Engineering secure software by modelling privacy and security requirements
暂无分享,去创建一个
[1] Ian Sommerville,et al. Requirements Engineering: Processes and Techniques , 1998 .
[2] Hans van Vliet,et al. Software engineering - principles and practice , 1993 .
[3] Gwm Matthias Rauterberg,et al. Moderation Instead of Modelling: Some Remarks about Formal and Informal Reengineering Methods , 1996 .
[4] Bertrand Meyer,et al. On Formalism in Specifications , 1985, IEEE Software.
[5] Simone Fischer-Hübner,et al. IT-Security and Privacy , 2001, Lecture Notes in Computer Science.
[6] Pierre Flener,et al. Specifications are necessarily informal or: Some more myths of formal methods , 1998, J. Syst. Softw..
[7] Ishbel Duncan,et al. Visualising Privacy and Security for Requirements Engineering , 2004, Software Engineering Research and Practice.
[8] Jonathan P. Bowen,et al. Seven More Myths of Formal Methods , 1995, IEEE Softw..
[9] Kate Finney,et al. Mathematical Notation in Formal Specification: Too Difficult for the Masses? , 1996, IEEE Trans. Software Eng..
[10] Barry W. Boehm,et al. Software Engineering Economics , 1993, IEEE Transactions on Software Engineering.
[11] S. Fischer-Hübner. IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms , 2001 .
[12] Premkumar T. Devanbu,et al. Software engineering for security: a roadmap , 2000, ICSE '00.
[13] David Harel,et al. On visual formalisms , 1988, CACM.