-
1
-
-
33847713115
-
Considering operational security risks during systems development
-
Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University
-
Alberts, C., Dorofee, A., & Woody, C. (2004). Considering operational security risks during systems development. Proceedings of the Software Engineering Process Group 2004 Conference. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University.
-
(2004)
Proceedings of the Software Engineering Process Group 2004 Conference
-
-
Alberts, C.1
Dorofee, A.2
Woody, C.3
-
2
-
-
0037240812
-
Misuse cases: Use cases with hostile intent
-
Alexander, I. (2003). Misuse cases: Use cases with hostile intent. IEEE Software, 20, 58-66.
-
(2003)
IEEE Software
, vol.20
, pp. 58-66
-
-
Alexander, I.1
-
4
-
-
84899177295
-
How to fake a rational design process using the SCR method
-
Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University
-
Bharadwaj, R. (2003). How to fake a rational design process using the SCR method. SEHAS'03 International Workshop on Software Engineering for High Assurance Systems. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University.
-
(2003)
SEHAS'03 International Workshop On Software Engineering For High Assurance Systems
-
-
Bharadwaj, R.1
-
6
-
-
0041954816
-
An application of soft systems methodology
-
New York: John Wiley & Sons
-
Checkland, P. (1989). An application of soft systems methodology. In Rational Analysis for a Problematic World (pp. 101-119). New York: John Wiley & Sons.
-
(1989)
Rational Analysis For a Problematic World
, pp. 101-119
-
-
Checkland, P.1
-
7
-
-
84870801040
-
-
Rep. No. CMU/SEI-2004-SR-015, Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from
-
Chen, P., Mead, N. R., Dean, M., Lopez, L., Ojoko-Adams, D., Osman, H., & Xie, N. (2004). SQUARE methodology: Case study on asset management system (Rep. No. CMU/SEI-2004-SR-015). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from http://www.sei.cmu.edu/publications/documents/04.reports/04sr015.html
-
(2004)
SQUARE Methodology: Case Study On Asset Management System
-
-
Chen, P.1
Mead, N.R.2
Dean, M.3
Lopez, L.4
Ojoko-Adams, D.5
Osman, H.6
Xie, N.7
-
9
-
-
84869280094
-
-
Retrieved November 9, 2005, from
-
Cornford, S. L., Feather, M. S., & Hicks, K. A. (2004). DDP: A tool for life-cycle risk management. Retrieved November 9, 2005, from http://ddptool.jpl.nasa.gov/docs/f344d-slc.pdf
-
(2004)
DDP: A Tool For Life-cycle Risk Management
-
-
Cornford, S.L.1
Feather, M.S.2
Hicks, K.A.3
-
12
-
-
84873162530
-
-
(Rep. No. CMU/SEI-2005-SR-005). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from
-
Gordon, D., Mead, N. R., Stehney, T., Wattas, N., & Yu, E. (2005). System quality requirements engineering (SQUARE) methodology: Case study on asset management system, Phase II (Rep. No. CMU/SEI-2005-SR-005). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from http://www.sei.cmu.edu/publications/documents/05.reports/05sr005.html
-
(2005)
System Quality Requirements Engineering (SQUARE) Methodology: Case Study On Asset Management System, Phase II
-
-
Gordon, D.1
Mead, N.R.2
Stehney, T.3
Wattas, N.4
Yu, E.5
-
14
-
-
0018918712
-
Specifying software requirements for complex systems: New techniques and their application
-
Heninger, K. L. (1980). Specifying software requirements for complex systems: New techniques and their application. IEEE Transactions on Software Engineering SE-6, 2-13.
-
(1980)
IEEE Transactions On Software Engineering SE-6
, pp. 2-13
-
-
Heninger, K.L.1
-
15
-
-
0033683937
-
An assessment of the relative efficiency of a facilitator-driven requirements collection process with respect to the conventional interview method
-
Hubbard, R., Schroeder, C. N., & Mead, N. (2000). An assessment of the relative efficiency of a facilitator-driven requirements collection process with respect to the conventional interview method. ICRE 2000, 178-188.
