Journal: IJSSE

Volume 5, Issue 4

1 -- 30Takanori Kobashi, Nobukazu Yoshioka, Haruhiko Kaiya, Hironori Washizaki, Takano Okubo, Yoshiaki Fukazawa. Validating Security Design Pattern Applications by Testing Design Models
31 -- 47Annette Tetmeyer, Daniel D. Hein, Hossein Saiedian. A Tagging Approach to Extract Security Requirements in Non-Traditional Software Development Processes
48 -- 98Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout, Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug, Ruth Breu. Evolution of Security Engineering Artifacts: A State of the Art Survey

Volume 5, Issue 3

1 -- 15Hossain Shahriar, Sarah North, Wei-Chuen Chen, Edward Mawangi. Information Theoretic XSS Attack Detection in Web Applications
16 -- 31Aram Hovsepyan, Riccardo Scandariato, Maximilian Steff, Wouter Joosen. Design Churn as Predictor of Vulnerabilities?
32 -- 55Mingqiu Song, Donghao Chen, Elizabeth Sylvester Mkoba. Secure Software Development Assimilation: Effects of External Pressures and Roles of Internal Factors
56 -- 74Mehrez Essafi, Henda Ben Ghézala. Meta-Modeling Based Secure Software Development Processes

Volume 5, Issue 2

1 -- 19Per Håkon Meland, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, Paolo Giorgini. Threat Analysis in Goal-Oriented Security Requirements Modelling
20 -- 43Kristian Beckers, Isabelle Côté, Ludger Goeke, Selim Güler, Maritta Heisel. A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain
44 -- 64Vincenzo Ciancia, José Antonio Martín, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Ernesto Pimentel. Automated Synthesis and Ranking of Secure BPMN Orchestrators

Volume 5, Issue 1

1 -- 18Khalifa Toumi, Ana R. Cavalli, César Andrés. Validation of a Trust Approach in Multi-Organization Environments
19 -- 38Romaric Ludinard, Eric Totel, Frédéric Tronel, Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Rim Akrout, Yann Bachy. An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications
39 -- 60Sheila Cobourne, Lazaros Kyrillidis, Keith Mayes, Konstantinos Markantonakis. Remote E-Voting Using the Smart Card Web Server
61 -- 74Christine Fricker, Philippe Robert, Yousra Chabchoub. Improving the Detection of On-Line Vertical Port Scan in IP Traffic