共 50 条
- [1] Using Security and Domain ontologies for Security Requirements Analysis 2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, : 101 - 107
- [2] Selecting Security Patterns that Fulfill Security Requirements PROCEEDINGS OF THE 16TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, 2008, : 169 - +
- [3] Decision-Making in Security Requirements Engineering with Constrained Goal Models COMPUTER SECURITY, 2017, 2018, 10683 : 262 - 280
- [4] Relating Security Requirements and Design Patterns Reducing Security Requirements implementation impacts with Design Patterns 2009 FOURTH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ADVANCES (ICSEA 2009), 2009, : 9 - 14
- [6] Security Requirements Analysis Using Knowledge in CAPEC ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS, 2014, 178 : 343 - 348
- [8] Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns IT-INFORMATION TECHNOLOGY, 2013, 55 (06): : 225 - 230
- [9] Managing Security Requirements Patterns using Feature Diagram Hierarchies 2014 IEEE 22ND INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2014, : 193 - 202
- [10] Security requirements for civil aviation with UML and goal orientation Requirements Engineering: Foundation for Software Quality, 2007, 4542 : 292 - 299