Sciweavers

ACSAC
1999
IEEE
14 years 4 months ago
Using Abuse Case Models for Security Requirements Analysis
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...
John P. McDermott, Chris Fox
IEEEIAS
2009
IEEE
14 years 7 months ago
Organizational Barriers to the Implementation of Security Engineering
: The link between security engineering and systems engineering exists at the earliest stage of systems development, and, as a whole, there is sufficient evidence to suggest the di...
Bryan Stewart Cline
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
14 years 7 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...