Abstract is missing.
- Security quality requirements engineering (SQUARE) methodologyNancy R. Mead, Ted Stehney. 1-7 [doi]
- Towards an architectural treatment of software security: a connector-centric approachJie Ren, Richard N. Taylor, Paul Dourish, David F. Redmiles. 1-7 [doi]
- Establishing trustworthiness in services of the critical infrastructure through certification and accreditationSeok-Won Lee, Robin A. Gandhi, Gail-Joon Ahn. 1-7 [doi]
- Towards a unifying view on security contractsBart De Win, Frank Piessens, Jan Smans, Wouter Joosen. 1-7 [doi]
- Matching attack patterns to security vulnerabilities in software-intensive system designsMichael Gegick, Laurie A. Williams. 1-7 [doi]
- XacT: a bridge between resource management and access control in multi-layered applicationsMaarten Rits, Benjamin De Boe, Andreas Schaad. 1-7 [doi]
- Leveraging architectural models to inject trust into software systemsSomo Banerjee, Chris A. Mattmann, Nenad Medvidovic, Leana Golubchik. 1-7 [doi]
- Articulating and enforcing authorisation policies with UML and OCLKarsten Sohr, Gail-Joon Ahn, Lars Migge. 1-7 [doi]
- A software flaw taxonomy: aiming tools at securitySam Weber, Paul A. Karger, Amit M. Paradkar. 1-7 [doi]
- Risky trust: risk-based analysis of software systemsZaid Dwaikat, Francesco Parisi-Presicce. 1-7 [doi]
- Using dynamic information flow analysis to detect attacks against applicationsWes Masri, Andy Podgurski. 1-7 [doi]
- Building security requirements with CLASPJohn Viega. 1-7 [doi]
- Enabling control over adaptive program transformation for dynamically evolving mobile software validationMike Jochen, Anteneh Addis Anteneh, Lori L. Pollock, Lisa M. Marvel. 1-7 [doi]
- Requirements traceability to support evolution of access controlTine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen. 1-7 [doi]
- DISCOA: architectural adaptations for security and QoSĂ–mer Erdem Demir, Premkumar T. Devanbu, Nenad Medvidovic, Eric Wohlstadter. 1-7 [doi]
- A framework for testing security mechanisms for program-based attacksBen Breech, Lori L. Pollock. 1-7 [doi]