共 50 条
- [13] Eliciting Security Requirements - An Experience Report REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, REFSQ 2023, 2023, 13975 : 351 - 365
- [14] Eliciting security requirements by misuse cases 37TH INTERNATIONAL CONFERENCE ON TECHNOLOGY OF OBJECT-ORIENTED LANGUAGES AND SYSTEMS, PROCEEDINGS, 2000, : 120 - 143
- [15] Introducing Security Access Control Policies into Legacy Business Processes 2011 15TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOC 2011), 2011, : 42 - 49
- [16] Modeling and Utilizing Security Knowledge for Eliciting Security Requirements ADVANCES IN CONCEPTUAL MODELING, ER 2015 WORKSHOPS, 2015, 9382 : 236 - 247
- [17] Eliciting security requirements through misuse activities DEXA 2008: 19TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2008, : 328 - +
- [18] Eliciting Usable Security Requirements with Misusability Cases 2011 19TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2011, : 339 - 340
- [19] Discovering Business Processes in Legacy Systems using Business Rules and Log Mining 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, : 207 - 212
- [20] A Top Down Approach for Eliciting Systems Security Requirements for a Notional Autonomous Space System 2019 13TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2019,