-
4
-
-
4243980729
-
Strategies for developing policies and requirements for secure e-commerce systems
-
In A. K. Ghosh (Ed.), Kluwer Academic Publishers
-
Antón, A. I., & Earp, J. B. (2001). Strategies for developing policies and requirements for secure e-commerce systems. In A. K. Ghosh (Ed.), E-commerce security and privacy (Vol. 2, pp. 29-46). Kluwer Academic Publishers.
-
(2001)
E-commerce Security and Privacy
, vol.2
, pp. 29-46
-
-
Antón, A.I.1
Earp, J.B.2
-
5
-
-
84899382295
-
The use of satisfaction arguments for traceability in requirements reuse for system families: Position paper
-
Carlos III University of Madrid, Spain
-
Attwood, K., Kelly, T., & McDermid, J. (2004). The use of satisfaction arguments for traceability in requirements reuse for system families: Position paper. Proceedings of the International Workshop on Requirements Reuse in System Family Engineering, 8th International Conference on Software Reuse (pp. 18-21). Carlos III University of Madrid, Spain.
-
(2004)
Proceedings of the International Workshop On Requirements Reuse In System Family Engineering, 8th International Conference On Software Reuse
, pp. 18-21
-
-
Attwood, K.1
Kelly, T.2
McDermid, J.3
-
7
-
-
25444462095
-
The roots of computer supported argument visualization
-
In P. A. Kirschner, S. J. Buckingham Shum, & C. S. Carr (Eds.), London: Springer-Verlag
-
Buckingham Shum, S. J. (2003). The roots of computer supported argument visualization. In P. A. Kirschner, S. J. Buckingham Shum, & C. S. Carr (Eds.), Visualizing argumentation: Software tools for collaborative and educational sense-making (pp. 3-24). London: Springer-Verlag.
-
(2003)
Visualizing Argumentation: Software Tools For Collaborative and Educational Sense-making
, pp. 3-24
-
-
Buckingham Shum, S.J.1
-
8
-
-
32044473027
-
An integrated approach for software design checking using design rationale
-
In J. S. Gero (Ed.), Cambridge, MA: Kluwer Academic Press
-
Burge, J. E., & Brown, D. C. (2004). An integrated approach for software design checking using design rationale. In J. S. Gero (Ed.), Proceedings of the 1st International Conference on Design Computing and Cognition (pp. 557-576). Cambridge, MA: Kluwer Academic Press.
-
(2004)
Proceedings of the 1st International Conference On Design Computing and Cognition
, pp. 557-576
-
-
Burge, J.E.1
Brown, D.C.2
-
9
-
-
84899276996
-
-
Retrieved November 9, 2005, from
-
Christensen, D. (2005). DC proof. Retrieved November 9, 2005, from http://www.dcproof.com/
-
(2005)
DC Proof
-
-
Christensen, D.1
-
10
-
-
0003696305
-
-
Kluwer Academic Publishers
-
Chung, L., Nixon, B., Yu, E., & Mylopoulos, J. (2000). Non-functional requirements in software engineering. Kluwer Academic Publishersx.
-
(2000)
Non-functional Requirements In Software Engineering
-
-
Chung, L.1
Nixon, B.2
Yu, E.3
Mylopoulos, J.4
-
11
-
-
84899218208
-
-
Compendium Institute, Retrieved from
-
Compendium Institute. (2005). Compendium. Retrieved from http://www.compendiuminstitute.org/
-
(2005)
Compendium
-
-
-
12
-
-
84970947585
-
Software engineering for security: A roadmap
-
In A. Finkelstein (Ed.), ACM Press
-
Devanbu, P., & Stubblebine, S. (2000). Software engineering for security: A roadmap. In A. Finkelstein (Ed.), The future of software engineering. ACM Press.
-
(2000)
The Future of Software Engineering
-
-
Devanbu, P.1
Stubblebine, S.2
-
14
-
-
0003224879
-
Making argumentation serve design
-
In T. Moran & J. Carroll (Eds.), Lawrence Erlbaum and Associates
-
Fischer, G., Lemke, A. C., McCall, R., & Morch, A. (1996). Making argumentation serve design. In T. Moran & J. Carroll (Eds.), Design rationale concepts, techniques, and use (pp. 267-293). Lawrence Erlbaum and Associates.
