共 50 条
- [21] Towards a UML 2.0 extension for the modeling of security requirements in business processes TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 51 - 61
- [23] Presentation and Validation of Method for Security Requirements Elicitation from Business Processes INFORMATION SYSTEMS ENGINEERING IN COMPLEX ENVIRONMENTS, 2015, 204 : 20 - 35
- [25] A Serious Game for Eliciting Social Engineering Security Requirements 2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2016, : 16 - 25
- [27] Eliciting security requirements method based on safety knowledge base Communications in Computer and Information Science, 2013, 332 : 109 - 121
- [28] Requirements for Security Enhancements to Legacy Software with RUP INFORMATION SECURITY JOURNAL, 2010, 19 (04): : 226 - 236
- [29] Eliciting Software Safety Requirements in Complex Systems 2010 IEEE INTERNATIONAL SYSTEMS CONFERENCE, 2010, : 616 - 621
- [30] Eliciting a Security Architecture Requirements Baseline from Standards and Regulations 2023 IEEE 31ST INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS, REW, 2023, : 224 - 229