Using abuse case models for security requirements analysis
暂无分享,去创建一个
[1] 정인기,et al. [서평]「Applying UML and Patterns - An Introduction to Object-Oriented Analysis and Design」 , 1998 .
[2] Dan Thomsen,et al. Role based access control framework for network enterprises , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[3] Craig Larman,et al. Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and Iterative Development (3rd Edition) , 1997 .
[4] Michael A. Cusumano,et al. How Microsoft builds software , 1997, CACM.
[5] Ravi S. Sandhu,et al. The RRA97 model for role-based administration of role hierarchies , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[6] Bruce Schneier,et al. Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP) , 1998, CCS '98.
[7] Ivar Jacobson,et al. The unified modeling language reference manual , 2010 .