An Applicable Family of Data Flow Testing Criteria
IEEE Transactions on Software Engineering
Journal of Cryptology
Telos: representing knowledge about information systems
ACM Transactions on Information Systems (TOIS)
CRYPTO '89 Proceedings on Advances in cryptology
Foundations for the study of software architecture
ACM SIGSOFT Software Engineering Notes
Object-oriented development: the fusion method
Object-oriented development: the fusion method
Data flow analysis for verifying properties of concurrent programs
SIGSOFT '94 Proceedings of the 2nd ACM SIGSOFT symposium on Foundations of software engineering
Architectural mismatch or why it's hard to build systems out of existing parts
Proceedings of the 17th international conference on Software engineering
Anonymous credit cards and their collusion analysis
IEEE/ACM Transactions on Networking (TON)
Formalizing architectural connection
ICSE '94 Proceedings of the 16th international conference on Software engineering
Software reuse: architecture, process and organization for business success
Software reuse: architecture, process and organization for business success
Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Model checking for programming languages using VeriSoft
Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Security model for distributed object framework and its applicability to CORBA
Information systems security
Cryptographic verification of test coverage claims
ESEC '97/FSE-5 Proceedings of the 6th European SOFTWARE ENGINEERING conference held jointly with the 5th ACM SIGSOFT international symposium on Foundations of software engineering
Extracting formal domain models from exsisting code for generative reuse
ACM SIGAPP Applied Computing Review - Special issue on open perspectives in software reuse
Constructing compact models of concurrent Java programs
Proceedings of the 1998 ACM SIGSOFT international symposium on Software testing and analysis
The design and implementation of a certifying compiler
PLDI '98 Proceedings of the ACM SIGPLAN 1998 conference on Programming language design and implementation
Communications of the ACM
Software watermarking: models and dynamic embeddings
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Techniques for trusted software engineering
Proceedings of the 20th international conference on Software engineering
Using the ASTRAL model checker to analyze mobile IP
Proceedings of the 21st international conference on Software engineering
A cooperative approach to support software deployment using the software dock
Proceedings of the 21st international conference on Software engineering
Lightweight extraction of object models from bytecode
Proceedings of the 21st international conference on Software engineering
Data flow analysis for checking properties of concurrent Java programs
Proceedings of the 21st international conference on Software engineering
ICSE 99 workshop on software engineering over the Internet
Proceedings of the 21st international conference on Software engineering
Cryptographic copyright protection for digital images based on watermarking techniques
Theoretical Computer Science - Special issue: cryptography
Unlinkable serial transactions: protocols and applications
ACM Transactions on Information and System Security (TISSEC)
Cryptographic Verification of Test Coverage Claims
IEEE Transactions on Software Engineering
Requirements engineering: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Proceedings of the Conference on The Future of Software Engineering
Object-oriented modeling: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Software engineering and middleware: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Software configuration management: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Protection in operating systems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Java Virtual Machine Specification
Java Virtual Machine Specification
Encrypting Problem Instances: Or ..., Can You Take Advantage of Someone Without Having to Trust Him?
CRYPTO '85 Advances in Cryptology
Tamper Resistant Software: An Implementation
Proceedings of the First International Workshop on Information Hiding
Practice-Oriented Provable-Security
ISW '97 Proceedings of the First International Workshop on Information Security
A Tool for Securely Integrating Legacy Systems into a Distributed Environment
WCRE '99 Proceedings of the Sixth Working Conference on Reverse Engineering
An Architecture for Post-Development Configuration Management in a Wide-Area Network
ICDCS '97 Proceedings of the 17th International Conference on Distributed Computing Systems (ICDCS '97)
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Secure coprocessors in electronic commerce applications
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Unified support for heterogeneous security policies in distributed systems
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Anonymous connections and onion routing
IEEE Journal on Selected Areas in Communications
IEEE Journal on Selected Areas in Communications
Proceedings of the Conference on The Future of Software Engineering
Secure and efficient mobile agent application reuse using patterns
SSR '01 Proceedings of the 2001 symposium on Software reusability: putting software reuse in context
Mobile agent security with the IPEditor development tool and the mobile UNITY language
Proceedings of the fifth international conference on Autonomous agents
Using UMLsec and goal trees for secure systems development
Proceedings of the 2002 ACM symposium on Applied computing
Towards Development of Secure Systems Using UMLsec
FASE '01 Proceedings of the 4th International Conference on Fundamental Approaches to Software Engineering
Designing Secure Integration Architectures
ICCBSS '03 Proceedings of the Second International Conference on COTS-Based Software Systems
UMLsec: Extending UML for Secure Systems Development
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
Towards a Practical Secure Framework for Mobile Code Commerce
ISW '00 Proceedings of the Third International Workshop on Information Security
Manageable access control for CORBA
Journal of Computer Security - Special issue on ESORICS 2000
Designing high integrity systems using aspects
Integrity and internal control in information systems V
A compositional framework for access control policies enforcement
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
Formal access control analysis in the software development process
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
authUML: a three-phased framework to analyze access control specifications in use cases
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
Software engineering for secure systems
Proceedings of the 27th international conference on Software engineering
DISCOA: architectural adaptations for security and QoS
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Leveraging architectural models to inject trust into software systems
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
EUROMICRO '05 Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications
Developing business object models with patterns and ontologies
OOPSLA '05 Companion to the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Implementing a modular access control service to support application-specific policies in CaesarJ
AOMD '05 Proceedings of the 1st workshop on Aspect oriented middleware development
A threat-driven approach to modeling and verifying secure software
Proceedings of the 20th IEEE/ACM international Conference on Automated software engineering
How secure is AOP and what can we do about it?
