-
2
-
-
0001094070
-
The use of the ccta risk analysis and management methodology cramm in health information systems
-
K. Lun, P. Degoulet, T. Piemme, and O. Rien-hoff, editors, Amsterdam, North Holland Publishing Co
-
B. Barber and J. Davey. The use of the ccta risk analysis and management methodology cramm in health information systems. In K. Lun, P. Degoulet, T. Piemme, and O. Rien-hoff, editors, MEDINFO 92, pages 1589-1593, Amsterdam, 1992. North Holland Publishing Co.
-
(1992)
MEDINFO 92
, pp. 1589-1593
-
-
Barber, B.1
Davey, J.2
-
4
-
-
60949103111
-
Intgegrating model-based security risk management into ebusiness systems development: The coras approach
-
J. Monteiro, P. Swat-man, and L. Tavares, editors, Kluwer
-
T. Dimitrakos, B. Ritchie, D. Raptis, J. O. Aagedal, F. Den Braber, K. Stølen, and S. Houmb. Intgegrating model-based security risk management into ebusiness systems development: The coras approach. In J. Monteiro, P. Swat-man, and L. Tavares, editors, Second IFIP Conference on E-Commerce, E-Business, E-Government (I3E 2002), volume 233 of IFIP Conference Proceedings, pages 159-175. Kluwer, 2002.
-
(2002)
Second IFIP Conference on E-commerce, E-business, E-government (I3E 2002), Volume 233 of IFIP Conference Proceedings
, pp. 159-175
-
-
Dimitrakos, T.1
Ritchie, B.2
Raptis, D.3
Aagedal, J.O.4
Den Braber, F.5
Stølen, K.6
Houmb, S.7
-
7
-
-
0021635235
-
The logic flowgraph: A new approach to process failure modeling and diagnonsis for disturbance analysis applications
-
S. Guarro and D. Okrent. The logic flowgraph: A new approach to process failure modeling and diagnonsis for disturbance analysis applications. Nuclear Technology, page 67, 1984.
-
(1984)
Nuclear Technology
, pp. 67
-
-
Guarro, S.1
Okrent, D.2
-
12
-
-
79955163100
-
UMLsec: Extending UML for secure systems development
-
J.-M. Jézéquel, H. Hussmann, and S. Cook, editors, Dresden, Sept. 30 - Oct. 4, Springer
-
J. Jürjens. UMLsec: Extending UML for secure systems development. In J.-M. Jézéquel, H. Hussmann, and S. Cook, editors, UML 2002 - The Unified Modeling Language, volume 2460 of LNCS, pages 412-425, Dresden, Sept. 30 - Oct. 4 2002. Springer.
-
(2002)
UML 2002 - The Unified Modeling Language, Volume 2460 of LNCS
, pp. 412-425
-
-
Jürjens, J.1
-
13
-
-
84944709557
-
-
Formal Methods Symposium
-
J. Jürjens. Developing Security-Critical Systems with UML, 2003. Series of tutorials at international conferences including OMG DOCsec 2002, IFIP SEC 2002, APPLIED INFORMATICS 2003, ETAPS 2003, OMG Workshop On UML for Enterprise Applications 2003, Formal Methods Symposium 2003. Download of material at http://www4.in. tum.de/~juerjens/csdumltut.
-
(2003)
Developing Security-critical Systems with UML, 2003. Series of Tutorials at International Conferences Including OMG DOCsec 2002, IFIP SEC 2002, APPLIED INFORMATICS 2003, ETAPS 2003, OMG Workshop on UML for Enterprise Applications 2003
-
-
Jürjens, J.1
-
15
-
-
84944709558
-
-
number TUM-I0208 in TUM technical report, UML'02 satellite workshop proceedings
-
J. Jürjens, V. Cengarle, E. Fernandez, B. Rumpe, and R. Sandner, editors. Critical Systems Development with UML, number TUM-I0208 in TUM technical report, 2002. UML'02 satellite workshop proceedings.
-
(2002)
Critical Systems Development with UML
-
-
Jürjens, J.1
Cengarle, V.2
Fernandez, E.3
Rumpe, B.4
Sandner, R.5
-
16
-
-
0023427061
-
Application of goal tree-success tree model as the knowledge-base of operator advisory system
-
I. Kim and M. Modarres. Application of Goal Tree-Success Tree Model as the Knowledge-Base of Operator Advisory System. Nuclear Engineering & Design J., 104:67-81, 1987.
