Information Technology Reference
In-Depth Information
[12] Pfleeger, C.P., Pfleeger, S.L.: Security In Computing, 3rd edn. Prentice Hall PTR,
Englewood Cliffs (2003)
[13] Rapanotti, L., Hall, J.G., Jackson, M., Nuseibeh, B.: Architecture-driven problem
decomposition. In: Proceedings of the IEEE International Requirements Engineer-
ing Conference (RE), pp. 80-89. IEEE Computer Society, Los Alamitos (2004)
[14] Schmidt, H.: A Pattern- and Component-Based Method to Develop Secure Soft-
ware. Deutscher Wissenschafts-Verlag (DWV) Baden-Baden (April 2010)
[15] Schmidt, H., Jurjens, J.: UMLsec4UML2 - adopting UMLsec to support UML2.
Technical Report 838, Technical University of Dortmund (February 2011),
http://hdl.handle.net/2003/27602
[16] Shaw, M., Garlan, D.: Software Architecture. Perspectives on an Emerging Dis-
cipline. Prentice Hall PTR, Englewood Cliffs (1996)
 
 
Search WWH ::




Custom Search