-
(2000)
ICRE
, vol.2000
, pp. 178-188
-
-
Hubbard, R.1
Schroeder, C.N.2
Mead, N.3
-
16
-
-
84899191728
-
-
INFOSEC Assessment Methodology, Retrieved November 9, 2005, from
-
INFOSEC Assessment Methodology. (2004). INFOSEC assurance training and rating program. Retrieved November 9, 2005, from http://www.iatrp.com/iam.cfm
-
(2004)
INFOSEC Assurance Training and Rating Program
-
-
-
17
-
-
0003512056
-
-
(Rep. No. CMU/SEI-90-TR-021, ADA235785). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from
-
Kang, K. C., Cohen, S. G., Hess, J. A., Novak, W. E., & Peterson, A. S. (1990). Featureoriented domain analysis (FODA) feasibility study (Rep. No. CMU/SEI-90-TR-021, ADA235785). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from http://www.sei.cmu.edu/publications/documents/90.reports/90.tr.021.html
-
(1990)
Featureoriented Domain Analysis (FODA) Feasibility Study
-
-
Kang, K.C.1
Cohen, S.G.2
Hess, J.A.3
Novak, W.E.4
Peterson, A.S.5
-
20
-
-
84958970458
-
Organizational modeling for efficient specification of information security requirements
-
Berlin: Springer-Verlag
-
Leiwo, J., Gamage, C., & Zheng, Y. (1999b). Organizational modeling for efficient specification of information security requirements. Advances in Databases and Information Systems: Third East European Conference, ADBIS'99 (pp. 247-260). Berlin: Springer-Verlag.
-
(1999)
Advances In Databases and Information Systems: Third East European Conference, ADBIS'99
, pp. 247-260
-
-
Leiwo, J.1
Gamage, C.2
Zheng, Y.3
-
22
-
-
84869274246
-
-
Retrieved November 9, 2005, from
-
Lipson, H. F., Mead, N. R., & Moore, A. P. (2001). A risk-management approach to the design of survivable cots-based systems. Retrieved November 9, 2005, from http://www.cert.org/research/isw/isw2001/papers/Lipson-29-08-a.pdf
-
(2001)
A Risk-management Approach to The Design of Survivable Cots-based Systems
-
-
Lipson, H.F.1
Mead, N.R.2
Moore, A.P.3
-
26
-
-
84873155281
-
-
Retrieved November 9, 2005, from
-
Mead, N. R. (2002). Survivable systems analysis method. Retrieved November 9, 2005, from http://www.cert.org/archive/html/analysis-method.html
-
(2002)
Survivable Systems Analysis Method
-
-
Mead, N.R.1
-
27
-
-
70349532335
-
-
(Rep. No. CMU/SEI-2003-TN-013). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from
-
Mead, N. R. (2003). Requirements engineering for survivable systems (Rep. No. CMU/SEI-2003-TN-013). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from http://www.sei.cmu.edu/publications/documents/03.reports/03tn013.html
-
(2003)
Requirements Engineering For Survivable Systems
-
-
Mead, N.R.1
-
28
-
-
33750131444
-
-
(Rep. No. CMU/SEI-2005-TR-009). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from
-
Mead, N. R., Hough, E., & Stehney, T. (2005a). Security quality requirements engineering (SQUARE) methodology (Rep. No. CMU/SEI-2005-TR-009). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from http://www.sei.cmu.edu/publications/documents/05.reports/05tr009.html
-
(2005)
Security Quality Requirements Engineering (SQUARE) Methodology
-
-
Mead, N.R.1
Hough, E.2
Stehney, T.3
-
29
-
-
85088409477
-
-
Paper presented at the meeting of the Software Engineering for Secure Systems (SESS05), ICSE 2005 International Workshop on Requirements for High Assurance Systems, St. Louis, MO
-
Mead, N. R., & Stehney, T. (2005b). Security quality requirements engineering (SQUARE) methodology. Paper presented at the meeting of the Software Engineering for Secure Systems (SESS05), ICSE 2005 International Workshop on Requirements for High Assurance Systems, St. Louis, MO.
-
(2005)
Security Quality Requirements Engineering (SQUARE) Methodology
-
-
Mead, N.R.1
Stehney, T.2
-
30
-
-
0038226150
-
-
(Rep. No. CMU/SEI-2001-TN-001, ADA388771), Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from
-
Moore, A. P., Ellison, R. J., & Linger, R. C. (2001). Attack modeling for information security and survivability (Rep. No. CMU/SEI-2001-TN-001, ADA388771). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from http://www.sei.cmu.edu/publications/documents/01.reports/01tn001.html
-
(2001)
Attack Modeling For Information Security and Survivability
-
-
Moore, A.P.1
Ellison, R.J.2
Linger, R.C.3
-
32
-
-
28344437756
-
-
National Institute of Standards and Technology (NIST), Rep. No. NIST 2002-10, Gaithersburg: National Institute of Standards and Technology. Retrieved November 9, 2005, from
-
National Institute of Standards and Technology (NIST). (2002). Software errors cost U.S. economy $59.5 billion annually (Rep. No. NIST 2002-10). Gaithersburg: National Institute of Standards and Technology. Retrieved November 9, 2005, from http://www.nist.gov/public_affairs/releases/n02-10.htm
-
(2002)
Software Errors Cost U.S. Economy $59.5 Billion Annually
-
-
-
34
-
-
34249848744
-
-
QFD Institute, Retrieved November 9, 2005, from
-
QFD Institute. (2005). Frequently asked questions about QFD. Retrieved November 9, 2005, from http://www.qfdi.org/what_is_qfd/faqs_about_qfd.htm
-
(2005)
Frequently Asked Questions About QFD
-
-
-
35
-
-
84958057954
-
The use of the B formal method for the design and validation of the transaction mechanism for smart card applications
-
Berlin: Springer-Verlag
-
Sabatier, D., & Lartigue, P. (1999). The use of the B formal method for the design and validation of the transaction mechanism for smart card applications. In FM '99: World Congress on Formal Methods (Vol. 1, pp. 348-368). Berlin: Springer-Verlag.
