-
1
-
-
84903534674
-
ISO/iec 27000-information technology-security techniques-information security management systems-overview and vocabulary
-
International Organization for Standardization (ISO)
-
International Organization for Standardization (ISO), "ISO/IEC 27000-Information technology-Security techniques-Information security management systems-Overview and vocabulary," ISO/IEC 27001:2005(E), 2009.
-
(2009)
ISO/IEC 27001:2005(E)
-
-
-
2
-
-
79955143136
-
SecureUML: A uml-based modeling language for model-driven security
-
Dresden, Germany
-
T. Lodderstedt, D. Basin, and J. Doser, "SecureUML: A UML-Based Modeling Language for Model-Driven Security," in Proc. of The 5th International Conference on The Unified Modeling Language, Dresden, Germany, 2002, pp. 426-441.
-
(2002)
Proc. of the 5th International Conference on the Unified Modeling Language
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
3
-
-
84944220091
-
Towards development of secure systems using umlsec
-
Ed: Springer Berlin Heidelberg
-
J. Jürjens, "Towards Development of Secure Systems Using UMLsec," in Fundamental Approaches to Software Engineering. vol. 2029, ed: Springer Berlin Heidelberg, 2001, pp. 187-200.
-
(2001)
Fundamental Approaches to Software Engineering.
, vol.2029
, pp. 187-200
-
-
Jürjens, J.1
-
4
-
-
17744386105
-
System goals to intruder anti-goals: Attack generation and resolution for security requirements engineering
-
A. Lamsweerde, S. Brohez, and e. al, "System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering," in Proc. of the RE'03 Workshop on Requirements for High Assurance Systems, Monterey, 2003, pp. 49-56.
-
(2003)
Proc. of the RE'03 Workshop on Requirements for High Assurance Systems, Monterey
, pp. 49-56
-
-
Lamsweerde, A.1
Brohez, S.2
-
5
-
-
84860672038
-
Secure: Engineering secure software systems through social analysis
-
L. Liu, E. Yu, and J. Mylopoulos, "Secure: Engineering Secure Software Systems through Social Analysis," International Journal of Software and Informatics, vol. Vol. 3, pp. 89-120, 2009.
-
(2009)
International Journal of Software and Informatics
, vol.3
, pp. 89-120
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
6
-
-
33746038490
-
Towards a comprehensive framework for secure systems development
-
E. Dubois and K. Pohl, Eds., ed: Springer Berlin / Heidelberg
-
H. Mouratidis, J. Jürjens, and J. Fox, "Towards a Comprehensive Framework for Secure Systems Development," in Advanced Information Systems Engineering. vol. 4001, E. Dubois and K. Pohl, Eds., ed: Springer Berlin / Heidelberg, 2006, pp. 48-62.
-
(2006)
Advanced Information Systems Engineering.
, vol.4001
, pp. 48-62
-
-
Mouratidis, H.1
Jürjens, J.2
Fox, J.3
-
8
-
-
84903553635
-
-
National Institute of standards and technology (NIST), Washington: U. S. Government Printing 2002, Accessed on August
-
National Institute of standards and technology (NIST), "The Federal Information Security Management Act (FISMA)," Washington: U. S. Government Printing2002, http://csrc. nist. gov/ drivers/documents/FISMA-final. pdf, Accessed on August 2012.
-
(2012)
The Federal Information Security Management Act (FISMA)
-
-
-
9
-
-
34748905890
-
POSITIF: A policy-based security management system
-
C. Basile, A. Lioy, G. M. Perez, F. J. G. Clemente, and A. F. G. Skarmeta, "POSITIF: A Policy-Based Security Management System," in Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, 2007. POLICY '07, 2007, pp. 280-280.
-
(2007)
Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, 2007. POLICY '07
, pp. 280-280
-
-
Basile, C.1
Lioy, A.2
Perez, G.M.3
Clemente, F.J.G.4
Skarmeta, A.F.G.5
-
12
-
-
4143084933
-
The coras framework for a model-based risk management process
-
S. Anderson, M. Felici, and S. Bologna, Eds., ed: Springer Berlin / Heidelberg
-
R. Fredriksen, M. Kristiansen, B. Gran, and K. Stølen, "The CORAS Framework for a Model-Based Risk Management Process," in Computer Safety, Reliability and Security. vol. 2434, S. Anderson, M. Felici, and S. Bologna, Eds., ed: Springer Berlin / Heidelberg, 2002, pp. 39-53.
-
(2002)
Computer Safety, Reliability and Security.
, vol.2434
, pp. 39-53
-
-
Fredriksen, R.1
Kristiansen, M.2
Gran, B.3
Stølen, K.4
-
14
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre, and A. Opdahl, "Eliciting security requirements with misuse cases," Requir. Eng., vol. 10, pp. 34-44, 2005.
-
(2005)
Requir. Eng.
, vol.10
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.2
-
15
-
-
77950520810
-
A vulnerabilitycentric requirements engineering framework: Analyzing security attacks, countermeasures, and requirements based on vulnerabilities
-
G. Elahi, E. Yu, and N. Zannone, "A vulnerabilitycentric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities," Requir. Eng., vol. 15, pp. 41-62, 2010.
-
(2010)
Requir. Eng.
, vol.15
, pp. 41-62
-
-
Elahi, G.1
Yu, E.2
Zannone, N.3
-
16
-
-
84903541442
-
Adaptable, model-driven security engineering for saas cloud-based applications
-
M. Almorsy, J. Grundy, and A. S. Ibrahim, "Adaptable, Model-driven Security Engineering for SaaS Cloud-based Applications," Automated Software Engineering Journal, vol. 29, 2013, pp1-38.
-
(2013)
Automated Software Engineering Journal
, vol.29
, pp. 1-38
-
-
Almorsy, M.1
Grundy, J.2
Ibrahim, A.S.3
-
17
-
-
84903548669
-
-
Common Criteria for Information Technology Security Evaluation, Accessed on August
-
Common Criteria for Information Technology Security Evaluation, "Part 1: Introduction and general model, Version 3. 1," 2006, http://www. commoncriteriaportal. org/files/ccfiles/CC PART1V3. 1R1. pdf, Accessed on August 2013.
-
(2013)
Part 1: Introduction and General Model, Version 3. 1 2006
-
-
-
18
-
-
73449140991
-
The physics" of notations: Toward a scientific basis for constructing visual notations in software engineering
-
D. Moody, "The "Physics" of Notations: Toward a Scientific Basis for Constructing Visual Notations in Software Engineering," IEEE Transactions on Software Engineering, vol. 35, pp. 756-779, 2009.
-
(2009)
IEEE Transactions on Software Engineering
, vol.35
, pp. 756-779
-
-
Moody, D.1
|