-
3
-
-
0037240812
-
Misuse cases: Use cases with hostile intent
-
January
-
Alexander, I. (2003, January). Misuse cases: Use cases with hostile intent. IEEE Software, 20(1), 58-66.
-
(2003)
IEEE Software
, vol.20
, Issue.1
, pp. 58-66
-
-
Alexander, I.1
-
5
-
-
21344459955
-
Structures of responsibilities and security of information systems
-
Backhouse, J., & Dhillon, G. (1996). Structures of responsibilities and security of information systems. European Journal of Information Systems, 5(1), 2-10.
-
(1996)
European Journal of Information Systems
, vol.5
, Issue.1
, pp. 2-10
-
-
Backhouse, J.1
Dhillon, G.2
-
6
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
Baskerville, R. (1993). Information systems security design methods: Implications for information systems development. Computing Surveys, 25(4), 375-414.
-
(1993)
Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
7
-
-
0024012763
-
A spiral model of software development and enhancement
-
Boehm, B. W. (1988). A spiral model of software development and enhancement. IEEE Computer, 21(5), 61-72.
-
(1988)
IEEE Computer
, vol.21
, Issue.5
, pp. 61-72
-
-
Boehm, B.W.1
-
9
-
-
3142750497
-
Tropos: An agent-oriented software development methodology
-
Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., & Mylopoulos, J. (2004). Tropos: An agent-oriented software development methodology. Autonomous Agents and Multi-Agent Systems, 8(3), 203-236.
-
(2004)
Autonomous Agents and Multi-Agent Systems
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Perini, A.2
Giorgini, P.3
Giunchiglia, F.4
Mylopoulos, J.5
-
11
-
-
0036721855
-
Towards requirements driven information systems engineering: The Tropos project
-
Castro, J., Kolp, M., & Mylopoulos, J. (2002). Towards requirements driven information systems engineering: The Tropos project. Information Systems, 27(6), 365-389.
-
(2002)
Information Systems
, vol.27
, Issue.6
, pp. 365-389
-
-
Castro, J.1
Kolp, M.2
Mylopoulos, J.3
-
13
-
-
0003696305
-
-
Kluwer Academic Publishers
-
Chung L., Nixon, B. A., Yu, E., & Mylopoulos, J. (2000). Non-functional requirements in software engineering. Kluwer Academic Publishers.
-
(2000)
Non-functional Requirements In Software Engineering
-
-
Chung, L.1
Nixon, B.A.2
Yu, E.3
Mylopoulos, J.4
-
14
-
-
84899367311
-
-
CRAMM - CCTA (Central Computer and Telecommunications Agency, UK), Retrieved from
-
CRAMM - CCTA (Central Computer and Telecommunications Agency, UK). Risk analysis and management method. Retrieved from http://www.cramm.com/cramm.htm
-
Risk Analysis and Management Method
-
-
-
16
-
-
0027574423
-
Goal-directed requirements acquisition
-
Dardenne, A., van Lamsweerde, A., & Fickas, S. (1993). Goal-directed requirements acquisition. Science of Computer Programming, 20(1-2), 3-50.
-
(1993)
Science of Computer Programming
, vol.20
, Issue.1-2
, pp. 3-50
-
-
Dardenne, A.1
van Lamsweerde, A.2
Fickas, S.3
-
17
-
-
24944464331
-
-
National Computer Systems Security Award Acceptance Speech. Retrieved October 18, 1999, from
-
Denning, D. E. (1998). The limits of formal security models. National Computer Systems Security Award Acceptance Speech. Retrieved October 18, 1999, from www.cs.georgetown.edu/~denning/infosec/award.html
-
(1998)
The Limits of Formal Security Models
-
-
Denning, D.E.1
-
18
-
-
23044525969
-
Current directions in IS security research: Toward socio-organizational perspectives
-
Dhillon, G., & Backhouse, J. (2001). Current directions in IS security research: Toward socio-organizational perspectives. Information Systems Journal, 11(2), 127-154.
-
(2001)
Information Systems Journal
, vol.11
, Issue.2
, pp. 127-154
-
-
Dhillon, G.1
Backhouse, J.2
-
19
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
August
-
Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, R., & Chandramouli, R. (2001, August). Proposed NIST standard for role-based access control. ACM Transactions on Information and Systems Security, 4(3), 224-74.
