共 50 条
- [1] Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation [J]. COMPUTER SECURITY, 2017, 2018, 10683 : 210 - 225
- [3] Visualising privacy and security for requirements engineering [J]. SERP'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2004, : 813 - 819
- [4] Applying a security requirements engineering process [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 192 - 206
- [5] Towards a Common Security and Privacy Requirements Elicitation Methodology [J]. GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 151 - 159
- [6] Engineering secure software by modelling privacy and security requirements [J]. 39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 37 - 40
- [7] Requirements Engineering for Security, Privacy and Services in Cloud Environments [J]. Requirements Engineering, 2013, 18 : 297 - 298
- [9] Which Security Requirements Engineering Methodology Should I Choose? Towards a Requirements Engineering-based Evaluation Approach [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,