Author:
Siqueira Alexssander A.,Reinehr Sheila,Malucelli Andreia
Publisher
Springer International Publishing
Reference10 articles.
1. Ponsard, C., Massonet, P., Rifaut, A., Molderez, J.F.: Early verification and validation of mission critical systems. Formal Methods Syst. Des. 30, 233–247 (2007). doi:
10.1016/j.entcs.2004.08.067
2. El-Attar, M.: From misuse cases to mal-activity diagrams - bridging the gap between functional security analysis and design. Softw. Syst. Model. 13, 173–190 (2014). doi:
10.1007/s10270-012-0240-5
3. Futcher, L., Solms, R.: Guidelines for secure software development. In: Proceedings of 2008 Conference of South African Institute of Computer Scientists and Information Technologists (SAICSIT), pp. 56–65. SAICSIT in Association with ACM, Port Elizabeth, South Africa (2008). doi:
10.1145/1456659.1456667
4. Khan, R.A., Mustafa, K.: From threat to security indexing - a causal chain. Comput. Fraud Secur. 5, 9–12 (2009). doi:
10.1016/S1361-3723(09)70059-4
5. ISO/IEC 15408: 2009 - Information technology - Security techniques - Evaluation criteria for IT security Information technology. International Organization for Standardization/International Electrotechnical Commission, Geneva (2009)