Identifying Potential Security Flaws using Loophole Analysis and the SECREt
暂无分享,去创建一个
[1] Konstantin Beznosov,et al. Security for the Rest of Us: An Industry Perspective on the Secure-Software Challenge , 2008, IEEE Software.
[2] Axel van Lamsweerde,et al. Reasoning about confidentiality at requirements engineering time , 2005, ESEC/FSE-13.
[3] John Mylopoulos,et al. Security and privacy requirements analysis within a social setting , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..
[4] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2004, Requirements Engineering.
[5] Jan Jürjens,et al. UMLsec: Extending UML for Secure Systems Development , 2002, UML.
[6] Nancy R. Mead. Identifying Security Requirements Using the Security Quality Requirements Engineering (SQUARE) Method , 2007 .
[7] John P. McDermott,et al. Using abuse case models for security requirements analysis , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[8] Betty H. C. Cheng,et al. Research Directions in Requirements Engineering , 2007, Future of Software Engineering (FOSE '07).