共 19 条
[1]
Anton A.I., Earp J.B., A requirements taxonomy for reducing web site privacy vulnerabilities, Requirements Engineering, 9, 3, pp. 169-185, (2004)
[2]
Schumacher M., Roedig U., Security Engineering with Patterns, In the Proceedings of the 8th Conference On Pattern Languages for Programs, (2001)
[3]
van Lamsweerde A., Letier E., Handling obstacles in goal-oriented requirements engineering, Transactions of Software Engineering, 26, 10, pp. 978-1005, (2000)
[4]
Crook R., Ince D., Lin L., Nuseibeh B., Security requirements engineering: When anti-requirements hit the fan, International Requirements Engineering Conference, pp. 203-205, (2002)
[5]
Lin L.C., Nuseibeh B., Ince D., Jackson M., Moffett J., Analysing security threats and vulnerabilities using abuse frames, Technical Report 2003/10, (2003)
[6]
Liu L., Yu E., Mylopoulos J., Security and privacy requirements analysis within a social setting, Proceedings of the 11th International Requirements Engineering Conference, pp. 151-161, (2003)
[7]
McDermott J., Fox C., Using abuse care models for security requirements analysis, Proceedings of the 15th Annual Computer Security Applications Conference, (1999)
[8]
Sindre G., Opdahl A.L., Eliciting security requirements with misuse cases, Requirements Engineering, 10, 1, pp. 34-44, (2005)
[9]
Jurjens J., Secure Systems Development with UML, (2004)
[10]
Lodderstedt T., Basin D., Doser J., SecureUML: A UML- Based Modelling Language for Model-Driven Security, Proceedings of the UML'02, LNCS 2460, pp. 426-441, (2002)