D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange
D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange
D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
23. Matulevicius, R., Mayer, N., Mouratidis, H., Dubois, E., Heymans, P., Genon, N.: Adapting<br />
Secure Tropos for security risk management in the early phases of information systems<br />
development. In: Advanced Information Systems Engineering, Lecture Notes in Computer<br />
Science, vol. 5074, pp. 541–555. Springer Berlin / Heidelberg (2008)<br />
24. Mayer, N., Heymans, P., Matulevicius, R.: Design of a modelling language for information<br />
system security risk management. In: Proceedings of the 1st International Conference on<br />
Research Challenges in Information Science (RCIS 2007). pp. 121–131 (2007)<br />
25. Røstad, L.: An extended misuse case notation: Including vulnerabilities and the insider<br />
threat. In: The Twelfth Working Conference on Requirements Engineering: Foundation for<br />
Software Quality (REFSQ’06) (2006)<br />
26. Sherer, S.A.: Using risk analysis to manage software maintenance. J. Softw. Maint.: Res.<br />
Pract. 9(6), 345–364 (1997)<br />
27. Stevens, P.: Bidirectional model transformations in QVT: Semantic issues and open questions.<br />
In: MoDELS. pp. 1–15 (2007)<br />
28. Van Lamsweerde, A., Letier, E.: Handling obstacles in goal-oriented requirements engineering.<br />
IEEE Transactions on Software Engineering 26(10), 978–1005 (2000)<br />
29. Varró, D., Balogh, A.: The model transformation language of the VIATRA2 framework.<br />
Science of Computer Programming 68(3), 214–234 (2007)<br />
30. Yu, E.: Modelling strategic relationships for process reengineering. Ph.D. thesis, University<br />
of Toronto, Canada (1995)