Applying a Security Requirements Engineering Process
- 1 January 2006
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 192-206
- https://doi.org/10.1007/11863908_13
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- A common criteria based security requirements engineering process for the development of secure information systemsComputer Standards & Interfaces, 2007
- A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information SystemsLecture Notes in Computer Science, 2006
- Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislationComputer Standards & Interfaces, 2005
- Automatic Translation Form Requirements Model into Use Cases Modeling on UMLLecture Notes in Computer Science, 2005
- Towards a Systematic Development of Secure SystemsInformation Systems Security, 2004
- Security Use Cases.The Journal of Object Technology, 2003
- Engineering Security Requirements.The Journal of Object Technology, 2003
- Requirements Reuse for Improving Information Systems Security: A Practitioner’s ApproachRequirements Engineering, 2002