共 50 条
- [1] Problem-Based Security Requirements Elicitation and Refinement with PresSuRE [J]. SOFTWARE TECHNOLOGIES, ICSOFT 2014, 2015, 555 : 311 - 330
- [2] A Security Ontology for Security Requirements Elicitation [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 157 - 175
- [3] Security Requirements Elicitation Using Method Weaving and Common Criteria [J]. MODELS IN SOFTWARE ENGINEERING, 2009, 5421 : 185 - +
- [4] Security requirements elicitation via weaving scenarios based on security evaluation criteria [J]. USIC 2007: PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2007, : 70 - 79
- [5] Argumentation-Based Security Requirements Elicitation: The Next Round [J]. 2014 IEEE 1ST WORKSHOP ON EVOLVING SECURITY AND PRIVACY REQUIREMENTS ENGINEERING (ESPRE), 2014, : 7 - 12
- [6] An Ontology Based Collaborative Recommender System for Security Requirements Elicitation [J]. 2018 IEEE 26TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2018), 2018, : 448 - 453
- [8] Security analysis of word problem-based cryptosystems [J]. Designs, Codes and Cryptography, 2010, 54 : 29 - 41
- [9] Presentation and Validation of Method for Security Requirements Elicitation from Business Processes [J]. INFORMATION SYSTEMS ENGINEERING IN COMPLEX ENVIRONMENTS, 2015, 204 : 20 - 35
- [10] Security Requirements Elicitation and Modeling Authorizations [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 239 - 250