Journal: IJSSE

Volume 5, Issue 4

1 -- 30Takanori Kobashi, Nobukazu Yoshioka, Haruhiko Kaiya, Hironori Washizaki, Takano Okubo, Yoshiaki Fukazawa. Validating Security Design Pattern Applications by Testing Design Models
31 -- 47Annette Tetmeyer, Daniel D. Hein, Hossein Saiedian. A Tagging Approach to Extract Security Requirements in Non-Traditional Software Development Processes
48 -- 98Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout, Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug, Ruth Breu. Evolution of Security Engineering Artifacts: A State of the Art Survey