共 50 条
- [1] Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation COMPUTER SECURITY, 2017, 2018, 10683 : 210 - 225
- [3] Visualising privacy and security for requirements engineering SERP'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2004, : 813 - 819
- [4] Applying a security requirements engineering process COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 192 - 206
- [5] Towards a Common Security and Privacy Requirements Elicitation Methodology GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 151 - 159
- [6] Requirements Engineering for Security, Privacy and Services in Cloud Environments Requirements Engineering, 2013, 18 : 297 - 298
- [7] Engineering secure software by modelling privacy and security requirements 39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 37 - 40
- [9] Which Security Requirements Engineering Methodology Should I Choose? Towards a Requirements Engineering-based Evaluation Approach PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,