-
2
-
-
77950536938
-
A comparison of security requirements engineering methods
-
B. Fabian, S. Gurses, M. Heisel, T. Santen, and H. Schmidt, "A comparison of security requirements engineering methods," Requirements Engineering-Special Issue on Security Requirements Engineering, vol. 15, no. 1, pp. 7-40, 2010.
-
(2010)
Requirements Engineering-Special Issue on Security Requirements Engineering
, vol.15
, Issue.1
, pp. 7-40
-
-
Fabian, B.1
Gurses, S.2
Heisel, M.3
Santen, T.4
Schmidt, H.5
-
3
-
-
73849097284
-
Security requirements engineering: The simodeling language and the secure tropos methodology
-
ser. SCI, Z. Ras and L.-S. Tsay, Eds. Springer
-
F. Massacci, J. Mylopoulos, and N. Zannone, "Security Requirements Engineering: The SIModeling Language and the Secure Tropos Methodology," in AIIS, ser. SCI, Z. Ras and L.-S. Tsay, Eds. Springer, 2010, vol. 265, pp. 147-174.
-
(2010)
AIIS
, vol.265
, pp. 147-174
-
-
Massacci, F.1
Mylopoulos, J.2
Zannone, N.3
-
8
-
-
84877941639
-
-
UML Revision Task Force February
-
UML Revision Task Force, "OMG Object Constraint Language: Reference," February 2010. [Online]. Available: http://www.omg.org/ docs/formal/10-02-02.pdf
-
(2010)
OMG Object Constraint Language: Reference
-
-
-
9
-
-
82455212656
-
UML4PF-a tool for problem-oriented requirements analysis
-
I. Cote, D. Hatebur, M. Heisel, and H. Schmidt, "UML4PF-a tool for problem-oriented requirements analysis," in Proceedings of RE. IEEE Computer Society, 2011, pp. 349-350.
-
(2011)
Proceedings of RE. IEEE Computer Society
, pp. 349-350
-
-
Cote, I.1
Hatebur, D.2
Heisel, M.3
Schmidt, H.4
-
11
-
-
77956561430
-
A UML profile for requirements analysis of dependable software
-
E. Schoitsch, Ed. Springer
-
D. Hatebur and M. Heisel, "A UML profile for requirements analysis of dependable software," in Proceedings of the International Conference on Computer Safety, Reliability and Security (SAFECOMP) (LNCS 6351), E. Schoitsch, Ed. Springer, 2010, pp. 317-331.
-
(2010)
Proceedings of the International Conference on Computer Safety, Reliability and Security (SAFECOMP) (LNCS 6351)
, pp. 317-331
-
-
Hatebur, D.1
Heisel, M.2
-
12
-
-
56649104987
-
A formal metamodel for problem frames
-
Springer Berlin / Heidelberg
-
D. Hatebur, M. Heisel, and H. Schmidt, "A formal metamodel for problem frames," in Proceedings of the International Conference on Model Driven Engineering Languages and Systems (MODELS), vol. 5301. Springer Berlin / Heidelberg, 2008, pp. 68-82.
-
(2008)
Proceedings of the International Conference on Model Driven Engineering Languages and Systems (MODELS)
, vol.5301
, pp. 68-82
-
-
Hatebur, D.1
Heisel, M.2
Schmidt, H.3
-
13
-
-
84892427076
-
Common criteria compliant software development (cc-casd)
-
K. Beckers, I. Cote, D. Hatebur, S. Faßbender, and M. Heisel, "Common Criteria CompliAnt Software Development (CC-CASD)," in Proceedings 28th Symposium on Applied Computing. ACM, 2013, pp. 937-943. [Online]. Available: http://dl.acm.org
-
(2013)
Proceedings 28th Symposium on Applied Computing. ACM
, pp. 937-943
-
-
Beckers, K.1
Cote, I.2
Hatebur, D.3
Faßbender, S.4
Heisel, M.5
-
14
-
-
84892382482
-
Protection Profile for the Gateway of a Smart Metering System (Gateway PP)
-
Version 01.01.01(final draft)
-
BSI, "Protection Profile for the Gateway of a Smart Metering System (Gateway PP)," Bundesamt fur Sicherheit in der Informationstechnik (BSI)-Federal Office for Information Security Germany, Version 01.01.01(final draft), 2011, https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/SmartMeter/ PP-SmartMeter.pdf? blob=publicationFile.