-
(1996)
Design Rationale Concepts, Techniques, and Use
, pp. 267-293
-
-
Fischer, G.1
Lemke, A.C.2
McCall, R.3
Morch, A.4
-
15
-
-
17044394776
-
The effect of trust assumptions on the elaboration of security requirements
-
Kyoto, Japan: IEEE Computer Society Press
-
Haley, C. B., Laney, R. C., Moffett, J. D., & Nuseibeh, B. (2004). The effect of trust assumptions on the elaboration of security requirements. Proceedings of the 12th International Requirements Engineering Conference (RE'04) (pp. 102-111). Kyoto, Japan: IEEE Computer Society Press.
-
(2004)
Proceedings of the 12th International Requirements Engineering Conference (RE'04)
, pp. 102-111
-
-
Haley, C.B.1
Laney, R.C.2
Moffett, J.D.3
Nuseibeh, B.4
-
16
-
-
5744229775
-
Deriving security requirements from crosscutting threat descriptions
-
Lancaster, UK: ACM Press
-
Haley, C. B., Laney, R. C., & Nuseibeh, B. (2004). Deriving security requirements from crosscutting threat descriptions. Proceedings of the 3rd International Conference on Aspect-Oriented Software Development (AOSD'04) (pp. 112-121). Lancaster, UK: ACM Press.
-
(2004)
Proceedings of the 3rd International Conference On Aspect-Oriented Software Development (AOSD'04)
, pp. 112-121
-
-
Haley, C.B.1
Laney, R.C.2
Nuseibeh, B.3
-
17
-
-
34548557819
-
Arguing security: Validating security requirements using structured argumentation
-
Paris
-
Haley, C. B., Moffett, J. D., Laney, R., & Nuseibeh, B. (2005). Arguing security: Validating security requirements using structured argumentation. Proceedings of the 3rd Symposium on Requirements Engineering for Information Security (SREIS'05) held in conjunction with the 13th International Requirements Engineering Conference (RE'05). Paris.
-
(2005)
Proceedings of the 3rd Symposium On Requirements Engineering For Information Security (SREIS'05) Held In Conjunction With the 13th International Requirements Engineering Conference (RE'05)
-
-
Haley, C.B.1
Moffett, J.D.2
Laney, R.3
Nuseibeh, B.4
-
18
-
-
84955606787
-
Applying "practical" formal methods to the specification and analysis of security properties
-
St. Petersburg, Russia: Springer-Verlag Heidelberg
-
Heitmeyer, C. L. (2001). Applying "practical" formal methods to the specification and analysis of security properties. Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Computer Security (MMM ACNS 2001) (Vol. 2052, pp. 84-89). St. Petersburg, Russia: Springer-Verlag Heidelberg.
-
(2001)
Proceedings of the International Workshop On Information Assurance In Computer Networks: Methods, Models, and Architectures For Network Computer Security (MMM ACNS 2001)
, vol.2052
, pp. 84-89
-
-
Heitmeyer, C.L.1
-
19
-
-
84863906471
-
SCR*: A toolset for specifying and analyzing software requirements
-
In A. J. Hu & M. Y. Vardi (Eds.), Vancouver, BC, Canada: Springer
-
Heitmeyer, C. L., Kirby, J., Lebaw, B. G., & Bharadwaj, R. (1998). SCR*: A toolset for specifying and analyzing software requirements. In A. J. Hu & M. Y. Vardi (Eds.), Proceedings of the 10th International Conference on Computer Aided Verification (Vol. 1427, pp. 526-531). Vancouver, BC, Canada: Springer.
-
(1998)
Proceedings of the 10th International Conference On Computer Aided Verification
, vol.1427
, pp. 526-531
-
-
Heitmeyer, C.L.1
Kirby, J.2
Lebaw, B.G.3
Bharadwaj, R.4
-
21
-
-
84899245451
-
-
Retrieved November 9, 2005, from
-
Howitt, C. (2005). BlobLogic. Retrieved November 9, 2005, from http://users.ox.ac.uk/~univ0675/blob/blobSplash.html
-
(2005)
BlobLogic
-
-
Howitt, C.1
-
26
-
-
0026386194
-
What's in design rationale? Human-Computer Interaction
-
Lee, J., & Lai, K. Y. (1991). What's in design rationale? Human-Computer Interaction, Special Issue on Design Rationale, 6(3-4), 251-280.
-
(1991)
Special Issue On Design Rationale
, vol.6
, Issue.3-4
, pp. 251-280
-
-
Lee, J.1
Lai, K.Y.2
-
27
-
-
0036305007
-
Integrating software lifecycle process standards with security engineering
-
Lee, Y., Lee, J., & Lee, Z. (2002). Integrating software lifecycle process standards with security engineering. Computers and Security, 21(4), 345-355.
