A comparison of security requirements engineering methods (English)
- New search for: Fabian, Benjamin
- New search for: Gürses, Seda
- New search for: Heisel, Maritta
- New search for: Santen, Thomas
- New search for: Schmidt, Holger
- New search for: Fabian, Benjamin
- New search for: Gürses, Seda
- New search for: Heisel, Maritta
- New search for: Santen, Thomas
- New search for: Schmidt, Holger
In:
Requirements Engineering
;
15
, 1
;
7-40
;
2009
- Article (Journal) / Electronic Resource
-
Title:A comparison of security requirements engineering methods
-
Contributors:Fabian, Benjamin ( author ) / Gürses, Seda ( author ) / Heisel, Maritta ( author ) / Santen, Thomas ( author ) / Schmidt, Holger ( author )
-
Published in:Requirements Engineering ; 15, 1 ; 7-40
-
Publisher:
- New search for: Springer-Verlag
-
Place of publication:London
-
Publication date:2009-11-26
-
Size:34 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 15, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Guest editorial: security requirements engineering: past, present and futureDubois, Eric / Mouratidis, Haralambos et al. | 2010
- 7
-
A comparison of security requirements engineering methodsFabian, Benjamin / Gürses, Seda / Heisel, Maritta / Santen, Thomas / Schmidt, Holger et al. | 2009
- 41
-
A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilitiesElahi, Golnaz / Yu, Eric / Zannone, Nicola et al. | 2009
- 63
-
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsecHoumb, Siv Hilde / Islam, Shareeful / Knauss, Eric / Jürjens, Jan / Schneider, Kurt et al. | 2009
- 95
-
A UML-based static verification framework for securitySiveroni, Igor / Zisman, Andrea / Spanoudakis, George et al. | 2009
- 119
-
Evaluating existing security and privacy requirements for legal complianceMassey, Aaron K. / Otto, Paul N. / Hayward, Lauren J. / Antón, Annie I. et al. | 2009