共 50 条
- [21] Alignment of misuse cases with security risk management ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1397 - +
- [22] Enhancing Misuse Cases With Risk Assessment for Safety Requirements IEEE ACCESS, 2020, 8 : 12001 - 12014
- [23] A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 4827 - 4836
- [26] Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns IT-INFORMATION TECHNOLOGY, 2013, 55 (06): : 225 - 230
- [27] Developing Precise Misuse Cases with Security Robustness Analysis 22ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING & KNOWLEDGE ENGINEERING (SEKE 2010), 2010, : 571 - 576
- [28] Towards Security Risk-Oriented Misuse Cases BUSINESS PROCESS MANAGEMENT WORKSHOPS (BPM), 2013, 132 : 689 - 700
- [29] Misuse cases help to elicit non-functional requirements Computing and Control Engineering Journal, 2003, 14 (01): : 40 - 45
- [30] Misuse, Abuse, and Reuse: Economic utility functions for characterising security requirements PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 572 - 581