Author:
Almorsy Mohamed,Grundy John,Ibrahim Amani S.
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Anderson, R.: What is Security Engineering? In: Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd edn., pp. 3–12. Wiley and Sons, Indianapolis (2001)
2. Phan, T., Han, J., et al.: SOABSE: An approach to realizing business-oriented security requirements with Web Service security policies. In: Proc. Int. Conf. on Service-Oriented Computing and Applications, Taipei, Taiwan, pp. 1–10 (2009)
3. Lecture Notes in Computer Science;J. Jürjens,2001
4. Mouratidis, H., Jurjens, J.: From goal-driven security requirements engineering to secure design. Int. Journal of Intelligent Systems 25, 813–840 (2010)
5. Sanchez-Cid, F., Mana, A.: SERENITY Pattern-Based Software Development Life-Cycle. In: Proc. 19th Int. Workshop on Database and Expert Systems Application, Italy, pp. 305–309 (2008)
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. UMLsecRT: Reactive Security Monitoring of Java Applications With Round-Trip Engineering;IEEE Transactions on Software Engineering;2024-01
2. Runtime Monitoring of Human-Centric Requirements in Machine Learning Components: A Model-Driven Engineering Approach;2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C);2023-10-01
3. Self-adaptive and secure mechanism for IoT based multimedia services: a survey;Multimedia Tools and Applications;2021-01-27
4. Data-Driven Software Architecture for Analyzing Confidentiality;2019 IEEE International Conference on Software Architecture (ICSA);2019-03
5. Modeling of dynamic trust contracts for industry 4.0 systems;Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings;2018-09-24