共 50 条
- [1] Security Requirements Elicitation Using Method Weaving and Common Criteria [J]. MODELS IN SOFTWARE ENGINEERING, 2009, 5421 : 185 - +
- [2] A Security Ontology for Security Requirements Elicitation [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 157 - 175
- [3] Security Requirements Elicitation and Modeling Authorizations [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 239 - 250
- [4] Problem-based Elicitation of Security Requirements The ProCOR Method [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, 2018, : 26 - 38
- [5] Argumentation-Based Security Requirements Elicitation: The Next Round [J]. 2014 IEEE 1ST WORKSHOP ON EVOLVING SECURITY AND PRIVACY REQUIREMENTS ENGINEERING (ESPRE), 2014, : 7 - 12
- [6] Problem-Based Security Requirements Elicitation and Refinement with PresSuRE [J]. SOFTWARE TECHNOLOGIES, ICSOFT 2014, 2015, 555 : 311 - 330
- [7] An Ontology Based Collaborative Recommender System for Security Requirements Elicitation [J]. 2018 IEEE 26TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2018), 2018, : 448 - 453
- [8] Measuring IT security - A method based on common criteria's security functional requirements [J]. PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 226 - 233
- [9] Requirements Elicitation and Derivation of Security Policy Templates [J]. 2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2016, : 283 - 292
- [10] Security Requirements Elicitation and Assessment Mechanism (SecREAM) [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1862 - 1866