Analysing Security Requirements of Information Systems Using Tropos
暂无分享,去创建一个
[1] Haralambos Mouratidis,et al. Using Tropos Methodology to Model an Integrated Health Assessment System , 2002, AOIS@CAiSE.
[2] Marco Pistore,et al. Model checking early requirements specifications in Tropos , 2001, Proceedings Fifth IEEE International Symposium on Requirements Engineering.
[3] Ivar Jacobson,et al. The Unified Software Development Process , 1999 .
[4] Haralambos Mouratidis,et al. Analysis and Design of the eSAP: An Integrated Health and Social Care Information System , 2003, Health Informatics J..
[5] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[6] Luiz Marcio Cysneiros,et al. Designing for privacy and other competing requirements , 2002 .
[7] Premkumar T. Devanbu,et al. Software engineering for security: a roadmap , 2000, ICSE '00.
[8] Butler W. Lampson,et al. 31. Paper: Computer Security in the Real World Computer Security in the Real World , 2022 .
[9] Stephen Fickas,et al. Goal-Directed Requirements Acquisition , 1993, Sci. Comput. Program..
[10] Catherine A. Meadows,et al. A model of computation for the NRL Protocol Analyzer , 1994, Proceedings The Computer Security Foundations Workshop VII.