ACM Computing Surveys (CSUR)
Managing Conflicts in Goal-Driven Requirements Engineering
IEEE Transactions on Software Engineering
Integrating obstacles in goal-driven requirements engineering
Proceedings of the 20th international conference on Software engineering
A credibility-based model of computer system security
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Toward a secure system engineering methodolgy
Proceedings of the 1998 workshop on New security paradigms
Requirements engineering in the year 00: a research perspective
Proceedings of the 22nd international conference on Software engineering
Handling Obstacles in Goal-Oriented Requirements Engineering
IEEE Transactions on Software Engineering - special section on current trends in exception handling—part II
The YGuard access control model: set-based access control
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
The essence of information assurance and its implications for the Ada community
Proceedings of the 2002 annual ACM SIGAda international conference on Ada: The engineering of correct and reliable software for real-time & distributed systems using Ada and related technologies
Providing Fine-grained Access Control for Java Programs
ECOOP '99 Proceedings of the 13th European Conference on Object-Oriented Programming
Authentication for Distributed Web Caches
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Introduction to Computer Security
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Preserving Privacy in Distributed Delegation with Fast Certificates
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Task-Role Based Access Control (T-RBAC): An Improved Access Control Model for Enterprise Environment
DEXA '00 Proceedings of the 11th International Conference on Database and Expert Systems Applications
Inside the Windows Security Push
IEEE Security and Privacy
Task-role-based access control model
Information Systems
NSDF: a computer network system description framework and its application to network security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Modeling organizational goals: analysis of current methods
Proceedings of the 2004 ACM symposium on Applied computing
Using DAML+OIL to classify intrusive behaviours
The Knowledge Engineering Review
Elaborating Security Requirements by Construction of Intentional Anti-Models
Proceedings of the 26th International Conference on Software Engineering
SubDomain: Parsimonious Server Security
LISA '00 Proceedings of the 14th USENIX conference on System administration
Facilitating secure ad hoc service discovery in public environments
Journal of Systems and Software - Special issue: Computer software & applications
A proposed curriculum of cryptography courses
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Towards agile security in web applications
Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications
Expert Systems with Applications: An International Journal
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
an eye on network intruder-administrator shootouts
ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1
Strategic planning for the computer science security
WSEAS Transactions on Computers
International Journal of Mobile Communications
Experimental comparison of attack trees and misuse cases for security threat identification
Information and Software Technology
Enhancing research into usable privacy and security
Proceedings of the 27th ACM international conference on Design of communication
A review of classification methods for network vulnerability
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
International Journal of Security and Networks
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Retrofitting security into a web-based information system
ICWE'03 Proceedings of the 2003 international conference on Web engineering
Towards a denial-of-service resilient design of complex IPsec overlays
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Cyber security analysis using attack countermeasure trees
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
A security policy model for clinical information systems
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Foundations of attack-defense trees
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
A secure and efficient communication resume protocol for secure wireless networks
DAIS'05 Proceedings of the 5th IFIP WG 6.1 international conference on Distributed Applications and Interoperable Systems
Design and implementation of an extended reference monitor for trusted operating systems
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Fast and secure communication resume protocol for wireless networks
Euro-Par'05 Proceedings of the 11th international Euro-Par conference on Parallel Processing
Quantitative evaluation of systems with security patterns using a fuzzy approach
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
ER'05 Proceedings of the 24th international conference on Conceptual Modeling
Analysis of the power consumption of secure communication in wireless networks
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Computational aspects of attack---defense trees
SIIS'11 Proceedings of the 2011 international conference on Security and Intelligent Information Systems
An algebraic basis for specifying and enforcing access control in security systems
IW-FM'00 Proceedings of the 4th Irish conference on Formal Methods
Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees
Security and Communication Networks
Threat Modeling for Electronic Health Record Systems
Journal of Medical Systems
ODP RM reflections on open service ecosystems
Computer Standards & Interfaces
Comparing risk identification techniques for safety and security requirements
Journal of Systems and Software
Quantitative questions on attack: defense trees
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Hi-index | 0.00 |