-
(2001)
ACM Transactions On Information and Systems Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, R.4
Chandramouli, R.5
-
20
-
-
35248852381
-
Modelling component dependencies to inform their selection
-
February 10-13, Lecture Notes in Computer Science 2580. Ottawa, Canada: Springer
-
nd International Conference, (ICCBSS 2003) (pp. 81-91). Lecture Notes in Computer Science 2580. Ottawa, Canada: Springer.
-
(2003)
nd International Conference, (ICCBSS 2003)
, pp. 81-91
-
-
Franch, X.1
Maiden, N.A.M.2
-
25
-
-
15944398393
-
A software fault tree approach to requirements analysis of an intrusion detection system
-
In P. Loucopoulos & J. Mylopoulos (Ed.), Requirements Engineering
-
Helmer, G., Wong, J., Slagell, M., Honavar, V., Miller, L., & Lutz, R. (2002). A software fault tree approach to requirements analysis of an intrusion detection system. In P. Loucopoulos & J. Mylopoulos (Ed.), Special Issue on Requirements Engineering for Information Security. Requirements Engineering (Vol. 7, No. 4, pp. 177-220).
-
(2002)
Special Issue On Requirements Engineering For Information Security
, vol.7
, Issue.4
, pp. 177-220
-
-
Helmer, G.1
Wong, J.2
Slagell, M.3
Honavar, V.4
Miller, L.5
Lutz, R.6
-
26
-
-
0039372661
-
Viewing business-process security from different perspectives
-
Herrmann, G., & Pernul, G. (1999). Viewing business-process security from different perspectives. International Journal of Electronic Commerce, 3(3), 89-103.
-
(1999)
International Journal of Electronic Commerce
, vol.3
, Issue.3
, pp. 89-103
-
-
Herrmann, G.1
Pernul, G.2
-
28
-
-
0003680794
-
-
Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University
-
Kazman, R., Klein, M., & Clements, P. (2000). ATAM: Method for architectural evaluation (CMU/SEI-2000-TR-004). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University.
-
(2000)
ATAM: Method For Architectural Evaluation (CMU/SEI-2000-TR-004)
-
-
Kazman, R.1
Klein, M.2
Clements, P.3
-
29
-
-
0942288555
-
Designing information systems in social context: A goal and scenario modelling approach
-
Liu, L., & Yu, E. (2003). Designing information systems in social context: A goal and scenario modelling approach. Information Systems, 29(2), 187-203.
-
(2003)
Information Systems
, vol.29
, Issue.2
, pp. 187-203
-
-
Liu, L.1
Yu, E.2
-
32
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
September, Monterey, CA
-
Liu, L., Yu, E., & Mylopoulos, J. (2003, September). Security and privacy requirements analysis within a social setting. Proceedings of International Conference on Requirements Engineering (RE'03) (pp. 151-161). Monterey, CA.
-
(2003)
Proceedings of International Conference On Requirements Engineering (RE'03)
, pp. 151-161
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
34
-
-
84883288824
-
Towards a risk-based security requirements engineering framework
-
(CAiSE), Porto, Portugal
-
Mayer, N., Rifaut, A., & Dubois, E. (2005). Towards a risk-based security requirements engineering framework. Workshop on Requirements Engineering For Software Quality (REFSQ'05), at the Conference for Advanced Information Systems Engineering (CAiSE), Porto, Portugal.
-
(2005)
Workshop On Requirements Engineering For Software Quality (REFSQ'05), At the Conference For Advanced Information Systems Engineering
-
-
Mayer, N.1
Rifaut, A.2
Dubois, E.3
-
41
-
-
85023549755
-
Security constraint processing in multilevel secure AMAC schemata
-
November 23-25, Toulouse, France. Lecture Notes in Computer Science 648. Springer
-
nd European Symposium on Research in Computer Security (ESORICS 1992) (pp. 349-370). Toulouse, France. Lecture Notes in Computer Science 648. Springer.
-
(1992)
nd European Symposium On Research In Computer Security (ESORICS 1992)
, pp. 349-370
-
-
Pernul, G.1
-
44
-
-
0032660946
-
Experience with goal-scenario coupling in requirements engineering
-
June, Limerick, Ireland
-
Rolland, C., Grosz, G., & Kla, R. (1999, June). Experience with goal-scenario coupling in requirements engineering. Proceedings of the IEEE International Symposium on Requirements Engineering, Limerick, Ireland.