-
(1987)
Nuclear Engineering & Design J.
, vol.104
, pp. 67-81
-
-
Kim, I.1
Modarres, M.2
-
18
-
-
84902976571
-
Structuring and design of reactive systems using RSDS and B
-
LNCS. Springer-Verlag
-
K. Lano, K. Androutsopoulos, and D. Clark. Structuring and Design of Reactive Systems using RSDS and B. In FASE 2000, LNCS. Springer-Verlag, 2000.
-
(2000)
FASE 2000
-
-
Lano, K.1
Androutsopoulos, K.2
Clark, D.3
-
19
-
-
85134575114
-
A proposal for a lightweight rigorous UML-based development method for reliable systems
-
Lecture Notes in Informatics, German Computer Society GI, UML 2001 satellite workshop
-
R. Paige and J. Ostroff. A proposal for a lightweight rigorous UML-based development method for reliable systems. In Workshop on Practical UML-Based Rigorous Development Methods, Lecture Notes in Informatics, pages 192-207. German Computer Society (GI), 2001. UML 2001 satellite workshop.
-
(2001)
Workshop on Practical UML-based Rigorous Development Methods
, pp. 192-207
-
-
Paige, R.1
Ostroff, J.2
-
20
-
-
84944683046
-
Security-critical system development with extended use cases
-
Chiangmai Thailand, 10-12 December. IEEE Computer Society
-
G. Popp, J. Jürjens, G. Wimmel, and R. Breu. Security-critical system development with extended use cases. In 10th Asia-Pacific Software Engineering Conference (APSEC 2003), Chiangmai (Thailand), 10-12 December 2003. IEEE Computer Society.
-
(2003)
10th Asia-pacific Software Engineering Conference (APSEC 2003)
-
-
Popp, G.1
Jürjens, J.2
Wimmel, G.3
Breu, R.4
-
22
-
-
20444404422
-
The CORAS Approach for Model-based Risk Management applied to e-Commerce Domain
-
Kluwer
-
D. Raptis, T. Dimitrakos, B. Gran, and K. Stølen. The CORAS Approach for Model-based Risk Management applied to e-Commerce Domain. In Proc. CMS-2002, pages 169-181. Kluwer, 2002.
-
(2002)
Proc. CMS-2002
, pp. 169-181
-
-
Raptis, D.1
Dimitrakos, T.2
Gran, B.3
Stølen, K.4
-
24
-
-
0034497420
-
Eliciting security requirements by misuse cases
-
Sydney, Australia, Los Alamitos, CA: IEEE Computer Society Press
-
G. Sindre and A. Opdahl. Eliciting Security Requirements by Misuse Cases. In Proc. TOOLS-PACIFIC 2000, pages 120-131, Sydney, Australia, 2000. Los Alamitos, CA: IEEE Computer Society Press.
-
(2000)
Proc. TOOLS-PACIFIC 2000
, pp. 120-131
-
-
Sindre, G.1
Opdahl, A.2
-
25
-
-
27144463943
-
-
chapter Model-based Risk Assessment in a Component-Based Software Engineering Process: The CORAS Approach to Identify Security Risks, Kluwer
-
K. Stølen, F. Den Braber, T. Dimitrakos, R. Fredriksen, B. Gran, S. Houmb, Y. Stamatiou, and J. Aagedal. Business Component-Based Software Engineering, chapter Model-based Risk Assessment in a Component-Based Software Engineering Process: The CORAS Approach to Identify Security Risks, pages 189-207. Kluwer, 2002. ISBN: 1-4020-7207-4.
-
(2002)
Business Component-based Software Engineering
, pp. 189-207
-
-
Stølen, K.1
Den Braber, F.2
Dimitrakos, T.3
Fredriksen, R.4
Gran, B.5
Houmb, S.6
Stamatiou, Y.7
Aagedal, J.8
-
26
-
-
84944709560
-
Experience from using model-based risk assessment to evaluate the security of a telemedicine application
-
K. Stølen and E. Mantzoranis. Experience from using model-based risk assessment to evaluate the security of a telemedicine application. In Proc. TICD-2002, 2002.
-
(2002)
Proc. TICD-2002
-
-
Stølen, K.1
Mantzoranis, E.2
|