A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems
- 1 January 2006
- conference paper
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 1044-1053
- https://doi.org/10.1007/11751595_109
Abstract
No abstract availableThis publication has 11 references indexed in Scilit:
- Automatic Translation Form Requirements Model into Use Cases Modeling on UMLLecture Notes in Computer Science, 2005
- Towards a Systematic Development of Secure SystemsInformation Systems Security, 2004
- Security and privacy requirements analysis within a social settingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Specifying Reusable Security Requirements.The Journal of Object Technology, 2004
- Using abuse case models for security requirements analysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Security Use Cases.The Journal of Object Technology, 2003
- Engineering Security Requirements.The Journal of Object Technology, 2003
- Observations on balancing discipline and agilityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Requirements Reuse for Improving Information Systems Security: A Practitioner’s ApproachRequirements Engineering, 2002
- A New Paradigm for Adding Security into is Development MethodsPublished by Springer Science and Business Media LLC ,2001