Elaborating security requirements by construction of intentional anti-models
暂无分享,去创建一个
[1] Paul Jones,et al. Secrets and Lies: Digital Security in a Networked World , 2002 .
[2] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[3] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2004, Requirements Engineering.
[4] Peter Neumann,et al. Safeware: System Safety and Computers , 1995, SOEN.
[5] George S. Avrunin,et al. Patterns in property specifications for finite-state verification , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[6] Bashar Nuseibeh,et al. Security requirements engineering: when anti-requirements hit the fan , 2002, Proceedings IEEE Joint International Conference on Requirements Engineering.
[7] Naji Habra,et al. ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis , 1992, ESORICS.
[8] Axel van Lamsweerde,et al. Requirements engineering in the year 00: a research perspective , 2000, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.
[9] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[10] David R. Barstow,et al. Proceedings of the 25th International Conference on Software Engineering , 1978, ICSE.
[11] Axel van Lamsweerde,et al. Deriving operational software specifications from system goals , 2002, SIGSOFT '02/FSE-10.
[12] M.S. Feather,et al. Reconciling system requirements and runtime behavior , 1998, Proceedings Ninth International Workshop on Software Specification and Design.
[13] Jonathan K. Millen,et al. Three systems for cryptographic protocol analysis , 1994, Journal of Cryptology.
[14] David Lorge Parnas,et al. Functional Documents for Computer Systems , 1995, Sci. Comput. Program..
[15] Stephen Fickas,et al. Goal-Directed Requirements Acquisition , 1993, Sci. Comput. Program..
[16] Axel van Lamsweerde,et al. Handling Obstacles in Goal-Oriented Requirements Engineering , 2000, IEEE Trans. Software Eng..
[17] Jennifer Seberry,et al. Fundamentals of Computer Security , 2003, Springer Berlin Heidelberg.
[18] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[19] John Mylopoulos,et al. Security and privacy requirements analysis within a social setting , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..
[20] Axel van Lamsweerde,et al. Formal refinement patterns for goal-driven requirements elaboration , 1996, SIGSOFT '96.
[21] Vasant Honavar,et al. A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System , 2002, Requirements Engineering.
[22] Axel van Lamsweerde,et al. Goal-Oriented Requirements Engineering: A Guided Tour , 2001, RE.
[23] Somesh Jha,et al. Verifying security protocols with Brutus , 2000, TSEM.
[24] Ken Frazer,et al. Building secure software: how to avoid security problems the right way , 2002, SOEN.
[25] Giovanni Vigna,et al. Security Testing of the Online Banking Service of a Large International Bank , 2000 .
[26] William N. Robinson,et al. Requirements interaction management , 2003, CSUR.
[27] Colin Potts,et al. Using schematic scenarios to understand user needs , 1995, Symposium on Designing Interactive Systems.
[28] Andrew P. Moore,et al. Attack Modeling for Information Security and Survivability , 2001 .
[29] Axel van Lamsweerde,et al. Agent-based tactics for goal-oriented requirements elaboration , 2002, ICSE '02.
[30] John Mylopoulos,et al. Non-Functional Requirements in Software Engineering , 2000, International Series in Software Engineering.
[31] Annie I. Antón,et al. Analyzing Website privacy requirements using a privacy goal taxonomy , 2002, Proceedings IEEE Joint International Conference on Requirements Engineering.
[32] Jeannette M. Wing. A symbiotic relationship between formal methods and security , 1998, Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358).
[33] Axel van Lamsweerde,et al. Managing Conflicts in Goal-Driven Requirements Engineering , 1998, IEEE Trans. Software Eng..
[34] Ian F. Alexander,et al. Misuse Cases: Use Cases with Hostile Intent , 2003, IEEE Softw..
[35] Edward G. Amoroso,et al. Fundamentals of computer security technology , 1994 .
[36] Bashar Nuseibeh,et al. Introducing abuse frames for analysing security requirements , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..