Proceedings of the 2006 international workshop on Software engineering for secure systems
A framework for security requirements engineering
Proceedings of the 2006 international workshop on Software engineering for secure systems
Model driven development of secure XML databases
ACM SIGMOD Record
Information and Software Technology
Access control and audit model for the multidimensional modeling of data warehouses
Decision Support Systems
Developing secure data warehouses with a UML extension
Information Systems
Engineering Trust Management into Software Models
MISE '07 Proceedings of the International Workshop on Modeling in Software Engineering
Preventing application software piracy: An empirical investigation of technical copy protections
The Journal of Strategic Information Systems
Fault and adversary tolerance as an emergent property of distributed systems' software architectures
Proceedings of the 2007 workshop on Engineering fault tolerant systems
Security software engineering: do it the right way
SEPADS'07 Proceedings of the 6th WSEAS International Conference on Software Engineering, Parallel and Distributed Systems
Aspect-oriented specification of threat-driven security requirements
International Journal of Computer Applications in Technology
Secure information systems engineering: a manifesto
International Journal of Electronic Security and Digital Forensics
Building a secure star schema in data warehouses by an extension of the relational package from CWM
Computer Standards & Interfaces
A security-centric ring-based software architecture
SpringSim '07 Proceedings of the 2007 spring simulation multiconference - Volume 3
Syntactic Validation of Web Services Security Policies
ICSOC '07 Proceedings of the 5th international conference on Service-Oriented Computing
How to implement multidimensional security into OLAP tools
International Journal of Business Intelligence and Data Mining
An engineering process for developing Secure Data Warehouses
Information and Software Technology
Palantir: a framework for collaborative incident response and investigation
Proceedings of the 8th Symposium on Identity and Trust on the Internet
A UML 2.0 profile to define security requirements for Data Warehouses
Computer Standards & Interfaces
CAiSE '09 Proceedings of the 21st International Conference on Advanced Information Systems Engineering
Security testing: mind the knowledge gap
ACM SIGCSE Bulletin
Proceedings of the First Asia-Pacific Symposium on Internetware
RUP-based process model for security requirements engineering in value-added service development
IWSESS '09 Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems
An MDA approach to Access Control Specifications Using MOF and UML Profiles
Electronic Notes in Theoretical Computer Science (ENTCS)
Information and Software Technology
Allocating goals to agent roles during MAS requirements engineering
AOSE'06 Proceedings of the 7th international conference on Agent-oriented software engineering VII
Transparency versus security: early analysis of antagonistic requirements
Proceedings of the 2010 ACM Symposium on Applied Computing
Portable secure identity management for software engineering
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2
Using special use cases for security in the software development life cycle
WISA'10 Proceedings of the 11th international conference on Information security applications
Basis for an integrated security ontology according to a systematic review of existing proposals
Computer Standards & Interfaces
Toward sustainable software engineering (NIER track)
Proceedings of the 33rd International Conference on Software Engineering
A framework to support alignment of secure software engineering with legal regulations
Software and Systems Modeling (SoSyM)
Modeling of security requirements for decision information systems
ACM SIGSOFT Software Engineering Notes
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Evaluation of the existing security patterns in software security
ACS'11 Proceedings of the 11th WSEAS international conference on Applied computer science
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Using feedback cycle for developing an adjustable security design metric
FSKD'05 Proceedings of the Second international conference on Fuzzy Systems and Knowledge Discovery - Volume Part II
Towards a comprehensive framework for secure systems development
CAiSE'06 Proceedings of the 18th international conference on Advanced Information Systems Engineering
Security and trust requirements engineering
Foundations of Security Analysis and Design III
Model-based security engineering for real
FM'06 Proceedings of the 14th international conference on Formal Methods
Towards an approach for security risk analysis in COTS based development
SPW/ProSim'06 Proceedings of the 2006 international conference on Software Process Simulation and Modeling
Using UML packages for designing secure data warehouses
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Model driven security for inter-organizational workflows in e-government
TCGOV'05 Proceedings of the 2005 international conference on E-Government: towards Electronic Democracy
Evaluation of the unified modeling language for security requirements analysis
WISA'05 Proceedings of the 6th international conference on Information Security Applications
A Measurement Framework for Evaluating Emulators for Digital Preservation
ACM Transactions on Information Systems (TOIS)
Evaluation of approaches for designing secure data warehouse
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
A security-focused engineering process for systems of embedded components
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systemss
Detecting and analyzing insecure component usage
Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering
Survey and analysis on Security Requirements Engineering
Computers and Electrical Engineering
Modelling and analysing resilience as a security issue within UML
Proceedings of the 2nd International Workshop on Software Engineering for Resilient Systems
Securing business processes using security risk-oriented patterns
Computer Standards & Interfaces
Hi-index | 0.00 |