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 345-355
-
-
Lee, Y.1
Lee, J.2
Lee, Z.3
-
28
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
Monteray Bay, CA
-
Liu, L., Yu, E., & Mylopoulos, J. (2003). Security and privacy requirements analysis within a social setting. Proceedings of the 11th IEEE International Requirements Engineering Conference (RE'03). Monteray Bay, CA.
-
(2003)
Proceedings of the 11th IEEE International Requirements Engineering Conference (RE'03)
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
30
-
-
32044433021
-
-
(Technical Report No. 2004/23). Milton Keynes UK: Department of Computing, The Open University
-
Moffett, J. D., Haley, C. B., & Nuseibeh, B. (2004). Core security requirements artefacts (Technical Report No. 2004/23). Milton Keynes UK: Department of Computing, The Open University.
-
(2004)
Core Security Requirements Artefacts
-
-
Moffett, J.D.1
Haley, C.B.2
Nuseibeh, B.3
-
31
-
-
0343347262
-
A model for a causal logic for requirements engineering
-
Moffett, J. D., Hall, J. G., Coombes, A., & McDermid, J. A. (1996). A model for a causal logic for requirements engineering. Requirements Engineering, 1(1), 27-46.
-
(1996)
Requirements Engineering
, vol.1
, Issue.1
, pp. 27-46
-
-
Moffett, J.D.1
Hall, J.G.2
Coombes, A.3
McDermid, J.A.4
-
32
-
-
35048845022
-
Integrating security and systems engineering: Toward the modelling of secure information systems
-
Klagenfurt/Velden, Austria: Springer-Verlag
-
Mouratidis, H., Giorgini, P., & Manson, G. (2003). Integrating security and systems engineering: Toward the modelling of secure information systems. Proceedings of the 15th Conference on Advanced Information Systems Engineering (CAiSE'03). Klagenfurt/Velden, Austria: Springer-Verlag.
-
(2003)
Proceedings of the 15th Conference On Advanced Information Systems Engineering (CAiSE'03)
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
33
-
-
0025498594
-
Telos: Representing knowledge about information systems
-
Mylopoulos, J., Borgida, A., Jarke, M., & Koubarakis, M. (1990). Telos: Representing knowledge about information systems. ACM Transactions on Information Systems (TOIS), 8(4), 325-362.
-
(1990)
ACM Transactions On Information Systems (TOIS)
, vol.8
, Issue.4
, pp. 325-362
-
-
Mylopoulos, J.1
Borgida, A.2
Jarke, M.3
Koubarakis, M.4
-
35
-
-
85008523798
-
Weaving together requirements and architectures
-
Nuseibeh, B. (2001). Weaving together requirements and architectures. Computer (IEEE), 34(3), 115-117.
-
(2001)
Computer (IEEE)
, vol.34
, Issue.3
, pp. 115-117
-
-
Nuseibeh, B.1
-
37
-
-
0026882989
-
Supporting systems development by capturing deliberations during requirements engineering
-
Ramesh, B., & Dhar, V. (1992). Supporting systems development by capturing deliberations during requirements engineering. IEEE Transactions on Software Engineering, 18(6), 498-510.
-
(1992)
IEEE Transactions On Software Engineering
, vol.18
, Issue.6
, pp. 498-510
-
-
Ramesh, B.1
Dhar, V.2
-
38
-
-
33847292131
-
-
Retrieved from
-
Reed, C. (2005). Araucaria. Retrieved from http://araucaria.computing.dundee.ac.uk/
-
(2005)
Araucaria
-
-
Reed, C.1
-
42
-
-
0030706923
-
Information security embedded in the design of telematics systems
-
Tettero, O., Out, D. J., Franken, H. M., & Schot, J. (1997). Information security embedded in the design of telematics systems. Computers and Security, 16(2), 145-164.
-
(1997)
Computers and Security
, vol.16
, Issue.2
, pp. 145-164
-
-
Tettero, O.1
Out, D.J.2
Franken, H.M.3
Schot, J.4
-
43
-
-
0004096846
-
-
Cambridge, Cambridge University Press
-
Toulmin, S. E. (1958). The uses of argument. Cambridge: Cambridge University Press.
-
(1958)
The Uses of Argument
-
-
Toulmin, S.E.1
-
48
-
-
0030834984
-
Four dark corners of requirements engineering
-
Zave, P., & Jackson, M. (1997). Four dark corners of requirements engineering. Transactions on Software Engineering and Methodology (ACM), 6(1), 1-30.
-
(1997)
Transactions On Software Engineering and Methodology (ACM)
, vol.6
, Issue.1
, pp. 1-30
-
-
Zave, P.1
Jackson, M.2
|