-
(1999)
FM '99: World Congress On Formal Methods
, vol.1
, pp. 348-368
-
-
Sabatier, D.1
Lartigue, P.2
-
38
-
-
0034497420
-
Eliciting security requirements by misuse cases
-
Los Alamitos: IEEE Computer Society Press
-
Sindre, G., & Opdahl, A. (2000). Eliciting security requirements by misuse cases. Proceedings of TOOLS Pacific 2000 (pp. 120-130). Los Alamitos: IEEE Computer Society Press.
-
(2000)
Proceedings of TOOLS Pacific 2000
, pp. 120-130
-
-
Sindre, G.1
Opdahl, A.2
-
39
-
-
13644271504
-
Generalization/specialization as a structuring mechanism for misuse cases
-
Lafayette: CERIAS
-
Sindre, G., Opdahl, S., & Brevik, G. (2002). Generalization/specialization as a structuring mechanism for misuse cases. In SREIS 2002, Second Symposium on Requirements Engineering for Information Security. Lafayette: CERIAS.
-
(2002)
SREIS 2002, Second Symposium On Requirements Engineering For Information Security
-
-
Sindre, G.1
Opdahl, S.2
Brevik, G.3
-
41
-
-
3042809894
-
Tangible ROI through secure software engineering
-
Soo Hoo, K., Sudbury, A. W., & Jaquith, A. R. (2001). Tangible ROI through secure software engineering. Secure Business Quarterly, 1.
-
(2001)
Secure Business Quarterly
, pp. 1
-
-
Soo Hoo, K.1
Sudbury, A.W.2
Jaquith, A.R.3
-
42
-
-
1842829828
-
-
Rep. No. 800-30, Gaithersburg: National Institute of Standards and Technology. Retrieved November 9, 2005, from
-
Stoneburner, G., Goguen, A., & Feringa, A. (2002). Risk management guide for information technology systems (Rep. No. 800-30). Gaithersburg: National Institute of Standards and Technology. Retrieved November 9, 2005, from http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf
-
(2002)
Risk Management Guide For Information Technology Systems
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
43
-
-
84899274516
-
CORE: The method
-
Systems Designers Scientific, Camberley: Pembroke House
-
Systems Designers Scientific. (1985). CORE: The method. In CORE Manual, 1.0. Camberley: Pembroke House.
-
(1985)
CORE Manual, 1.0
-
-
-
46
-
-
77953800669
-
-
(Rep. No. CMU/SEI-2005-TN-010). Pittsburgh, PA: Software Engineering Inst., Carnegie Mellon University. Retrieved from
-
Woody, C. (2005). Eliciting and analyzing quality requirements: Management influences on software quality requirements (Rep. No. CMU/SEI-2005-TN-010). Pittsburgh, PA: Software Engineering Inst., Carnegie Mellon University. Retrieved from http://www.sei.cmu.edu/publications/documents/05.reports/05tn010.html
-
(2005)
Eliciting and Analyzing Quality Requirements: Management Influences On Software Quality Requirements
-
-
Woody, C.1
-
47
-
-
77950540268
-
-
Panel presented at the European SEPG, London
-
Woody, C, Hall, A., & Clark, J. (2004). Can secure systems be built using today's development processes? Panel presented at the European SEPG, London.
-
(2004)
Can Secure Systems Be Built Using Today's Development Processes?
-
-
Woody, C.1
Hall, A.2
Clark, J.3
-
48
-
-
33846588652
-
-
(Rep. No. CMU/SEI-2004-TN-045). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from
-
Xie, N., Mead, N. R., Chen, P., Dean, M., Lopez, L., Ojoko-Adams, D., & Osman, H. (2004). SQUARE project: Cost/benefit analysis framework for information security improvement projects in small companies (Rep. No. CMU/SEI-2004-TN-045). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from http://www.sei.cmu.edu/publications/documents/04.reports/04tn045.html
-
(2004)
SQUARE Project: Cost/benefit Analysis Framework For Information Security Improvement Projects In Small Companies
-
-
Xie, N.1
Mead, N.R.2
Chen, P.3
Dean, M.4
Lopez, L.5
Ojoko-Adams, D.6
Osman, H.7
|