1. Asnar, Y., Moretti, R., Sebastianis, M., Zannone, N.: Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach. In: Proc. of DAWAM 2008, pp. 1240–1248. IEEE Press, Los Alamitos (2008)
2. Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.E.: Basic Concepts and Taxonomy of Dependable and Secure Computing. TDSC 1(1), 11–33 (2004)
3. Braber, F., Hogganvik, I., Lund, M.S., Stolen, K., Vraalsen, F.: Model-based security analysis in seven steps — a guided tour to the coras method. BT Technology Journal 25(1), 101–117 (2007)
4. Chung, L., Nixon, B.A., Yu, E., Mylopoulos, J. (eds.): Non-Functional Requirements in Software Engineering. Kluwer Academic Publishing, Dordrecht (2000)
5. Common Vulnerability Scoring System,
http://www.first.org/cvss/