Information Technology Reference
In-Depth Information
26. Jackson M (1995) Software requirements & specifications: a lexicon of practice, principles
and prejudices. ACM/Addison-Wesley, New York
27. Jackson M (2001) Problem frames: analyzing and structuring software development problems.
Addison-Wesley, New York
28. Jürjens J (2002) UMLsec: extending uml for secure systems development. In: Proceedings
of the 5th international conference on the unified modeling language (UML'02). LNCS, vol
2460. Springer, pp 412-425
29. van Lamsweerde A (2004) Elaborating security requirements by construction of intentional
anti-models. In: Proceedings of the 26th international conference on software engineering
(ICSE'04), IEEE Computer Society, pp 148-157
30. van Lamsweerde A, Letier E (2000) Handling obstacles in goal-oriented requirements
engineering. IEEE Trans Softw Eng 26:978-1005
31. Lin L, Nuseibeh B, Ince D, Jackson M (2004) Using abuse frames to bound the scope of
security problems. In: Proceedings of the 12th IEEE international conference on requirements
engineering (RE'04), IEEE Computer Society, pp 354-355
32. Lin L, Nuseibeh B, Ince D, Jackson M, Moffett JD (2003) Analysing security threats and
vulnerabilities using abuse frames. Technical report No: 2003/10, Open University
33. Lin L, Nuseibeh B, Ince D, Jackson M, Moffett JD (2003) Introducing abuse frames for
analysing security requirements. In: Proceedings of the 11th IEEE international conference
on requirements engineering (RE'03), IEEE Computer Society, pp 371-372
34. Liu L, Yu E, Mylopoulos J (2003) Security and privacy requirements analysis within a
social setting. In: Proceedings of the 11th IEEE international conference on requirements
engineering (RE'03), IEEE Computer Society, p 151
35. Lodderstedt T, Basin D, Doser J (2002) SecureUML: a UML-based modeling language for
model-driven security. In: Proceedings of the 5th international conference on the unified
modeling language (UML'02), Springer, pp 426-441
36. Matulevicius R, Mayer N, Heymans P (2008) Alignment of misuse cases with security risk
management. In: Proceedings of the 3rd international conference on availability, reliability
and security (ARES'08), IEEE Computer Society, pp 1397-1404
37. Matulevicius R, Mayer N, Mouratidis H, Dubois E, Heymans P, Genon N (2008) Adapting
secure tropos for security risk management during early phases of the information systems
development. In: Proceedings of the 20th international conference on advanced information
systems engineering (CAiSE'08). LNCS, vol 5074. Springer, pp 541-555
38. Mayer N (2009) Model-based management of information system security risk. PhD thesis,
University of Namur
39. Mayer N, Genon N (2006) Design of a modelling language for information system secu-
rity risk management -elicitation of relationships between concepts and meta-model of each
source. Technical report. University of Namur
40. Mayer N, Heymans P, Matulevicius R (2007) Design of a modelling language for informa-
tion system security risk management. In: Proceedings of the 1st international conference
on research challenges in information science (RCIS'07), IEEE Xplore Digital Library, pp
121-132
41. Mayer N, Rifaut, A, Dubois E (2005) Towards a risk-based security requirements engineering
framework. In: Proceedings of the 11th international workshop on requirements engineering:
foundation for software quality (REFSQ'05), Springer, pp 83-97
42. McDermott J, Fox C (1999) Using abuse case models for security requirements analysis. In:
Proceedings of the 15th annual computer security applications conference (ACSAC'99), IEEE
Computer Society, pp 55-65
43. Mead NR, Hough ED, Stehney TR (2005) Security quality requirements engineer-
ing (SQUARE) methodology. Technical report CMU/SEI-2005-TR-009, ESC-TR-2005-
009Carnegie Mellon University - Software Engineering Institute, Pittsburgh, PA
44. Moffett JD, Nuseibeh B (2003) A framework for security requirements engineering. Report
YCS 368 Department of Computer Science, University of York, UK
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Search WWH ::




Custom Search