Author:
Souag Amina,Mazo Raúl,Salinesi Camille,Comyn-Wattiau Isabelle
Publisher
Springer Science and Business Media LLC
Subject
Information Systems,Software
Reference117 articles.
1. Mayer N (2012) Model-based management of information system security risk. Presses universitaires de Namur, Namur, Belgieum
2. Giorgini P, Massacci F, Zannone N (2005) Security and trust requirements engineering. In: Aldini A, Gorrieri R, Martinelli F (eds) Foundations of security analysis and design III. Springer, Berlin, pp 237–272
3. Liu L, Yu E, Mylopoulos J (2002) Analyzing security requirements as relationships among strategic actors. In: Proceedings of the 2nd symposium on requirements engineering for information security
4. Mouratidis H (2006) Analysing security requirements of information systems using tropos, January-2006. (Online). http://roar.uel.ac.uk/409/ . Consulted 17 Nov 2012
5. Van Lamsweerde A (2004) Elaborating security requirements by construction of intentional anti-models. In: Proceedings of 26th international conference on software engineering, 2004. ICSE 2004, pp 148–157
Cited by
40 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献