A UML Profile for the Identification and Analysis of Security Risks during Structured Brainstorming
暂无分享,去创建一个
[1] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2004, Requirements Engineering.
[2] Ketil Stølen,et al. Maintaining results from security assessments , 2003, Seventh European Conference onSoftware Maintenance and Reengineering, 2003. Proceedings..
[3] Ketil Stølen,et al. The CORAS methodology: model-based risk assessment using UML and UP , 2003 .
[4] Ian F. Alexander,et al. Misuse Cases: Use Cases with Hostile Intent , 2003, IEEE Softw..
[5] John Krogstie,et al. Evaluating UML using a generic quality framework , 2003 .
[6] David A. Basin,et al. SecureUML: A UML-Based Modeling Language for Model-Driven Security , 2002, UML.
[7] Jan Jürjens,et al. UMLsec: Extending UML for Secure Systems Development , 2002, UML.
[8] Thomas Peltier,et al. Information Technology: Code of Practice for Information Security Management , 2001 .
[9] Andreas L. Opdahl,et al. Templates for Misuse Case Description , 2001 .