Results: 6
Evaluating existing security and privacy requirements for legal compliance.
- Published in:
- Requirements Engineering, 2010, v. 15, n. 1, p. 119, doi. 10.1007/s00766-009-0089-5
- By:
- Publication type:
- Article
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec.
- Published in:
- Requirements Engineering, 2010, v. 15, n. 1, p. 63, doi. 10.1007/s00766-009-0093-9
- By:
- Publication type:
- Article
Guest editorial: security requirements engineering: past, present and future.
- Published in:
- 2010
- By:
- Publication type:
- Editorial
A comparison of security requirements engineering methods.
- Published in:
- Requirements Engineering, 2010, v. 15, n. 1, p. 7, doi. 10.1007/s00766-009-0092-x
- By:
- Publication type:
- Article
A UML-based static verification framework for security.
- Published in:
- Requirements Engineering, 2010, v. 15, n. 1, p. 95, doi. 10.1007/s00766-009-0091-y
- By:
- Publication type:
- Article
A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities.
- Published in:
- Requirements Engineering, 2010, v. 15, n. 1, p. 41, doi. 10.1007/s00766-009-0090-z
- By:
- Publication type:
- Article