-
(2011)
Bundesamt fur Sicherheit in der Informationstechnik (BSI)-Federal Office for Information Security Germany
-
-
-
15
-
-
33750950652
-
A comparison of the common criteria with proposals of information systems security requirements
-
D. Mellado, E. Fernandez-Medina, and M. Piattini, "A comparison of the common criteria with proposals of information systems security requirements," in Proceedings of ARES, 2006, p. 8 pp.
-
(2006)
Proceedings of ARES
, pp. 8
-
-
Mellado, D.1
Fernandez-Medina, E.2
Piattini, M.3
-
16
-
-
33750273034
-
Applying a security requirements engineering process
-
D. Gollmann, J. Meier, and A. Sabelfeld, Eds. Springer Berlin / Heidelberg
-
D. Mellado, E. Fernandez-Medina, and M. Piattini, "Applying a security requirements engineering process," in ESORICS 2006, ser. LNCS 4189, D. Gollmann, J. Meier, and A. Sabelfeld, Eds. Springer Berlin / Heidelberg, 2006, pp. 192-206.
-
(2006)
ESORICS 2006, Ser. LNCS 4189
, pp. 192-206
-
-
Mellado, D.1
Fernandez-Medina, E.2
Piattini, M.3
-
18
-
-
80052987496
-
Ontological approach to the it security development
-
E. Tkacz and A. Kapczynski, Eds. Springer Berlin / Heidelberg
-
A. Bia?as, "Ontological approach to the it security development," in Internet-Technical Development and Applications, ser. Advances in Intelligent and Soft Computing, E. Tkacz and A. Kapczynski, Eds. Springer Berlin / Heidelberg, 2009, vol. 64, pp. 261-269.
-
(2009)
Internet-Technical Development and Applications, Ser. Advances in Intelligent and Soft Computing
, vol.64
, pp. 261-269
-
-
Biaas, A.1
-
20
-
-
17044394774
-
-
in RE
-
L. Lin, B. Nuseibeh, D. C. Ince, and M. Jackson, "Using abuse frames to bound the scope of security problems," in RE, 2004, pp. 354-355.
-
(2004)
Using Abuse Frames to Bound the Scope of Security Problems
, pp. 354-355
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.C.3
Jackson, M.4
-
21
-
-
84857362096
-
Enhancing security requirements engineering by organizational learning
-
K. Schneider, E. Knauss, S. Houmb, S. Islam, and J. Jurjens, "Enhancing security requirements engineering by organizational learning," Requirements Engineering, vol. 17, pp. 35-56, 2012.
-
(2012)
Requirements Engineering
, vol.17
, pp. 35-56
-
-
Schneider, K.1
Knauss, E.2
Houmb, S.3
Islam, S.4
Jurjens, J.5
-
22
-
-
45849131284
-
Design of a modelling language for information system security risk management
-
N. Mayer, P. Heymans, and R. Matulevicius, "Design of a modelling language for information system security risk management," in RCIS, 2007, pp. 121-132.
-
(2007)
RCIS
, pp. 121-132
-
-
Mayer, N.1
Heymans, P.2
Matulevicius, R.3
-
23
-
-
63349110076
-
Aurum: A framework for information security risk management
-
A. Ekelhart, S. Fenz, and T. Neubauer, "Aurum: A framework for information security risk management," in HICSS, 2009, pp. 1-10.
-
(2009)
HICSS
, pp. 1-10
-
-
Ekelhart, A.1
Fenz, S.2
Neubauer, T.3
-
24
-
-
80051515778
-
Developer-driven threat modeling: Lessons learned in the trenches
-
Jul
-
D. Dhillon, "Developer-driven threat modeling: Lessons learned in the trenches," IEEE Security and Privacy, vol. 9, no. 4, pp. 41-47, Jul. 2011.
-
(2011)
IEEE Security and Privacy
, vol.9
, Issue.4
, pp. 41-47
-
-
Dhillon, D.1
|