A System for Seamless Support from Security Requirements Analysis to Security Design Using a Software Security Knowledge Base
暂无分享,去创建一个
Atsuo Hazeyama | Hironori Washizaki | Nobukazu Yoshioka | Takafumi Tanaka | Takao Okubo | Haruhiko Kaiya | Hikaru Miyahara | H. Kaiya | H. Washizaki | A. Hazeyama | T. Okubo | Takafumi Tanaka | Nobukazu Yoshioka | Hikaru Miyahara
[1] Jan Jürjens,et al. Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec , 2010, Requirements Engineering.
[2] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2004, Requirements Engineering.
[3] Eduardo B. Fernandez,et al. A Methodology to Develop Secure Systems Using Patterns , 2006 .
[4] Axelle Apvrille,et al. Secure software development by example , 2005, IEEE Security & Privacy Magazine.
[5] Gary McGraw,et al. Knowledge for Software Security , 2005, IEEE Secur. Priv..
[6] Peter Sommerlad,et al. Security Patterns: Integrating Security and Systems Engineering , 2006 .
[7] Joshua J. Pauli,et al. Threat-Driven Design and Analysis of Secure Software Architectures , 2006 .
[8] Wouter Joosen,et al. Does organizing security patterns focus architectural choices? , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[9] Gary McGraw. Software Security , 2012, Datenschutz und Datensicherheit - DuD.
[10] Mario Piattini,et al. Security patterns and requirements for internet-based applications , 2006, Internet Res..
[11] Hironori Washizaki,et al. Validating Security Design Patterns Application Using Model Testing , 2013, 2013 International Conference on Availability, Reliability and Security.
[12] Ralph E. Johnson,et al. Growing a pattern language (for security) , 2012, Onward! 2012.