Model based security risk analysis for web applications: the CORAS approach
暂无分享,去创建一个
Brian Ritchie | Ketil Stølen | Theodosis Dimitrakos | Dimitris Raptis | D. Raptis | K. Stølen | Theodosis Dimitrakos | B. Ritchie
[1] Daoud Ait Kadi,et al. A STATE-OF-THE-ART REVIEW OF FMEA/FMECA , 1994 .
[2] Barbara Paech,et al. Component-based product line engineering with UML , 2001, Addison Wesley object technology series.
[3] Theodosis Dimitrakos,et al. System Models, e-Risks and e-Trust - Towards bridging the gap? , 2001, I3E.
[4] Bev Littlewood,et al. A Reliability Model for Systems with Markov Structure , 1975 .
[5] Ivar Jacobson,et al. The Unified Software Development Process , 1999 .
[6] Thomas Peltier,et al. Information Technology: Code of Practice for Information Security Management , 2001 .
[7] Geri Schneider,et al. Applying Use Cases: A Practical Guide , 1998 .
[8] Alistair Cockburn,et al. Structuring Use Cases with Goals , 2000 .
[9] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2004, Requirements Engineering.
[10] 日本規格協会. 情報技術 : 情報セキュリティ管理実施基準 : 国際規格 : ISO/IEC 17799 = Information technology : code of practice for infromation security management : international standard : ISO/IEC 17799 , 2000 .
[11] Nick Feamster,et al. Dos and don'ts of client authentication on the web , 2001 .