


default search action
International Journal of Secure Software Engineering, Volume 3
Volume 3, Number 1, 2012
- Sandra Trösterer, Elke Beck, Fabiano Dalpiaz, Elda Paja, Paolo Giorgini, Manfred Tscheligi:
Formative User-Centered Evaluation of Security Modeling: Results from a Case Study. 1-19 - Andreas L. Opdahl
, Christian Raspotnig:
Improving Security and Safety Modelling with Failure Sequence Diagrams. 20-36 - Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Analyzing Impacts on Software Enhancement Caused by Security Design Alternatives with Patterns. 37-61 - Khaled M. Khan:
Software Security Engineering: Design and Applications. 62-63
Volume 3, Number 2, 2012
- Alessandra Bagnato
, Barbara Kordy, Per Håkon Meland, Patrick Schweitzer:
Attribute Decoration of Attack-Defense Trees. 1-35 - Michalis Pavlidis, Haralambos Mouratidis, Shareeful Islam:
Modelling Security Using Trust Based Concepts. 36-53 - Péter Kárpáti, Guttorm Sindre
, Raimundas Matulevicius
:
Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks. 54-73
Volume 3, Number 3, 2012
- Shareeful Islam, Haralambos Mouratidis, Christos Kalloniatis, Aleksandar Hudic, Lorenz Zechner:
Model Based Process to Support Security and Privacy Requirements Engineering. 1-22 - Ayda Saïdane, Nicolas Guelfi:
SETER: Towards Architecture-Model Based Security Engineering. 23-49 - Yujian Fu, Jeffery Kulick, Lok K. Yan, Steven Drager:
Formal Modeling and Verification of Security Property in Handel C Program. 50-65
Volume 3, Number 4, 2012
- Ousmane Amadou Dia, Csilla Farkas:
A Practical Framework for Policy Composition and Conflict Resolution. 1-26 - Bernard Spitz, Riccardo Scandariato, Wouter Joosen:
Extraction of an Architectural Model for Least Privilege Analysis. 27-44 - Safaà Hachana, Nora Cuppens-Boulahia, Frédéric Cuppens:
Role Mining to Assist Authorization Governance: How Far Have We Gone? 45-64 - K. Shantha Kumari, T. Chithralekha:
A Comparative Analysis of Access Control Policy Modeling Approaches. 65-83

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.