commerce and Enterprise Computing, ser. CEC '11. Washington, DC, USA: IEEE Computer Society, 2011, pp. 145-152. [Online]. Available: http://dx.doi.org/10. 1109/CEC.2011.13
-
(2011)
Proceedings of the 2011 IEEE 13th Conference on Commerce and Enterprise Computing, Ser. CEC '11
, pp. 145-152
-
-
Asnar, Y.1
Li, T.2
Massacci, F.3
Paci, F.4
-
5
-
-
77955711373
-
A scale based trust model for multi-context environments
-
July
-
J. L. Isaac Agudo, Carmen Fernandez-Gago, "A scale based trust model for multi-context environments," Computers and Mathematics with Applications, vol. 60, pp. 209-216, July 2010.
-
(2010)
Computers and Mathematics with Applications
, vol.60
, pp. 209-216
-
-
Isaac Agudo, J.L.1
Carmen, F.-G.2
-
6
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
March
-
A. Jøsang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Systems, vol. 43, no. 2, pp. 618-644, March 2007.
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
7
-
-
52149094285
-
A model for trust metrics analysis
-
I. Agudo, M. C. F. Gago, and J. Lopez, "A model for trust metrics analysis," in TrustBus, 2008, pp. 28-37.
-
(2008)
TrustBus
, pp. 28-37
-
-
Agudo, I.1
Gago, M.C.F.2
Lopez, J.3
-
8
-
-
59849109249
-
-
Ph.D. dissertation, University of Trento, Italy
-
N. Zannone, "A Requirements Engineering Methodology for Trust, Security, and Privacy," Ph.D. dissertation, University of Trento, Italy, 2007.
-
(2007)
A Requirements Engineering Methodology for Trust, Security, and Privacy
-
-
Zannone, N.1
-
9
-
-
84882784197
-
Towards an access-control framework for countering insider threats
-
C.W. Probst, J. Hunker, D. Gollmann, and M. Bishop, Eds. Springer US
-
J. Crampton and M. Huth, "Towards an access-control framework for countering insider threats," in Insider Threats in Cyber Security, ser. Advances in Information Security, C.W. Probst, J. Hunker, D. Gollmann, and M. Bishop, Eds. Springer US, 2010, vol. 49, pp. 173-195.
-
(2010)
Insider Threats in Cyber Security, Ser. Advances in Information Security
, vol.49
, pp. 173-195
-
-
Crampton, J.1
Huth, M.2
-
10
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
A. Van Lamsweerde and E. Letier, "Handling obstacles in goal-oriented requirements engineering," IEEE Transactions on Software Engineering, vol. 26, no. 10, pp. 978-1005, 2000.
-
(2000)
IEEE Transactions on Software Engineering
, vol.26
, Issue.10
, pp. 978-1005
-
-
Van Lamsweerde, A.1
Letier, E.2
-
12
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
L. Liu, E. Yu, and J. Mylopoulos, "Security and privacy requirements analysis within a social setting," Proc.of RE, vol. 3, pp. 151-161, 2003.
-
(2003)
Proc.Of RE
, vol.3
, pp. 151-161
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
14
-
-
78649899287
-
Service security analysis based on i*: An approach from the attacker viewpoint
-
Seoul
-
T. Li, L. Liu, and B. R. Bryant, "Service Security Analysis Based on i*: An Approach from the Attacker Viewpoint," in Security, Trust, and Privacy for Software Applications (STPSA 2010), Seoul, 2010, pp. 127-133.
-
(2010)
Security, Trust, and Privacy for Software Applications (STPSA 2010)
, pp. 127-133
-
-
Li, T.1
Liu, L.2
Bryant, B.R.3
-
15
-
-
77950520810
-
A vulnerability-centric requirements engineering framework: Analyzing security attacks, countermeasures, and requirements based on vulnerabilities
-
Nov
-
G. Elahi, E. Yu, and N. Zannone, "A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities," Requirements Engineering, vol. 15, no. 1, pp. 41-62, Nov. 2009.
-
(2009)
Requirements Engineering
, vol.15
, Issue.1
, pp. 41-62
-
-
Elahi, G.1
Yu, E.2
Zannone, N.3
-
16
-
-
84862645179
-
Syntactic and semantic extensions to secure tropos to support security risk management
-
mar
-
R. Matuleviius, H. Mouratidis, N. Mayer, E. Dubois, and P. Heymans, "Syntactic and semantic extensions to secure tropos to support security risk management," Journal of Universal Computer Science, vol. 18, no. 6, pp. 816-844, mar 2012.
-
(2012)
Journal of Universal Computer Science
, vol.18
, Issue.6
, pp. 816-844
-
-
Matuleviius, R.1
Mouratidis, H.2
Mayer, N.3
Dubois, E.4
Heymans, P.5
-
17
-
-
34249004734
-
Secure tropos: A security-oriented extension of the tropos methodology
-
H. Mouratidis and P. Giorgini, "Secure tropos: a security-oriented extension of the tropos methodology." International Journal of Software Engineering and Knowledge Engineering, vol. 17, no. 2, pp. 285-309, 2007.
-
(2007)
International Journal of Software Engineering and Knowledge Engineering
, vol.17
, Issue.2
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, P.2
-
18
-
-
33751189883
-
Security quality requirements engineering (square) methodology
-
May
-
N. R. Mead and T. Stehney, "Security quality requirements engineering (square) methodology," SIGSOFT Softw. Eng. Notes, vol. 30, no. 4, pp. 1-7, May 2005.
-
(2005)
SIGSOFT Softw. Eng. Notes
, vol.30
, Issue.4
, pp. 1-7
-
-
Mead, N.R.1
Stehney, T.2
-
19
-
-
33750273034
-
Applying a security requirements engineering process
-
D. Mellado, E. Fernandez-Medina, and M. Piattini, "Applying a security requirements engineering process," Computer Security-ESORICS 2006, pp. 192-206, 2006.
-
(2006)
Computer Security-ESORICS 2006
, pp. 192-206
-
-
Mellado, D.1
Fernandez-Medina, E.2
Piattini, M.3
-
20
-
-
79955934437
-
Goal-driven risk assessment in requirements engineering
-
Y. Asnar, P. Giorgini, and J. Mylopoulos, "Goal-driven risk assessment in requirements engineering," Requirements Engineering, vol. 16, no. 2, pp. 101-116, 2011.
-
(2011)
Requirements Engineering
, vol.16
, Issue.2
, pp. 101-116
-
-
Asnar, Y.1
Giorgini, P.2
Mylopoulos, J.3
-
21
-
-
30544438141
-
Beyond proof-ofcompliance: Security analysis in trust management
-
May.
-
N. Li, J. C. Mitchell, and W. H. Winsborough, "Beyond proof-ofcompliance: security analysis in trust management," J. ACM, vol. 52, no. 3, pp. 474-514, May 2005.
-
(2005)
J. ACM
, vol.52
, Issue.3
, pp. 474-514
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
|