共 50 条
- [2] DEVELOPMENT OF SECURITY METRICS Based on Decomposition of Security Requirements and Ontologies ICSOFT 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL 2, 2009, : 171 - 174
- [3] Security and trust requirements engineering FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 237 - 272
- [5] Applying a security requirements engineering process COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 192 - 206
- [7] A pattern system for security requirements engineering ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 356 - +
- [8] Visualising privacy and security for requirements engineering SERP'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2004, : 813 - 819
- [10] A comparison of security requirements engineering methods Requirements Engineering, 2010, 15 : 7 - 40