Managing changes with legacy security engineering processes (original) (raw)

Orchestrating security and system engineering for evolving systems

Mass Lund

Towards a Service-Based Internet, 2011

View PDFchevron_right

A tool for managing evolving security requirements

Federica Paci

2012

View PDFchevron_right

Evolution of Security Engineering Artifacts

Ruth Breu

International Journal of Secure Software Engineering, 2014

View PDFchevron_right

Maintaining Security in Software Evolution

Jan Ladiges

Managed Software Evolution

View PDFchevron_right

Chapter 9 Maintaining Security in Software Evolution

Alexander Fay

2019

View PDFchevron_right

Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications

Holger Schmidt

Lecture Notes in Computer Science, 2011

View PDFchevron_right

Evolution of Aspects for Legacy System Security Concerns

Janet Van Der Linden

2004

View PDFchevron_right

A process standard for system security engineering: development experiences and pilot results

Rick Hefner

View PDFchevron_right

Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring

Bernd Bruegge

2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), 2014

View PDFchevron_right

Model-based Framework for Change Management and Integrated Devlopment of Information Security

boobas singaram

INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY, 2018

View PDFchevron_right

The current practices of changing secure software

Lotfi Ben Othmane

Proceedings of the 35th Annual ACM Symposium on Applied Computing, 2020

View PDFchevron_right

Evolving Legacy System Security Concerns Using Aspects

Robin Laney

2003

View PDFchevron_right

Towards a risk-based security requirements engineering framework

Nicolas Mayer

2005

View PDFchevron_right

A Strategy Oriented Process Model for Software Security

Chief E D I T O R IJRISAT

IJEMR, 2016

View PDFchevron_right

Software requirements and architecture modeling for evolving non-secure applications into secure applications

Hassan Gomaa

Science of Computer Programming, 2007

View PDFchevron_right

Applying a security requirements engineering process

Daniel Mellado

2006

View PDFchevron_right

A business process-driven approach to security engineering

José Vivas

2003

View PDFchevron_right

Software engineering for security: a roadmap

Premkumar Devanbu

… on The future of Software engineering, 2000

View PDFchevron_right

Managing evolving security situations

Enn Tyugu

MILCOM 2009 - 2009 IEEE Military Communications Conference, 2009

View PDFchevron_right

A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities

Nicola Zannone

Requirements Engineering, 2010

View PDFchevron_right

Software engineering for security

Premkumar Devanbu

2000

View PDFchevron_right

A Systematic Approach to the Management of System Security Reengineering Process

IBRAHIM AL KATTAN

2005

View PDFchevron_right

A comparative review of i-based and use case-based security modelling initiatives

O. Daramola

2012 Sixth International Conference on Research Challenges in Information Science (RCIS), 2012

View PDFchevron_right

Security Software Engineering: Do it the right way

Asim El sheikh

Proceedings of the 6th WSEAS International …, 2007

View PDFchevron_right

Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies

Ahmad Samer Wazan

Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

View PDFchevron_right

A Review of Security Requirements Engineering Methods with Respect to Risk Analysis and Model-Driven Engineering

Denisse Muñante

Lecture Notes in Computer Science, 2014

View PDFchevron_right