Towards usable cyber security requirements
暂无分享,去创建一个
Debra J. Richardson | Jose Romero-Mariona | Hadar Ziv | Dennis Bystritsky | D. Richardson | H. Ziv | Jose Romero-Mariona | Dennis Bystritsky
[1] Julia H. Allen,et al. Governing for Enterprise Security , 2005 .
[2] N. Hallberg,et al. The Usage-Centric Security Requirements Engineering (USeR) Method , 2006, 2006 IEEE Information Assurance Workshop.
[3] M. Eltoweissy,et al. Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[4] John Viega. Building security requirements with CLASP , 2005, SOEN.
[5] Martyn Fletcher,et al. Applying Security Design Analysis to a service‐based system , 2005, Softw. Pract. Exp..
[6] Ivar Jacobson,et al. Object-oriented software engineering - a use case driven approach , 1993, TOOLS.