nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comparison of security requirements engineering methods
|
Fabian, Benjamin |
|
2009 |
15 |
1 |
p. 7-40 |
artikel |
2 |
A UML-based static verification framework for security
|
Siveroni, Igor |
|
2009 |
15 |
1 |
p. 95-118 |
artikel |
3 |
A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
|
Elahi, Golnaz |
|
2009 |
15 |
1 |
p. 41-62 |
artikel |
4 |
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec
|
Houmb, Siv Hilde |
|
2009 |
15 |
1 |
p. 63-93 |
artikel |
5 |
Evaluating existing security and privacy requirements for legal compliance
|
Massey, Aaron K. |
|
2009 |
15 |
1 |
p. 119-137 |
artikel |
6 |
Guest editorial: security requirements engineering: past, present and future
|
Dubois, Eric |
|
2009 |
15 |
1 |
p. 1-5 |
artikel |