[PDF][PDF] Using security patterns to model and analyze security requirements

S Konrad, BHC Cheng, LA Campbell… - Requirements …, 2003 - academia.edu
… 3 Security Pattern-Driven Modeling and Analysis In this section, we briefly present a process
for modeling and analyzing secure systems using security patterns. We demonstrate how …

[图书][B] Security patterns in practice: designing secure architectures using software patterns

E Fernandez-Buglioni - 2013 - books.google.com
… We use the concept of misuse (attack) patterns to model how a … enforce standards and
regulations; our proposed pattern-based … Security is the protection against: ■Unauthorized data …

[图书][B] Security engineering with patterns: origins, theoretical models, and new applications

M Schumacher - 2003 - books.google.com
protection in wide-area video-ondemand, firewalls, security in … start to treat security as an
equivalent requirement with a high … of security patterns, we derive a theoretical model for them. …

Using abuse case models for security requirements analysis

J McDermott, C Fox - … 15th Annual Computer Security …, 1999 - ieeexplore.ieee.org
… the abuse case model one step behind the use case model. We use each component of the
use case model to construct the … various kinds of protection, in mathematically sound ways. …

[图书][B] Security Patterns: Integrating security and systems engineering

M Schumacher, E Fernandez-Buglioni, D Hybertson… - 2013 - books.google.com
… We also discuss the benefits of using security patterns, and … perspective enterprise modeling,
requirements engineering, … may require protection due to public law and/or regulations -…

Automated analysis of security-design models

D Basin, M Clavel, J Doser, M Egea - Information and Software Technology, 2009 - Elsevier
… we present SecureMOVA, a security-design modeling tool whose … Here, we expand on the
requirements of our approach, in … The patterns presented to the user depend on the type of the …

[PDF][PDF] Using Security Patterns to Model and Analyze Security Requirements

R Wassermann, B Cheng, R Schwarz, D Rombach - 2004 - publica.fraunhofer.de
Security Patterns that is tailored to meet the needs of secureuse of well-known notations
such as the Unified Modeling … the application of the pattern on the protection of information …

Analyzing regulatory rules for privacy and security requirements

T Breaux, A Antón - IEEE transactions on software engineering, 2008 - ieeexplore.ieee.org
… categorizes requirements by using an ontological model, the … protection of patient medical
records against unauthorized … patterns that we use here include the basic activity pattern

Elaborating security requirements by construction of intentional anti-models

A Van Lamsweerde - Proceedings. 26th International …, 2004 - ieeexplore.ieee.org
… to the modeling, specification and analysis of applicationspecific security requirements. The
… Section 3 introduces security specification patterns together with some epistemic extensions …

[图书][B] The modelling and analysis of security protocols: the CSP approach

P Ryan, SA Schneider - 2001 - books.google.com
… of it, into a CSP model of the protocol as described in … This model can then be analyzed
using the model-checker FDR … to express timed requirements, we typically need a timed model (…