Holistic security requirement engineering for electronic commerce
暂无分享,去创建一个
[1] Eugene Tucker,et al. Risk Analysis and the Security Survey , 1999 .
[2] Henry M. Franken,et al. Information security embedded in the design of telematics systems , 1997, Comput. Secur..
[3] Jim Goldman,et al. Metrics based security assessment (MBSA): combining the ISO 17799 standard with the systems security engineering capability maturity model (SSE-CMM) , 2004 .
[4] F. Schneider. Trust in Cyberspace , 1998 .
[5] Louise Yngström,et al. A systemic-holistic approach to academic programmes in IT security , 1996 .
[6] Ian K. Bray,et al. An Introduction to Requirements Engineering , 2002 .
[7] Dean Leffingwell,et al. Managing software requirements: a unified approach , 1999 .
[8] Albin Zuccato,et al. Towards a systemic holistic security management , 2002 .
[9] Luo Huai,et al. System Security Engineering Capability Maturity Model , 2003 .
[10] Stephanie Teufel,et al. The use of business process models for security design in organisations , 1996, SEC.
[11] Suzanne Robertson,et al. Mastering the Requirements Process , 1999 .
[12] M. Hammer,et al. REENGINEERING THE CORPORATION: A MANIFESTO FOR BUSINESS REVOLUTION , 1995 .
[13] Sebastiaan H. von Solms,et al. A technique to include computer security, safety, and resilience requirements as part of the requirements specification , 1995, J. Syst. Softw..
[14] Evangelos A. Kiountouzis,et al. The use of business process modelling in information systems security analysis and design , 2000, Inf. Manag. Comput. Secur..
[15] Shari Lawrence Pfleeger,et al. A framework for security requirements , 1991, Comput. Secur..
[16] Rossouw von Solms,et al. From Risk Analysis to Security Requirements , 2001, Comput. Secur..
[17] Thomas Peltier,et al. Information Technology: Code of Practice for Information Security Management , 2001 .
[18] R. Winter,et al. Business Engineering: Auf dem Weg zum Unternehmen des Informationszeitalters , 2000 .
[19] John P. McDermott,et al. Using abuse case models for security requirements analysis , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[20] Ivar Jacobson,et al. The Unified Software Development Process , 1999 .
[21] Sebastiaan H. von Solms,et al. Information Security - A Multidimensional Discipline , 2001, Comput. Secur..