Author:
Pavlidis Michalis,Mouratidis Haralambos,Panaousis Emmanouil,Argyropoulos Nikolaos
Publisher
Springer International Publishing
Reference43 articles.
1. McDermott, J., Fox, C.: Using abuse case models for security requirements analysis. In: 15th Annual Computer Security Applications Conference, (ACSAC 1999) Proceedings, pp. 55–64. IEEE (1999)
2. Basin, D., Doser, J., Lodderstedt, T.: Model driven security for process-oriented systems. In: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies, pp. 100–109. ACM (2003)
3. Mouratidis, H.: Integrating Security and Software Engineering: Advances and Future Visions: Advances and Future Visions. IGI Global, Hershey (2006)
4. Haley, C.B., Laney, R., Moffett, J.D., Nuseibeh, B.: Arguing satisfaction of security requirements. Integr. Secur. Softw. Eng. Adv. Future Vis. 16–43 (2006)
5. Fabian, B., Gürses, S., Heisel, M., Santen, T., Schmidt, H.: A comparison of security requirements engineering methods. Requir. Eng. 15(1), 7–40 (2010)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献