Effective Security Requirements Analysis: HAZOP and Use Cases

Thitima Srivatanakul, John A. Clark, Fiona A. C. Polack. Effective Security Requirements Analysis: HAZOP and Use Cases. In Kan Zhang, Yuliang Zheng, editors, Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings. Volume 3225 of Lecture Notes in Computer Science, pages 416-427, Springer, 2004. [doi]

@inproceedings{SrivatanakulCP04,
  title = {Effective Security Requirements Analysis: HAZOP and Use Cases},
  author = {Thitima Srivatanakul and John A. Clark and Fiona A. C. Polack},
  year = {2004},
  url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3225&spage=416},
  tags = {analysis, C++, security},
  researchr = {https://researchr.org/publication/SrivatanakulCP04},
  cites = {0},
  citedby = {0},
  pages = {416-427},
  booktitle = {Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings},
  editor = {Kan Zhang and Yuliang Zheng},
  volume = {3225},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-23208-7},
}