共 50 条
- [1] A Security Ontology for Security Requirements Elicitation ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 157 - 175
- [2] Security Requirements Elicitation and Modeling Authorizations SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 239 - 250
- [3] Requirements of practice in relation to the existing information technology and security management competencies 2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1411 - 1416
- [4] Security Requirements Elicitation and Assessment Mechanism (SecREAM) 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1862 - 1866
- [5] Requirements Elicitation and Derivation of Security Policy Templates 2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2016, : 283 - 292
- [6] Security requirements elicitation: a smart health case PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 776 - 781
- [7] Security Requirements Elicitation from Business Processes BUSINESS PROCESS MANAGEMENT WORKSHOPS( BPM 2014), 2015, 202
- [8] Requirements Elicitation for Geo-information Solutions CARTOGRAPHIC JOURNAL, 2017, 54 (01): : 77 - 90
- [9] A Combined Process for Elicitation and Analysis of Safety and Security Requirements ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, BPMDS 2012, 2012, 113 : 347 - 361
- [10] Security Requirements Elicitation from Airline Turnaround Processes BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2018, 60 (01): : 3 - 20