-
(1999)
Proceedings of the IEEE International Symposium On Requirements Engineering
-
-
Rolland, C.1
Grosz, G.2
Kla, R.3
-
45
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
In R. Focardi & R. Gorrieri (Eds.), LNCS 2171
-
Samarati, P., & Vimercati, S. (2001). Access control: Policies, models, and mechanisms. In R. Focardi & R. Gorrieri (Eds.), Foundations of security analysis and design: Tutorial lectures (pp. 137-196). LNCS 2171.
-
(2001)
Foundations of Security Analysis and Design: Tutorial Lectures
, pp. 137-196
-
-
Samarati, P.1
Vimercati, S.2
-
46
-
-
0037252218
-
January/February). Good enough security: Towards a business driven discipline
-
Sandhu, R. (2003, January/February). Good enough security: Towards a business driven discipline. IEEE Internet Computing, 7(1), 66-68.
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.1
, pp. 66-68
-
-
Sandhu, R.1
-
47
-
-
0030086382
-
Role-based access control models
-
February
-
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., & Youman, C. E. (1996, February). Role-based access control models. IEEE Computer, 29(2), 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
48
-
-
0006964066
-
-
Dr. Dobb's Journal, December. Retrieved from
-
Schneier, B. (1999). Attack trees modelling security threats. Dr. Dobb's Journal, December. Retrieved from http://www.counterpane.com/attacktrees-ddj-ft.html
-
(1999)
Attack Trees Modelling Security Threats
-
-
Schneier, B.1
-
54
-
-
84904255922
-
A new paradigm for adding security into IS development methods
-
In J. Eloff, L. Labuschagne, R. von Solms, & G. Dhillon (Eds.), Boston: Kluwer Academic Publishers
-
Siponen, M. T., & Baskerville, R. (2001). A new paradigm for adding security into IS development methods. In J. Eloff, L. Labuschagne, R. von Solms, & G. Dhillon (Eds.), Advances in information security management & small systems security (pp. 99-111). Boston: Kluwer Academic Publishers.
-
(2001)
Advances In Information Security Management & Small Systems Security
, pp. 99-111
-
-
Siponen, M.T.1
Baskerville, R.2
-
55
-
-
0028384062
-
Responsibility modelling as a technique for requirements definition
-
Strens, M. R., & Dobson, J. E. (1994). Responsibility modelling as a technique for requirements definition. IEEE, 3(1), 20-26.
-
(1994)
IEEE
, vol.3
, Issue.1
, pp. 20-26
-
-
Strens, M.R.1
Dobson, J.E.2
-
59
-
-
17744386105
-
From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering
-
September, Monterey, CA
-
van Lamsweerde, A., Brohez, S., Landtsheer, R., & Janssens, D. (2003, September). From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering. Proceedings of the RE'03 Workshop on Requirements for High Assurance Systems (RHAS'03) (pp. 49-56). Monterey, CA.
-
(2003)
Proceedings of the RE'03 Workshop On Requirements For High Assurance Systems (RHAS'03)
, pp. 49-56
-
-
van Lamsweerde, A.1
Brohez, S.2
Landtsheer, R.3
Janssens, D.4
-
62
-
-
0003696369
-
Agent orientation as a modelling paradigm
-
April
-
Yu, E. (2001a, April). Agent orientation as a modelling paradigm. Wirtschaftsinformatik, 43(2), 123-132.
-
(2001)
Wirtschaftsinformatik
, vol.43
, Issue.2
, pp. 123-132
-
-
Yu, E.1
-
65
-
-
0141693389
-
Modelling trust in the i* strategic actors framework
-
June 3-4, Barcelona, Catalonia, Spain (at Agents2000)
-
rd Workshop on Deception, Fraud and Trust in Agent Societies, Barcelona, Catalonia, Spain (at Agents2000).
-
(2000)
rd Workshop On Deception, Fraud and Trust In Agent Societies
-
-
Yu, E.1
Liu, L.2
-
66
-
-
84942921136
-
Modelling trust for system design using the i* strategic actors framework
-
In R. Falcone, M. Singh, & Y. H. Tan (Eds.), LNAI-2246. Springer
-
Yu, E., & Liu, L.(2001). Modelling trust for system design using the i* strategic actors framework. In R. Falcone, M. Singh, & Y. H. Tan (Eds.), Trust in cyber-societies--integrating the human and artificial perspectives (pp. 175-194). LNAI-2246. Springer.
-
(2001)
Trust In Cyber-societies--integrating the Human and Artificial Perspectives
, pp. 175-194
-
-
Yu, E.1
Liu, L.2
|