Misuse Cases + Assets + Security Goals
暂无分享,去创建一个
[1] Bashar Nuseibeh,et al. Security Requirements Engineering: A Framework for Representation and Analysis , 2008, IEEE Transactions on Software Engineering.
[2] John P. McDermott,et al. Using abuse case models for security requirements analysis , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[3] Nancy R. Mead,et al. Security quality requirements engineering (SQUARE) methodology , 2005, SESS@ICSE.
[4] Hidehiko Tanaka,et al. Secure Software Development through Coding Conventions and Frameworks , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[5] Ian F. Alexander,et al. Modelling the Interplay of Conflicting Goals with Use and Misuse Cases , 2002, GBPM.
[6] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2000, Proceedings 37th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Pacific 2000.
[7] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2004, Requirements Engineering.
[8] Hidehiko Tanaka,et al. Web security patterns for analysis and design , 2008, PLoP '08.
[9] Nancy R. Mead,et al. Security quality requirements engineering (SQUARE) methodology , 2005, SESS@ICSE.
[10] Axel van Lamsweerde,et al. Elaborating security requirements by construction of intentional anti-models , 2004, Proceedings. 26th International Conference on Software Engineering.
[11] John Mylopoulos,et al. Security and privacy requirements analysis within a social setting , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..
[12] Donald Firesmith,et al. Security Use Cases , 2003, J. Object Technol..