Creating and Applying Security Goal Indicator Trees in an Industrial Environment
暂无分享,去创建一个
[1] R. J. Shields,et al. Effects of diet transition regimen on survival, growth and lipid composition of intensively reared Atlantic cod, Gadus morhua, larvae , 2004, Aquaculture International.
[2] David Evans,et al. Improving Security Using Extensible Lightweight Static Analysis , 2002, IEEE Softw..
[3] Filippo Lanubile,et al. Does active guidance improve software inspections? A preliminary empirical study , 2004, IASTED Conf. on Software Engineering.
[4] Michael A. Howard,et al. A process for performing security code reviews , 2006, IEEE Security & Privacy.
[5] Paul A. Strooper,et al. Selecting V&V Technology Combinations: How to Pick a Winner? , 2007, 12th IEEE International Conference on Engineering Complex Computer Systems (ICECCS 2007).
[6] Adam A. Porter,et al. Comparing Detection Methods For Software Requirements Inspections: A Replication Using Professional Subjects , 1998, Empirical Software Engineering.
[7] Bashar Nuseibeh,et al. A framework for security requirements engineering , 2006, SESS '06.
[8] Frank Elberzhager,et al. Practical Experience Gained from Modeling Security Goals: Using SGITs in an Industrial Project , 2010, 2010 International Conference on Availability, Reliability and Security.
[9] Per Runeson,et al. What do we know about defect detection methods? [software testing] , 2006, IEEE Software.
[10] Frank Elberzhager,et al. Software Inspections Using Guided Checklists to Ensure Security Goals , 2009, 2009 International Conference on Availability, Reliability and Security.
[11] Gary McGraw,et al. Software Penetration Testing , 2005, IEEE Secur. Priv..
[12] Michael Fagan. Design and Code Inspections to Reduce Errors in Program Development , 1976, IBM Syst. J..
[13] Marek Jawurek,et al. Security Goal Indicator Trees: A Model of Software Features that Supports Efficient Security Inspection , 2008, 2008 11th IEEE High Assurance Systems Engineering Symposium.