共 50 条
- [2] A comparison of security requirements engineering methods Requirements Engineering, 2010, 15 : 7 - 40
- [3] Operational requirements for security measures 34TH ANNUAL 2000 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2000, : 64 - 70
- [4] Modeling and Utilizing Security Knowledge for Eliciting Security Requirements ADVANCES IN CONCEPTUAL MODELING, ER 2015 WORKSHOPS, 2015, 9382 : 236 - 247
- [5] Security and trust requirements engineering FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 237 - 272
- [6] A study on the security evaluation methods of security function requirements 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2004, : 54 - 57
- [8] Requirements engineering for improving business/IT alignment in security risk management methods ENTERPRISE INTEROPERABILITY II: NEW CHALLENGES AND APPROACHES, 2007, : 15 - 26
- [10] Applying a security requirements engineering process COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 192 - 206