共 50 条
- [32] Time Independent Security Analysis for Dynamic Networks using Graphical Security Models 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 588 - 595
- [33] Integrating Security Aspects into Business Process Models IT-INFORMATION TECHNOLOGY, 2013, 55 (06): : 239 - 245
- [34] Automated verification of UMLsec models for security requirements UML 2004 - THE UNIFIED MODELING LANGUAGE: MODELING LANGUAGES AND APPLICATIONS, PROCEEDINGS, 2004, 3273 : 365 - 379
- [35] Designing security requirements models through planning ADVANCED INFORMATION SYSTEMS ENGINEERING, PROCEEDINGS, 2006, 4001 : 33 - 47
- [36] Enforcing security in smart homes using security patterns International Journal of Smart Home, 2009, 3 (02): : 57 - 70
- [37] Integrating Goal Models and Problem Frames for Requirements Analysis of Self-adaptive CPS 2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, : 529 - 535
- [39] Generating Secure Workflow Designs from Requirements Goal Models Using Patterns CONCEPTUAL MODELING, ER 2024, 2025, 15238 : 195 - 214
- [40] Enterprise assets security requirements construction from ESRMG grammar based on security patterns 14TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2007, : 112 - +