


default search action
International Journal of Secure Software Engineering, Volume 3
Volume 3, Number 1, 2012
- Sandra Trösterer, Elke Beck, Fabiano Dalpiaz, Elda Paja, Paolo Giorgini, Manfred Tscheligi:

Formative User-Centered Evaluation of Security Modeling: Results from a Case Study. 1-19 - Andreas L. Opdahl

, Christian Raspotnig:
Improving Security and Safety Modelling with Failure Sequence Diagrams. 20-36 - Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:

Analyzing Impacts on Software Enhancement Caused by Security Design Alternatives with Patterns. 37-61 - Khaled M. Khan:

Software Security Engineering: Design and Applications. 62-63
Volume 3, Number 2, 2012
- Alessandra Bagnato

, Barbara Kordy, Per Håkon Meland, Patrick Schweitzer:
Attribute Decoration of Attack-Defense Trees. 1-35 - Michalis Pavlidis, Haralambos Mouratidis, Shareeful Islam:

Modelling Security Using Trust Based Concepts. 36-53 - Péter Kárpáti, Guttorm Sindre

, Raimundas Matulevicius
:
Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks. 54-73
Volume 3, Number 3, 2012
- Shareeful Islam, Haralambos Mouratidis, Christos Kalloniatis, Aleksandar Hudic, Lorenz Zechner:

Model Based Process to Support Security and Privacy Requirements Engineering. 1-22 - Ayda Saïdane, Nicolas Guelfi:

SETER: Towards Architecture-Model Based Security Engineering. 23-49 - Yujian Fu, Jeffery Kulick, Lok K. Yan, Steven Drager:

Formal Modeling and Verification of Security Property in Handel C Program. 50-65
Volume 3, Number 4, 2012
- Ousmane Amadou Dia, Csilla Farkas:

A Practical Framework for Policy Composition and Conflict Resolution. 1-26 - Bernard Spitz, Riccardo Scandariato, Wouter Joosen:

Extraction of an Architectural Model for Least Privilege Analysis. 27-44 - Safaà Hachana, Nora Cuppens-Boulahia, Frédéric Cuppens:

Role Mining to Assist Authorization Governance: How Far Have We Gone? 45-64 - K. Shantha Kumari, T. Chithralekha:

A Comparative Analysis of Access Control Policy Modeling Approaches. 65-83

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.




Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID



















