Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring
Gespeichert in:
| Weitere Verfasser: | , |
|---|---|
| Dokumenttyp: | Kapitel/Artikel Konferenzschrift |
| Sprache: | Englisch |
| Veröffentlicht: |
2014
|
| In: |
IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)
Year: 2014, Pages: 1-6 |
| DOI: | 10.1109/ESPRE.2014.6890520 |
| Schlagworte: | |
| Online-Zugang: | Resolving-System, Volltext: http://dx.doi.org/10.1109/ESPRE.2014.6890520 |
| Verfasserangaben: | Tom-Michael Hesse; Stefan Gärtner; Tobias Roehm; Barbara Paech; Kurt Schneider; Bernd Bruegge |
MARC
| LEADER | 00000caa a22000002c 4500 | ||
|---|---|---|---|
| 001 | 1502844036 | ||
| 003 | DE-627 | ||
| 005 | 20220811233648.0 | ||
| 007 | cr uuu---uuuuu | ||
| 008 | 150513s2014 xx |||||o 00| ||eng c | ||
| 024 | 7 | |a 10.1109/ESPRE.2014.6890520 |2 doi | |
| 035 | |a (DE-627)1502844036 | ||
| 035 | |a (DE-576)432844031 | ||
| 035 | |a (DE-599)BSZ432844031 | ||
| 035 | |a (OCoLC)1340691776 | ||
| 040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
| 041 | |a eng | ||
| 084 | |a 28 |2 sdnb | ||
| 245 | 0 | 0 | |a Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring |c Tom-Michael Hesse; Stefan Gärtner; Tobias Roehm; Barbara Paech; Kurt Schneider; Bernd Bruegge |
| 264 | 1 | |c 2014 | |
| 300 | |a 6 | ||
| 336 | |a Text |b txt |2 rdacontent | ||
| 337 | |a Computermedien |b c |2 rdamedia | ||
| 338 | |a Online-Ressource |b cr |2 rdacarrier | ||
| 500 | |a Gesehen am 13.05.2015 | ||
| 655 | 7 | |a Konferenzschrift |0 (DE-588)1071861417 |0 (DE-627)826484824 |0 (DE-576)433375485 |2 gnd-content | |
| 700 | 1 | |a Hesse, Tom-Michael |d 1988- |0 (DE-588)1070808652 |0 (DE-627)824605438 |0 (DE-576)432732187 |4 oth | |
| 700 | 1 | |a Paech, Barbara |d 1959- |0 (DE-588)172299799 |0 (DE-627)697208648 |0 (DE-576)133166821 |4 oth | |
| 773 | 0 | 8 | |i In |t IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE) |d Piscataway, NJ : IEEE, 2014 |g (2013), Seite 1-6 |h Online-Ressource (47 S.) |w (DE-627)1656875594 |w (DE-576)432841768 |7 nnam |a Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring |
| 773 | 1 | 8 | |g year:2013 |g pages:1-6 |g extent:6 |a Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring |
| 856 | 4 | 0 | |u http://dx.doi.org/10.1109/ESPRE.2014.6890520 |x Resolving-System |3 Volltext |
| 951 | |a AR | ||
| 992 | |a 20150513 | ||
| 993 | |a ConferencePaper | ||
| 994 | |a 2014 | ||
| 998 | |g 172299799 |a Paech, Barbara |m 172299799:Paech, Barbara |d 110000 |d 110300 |e 110000PP172299799 |e 110300PP172299799 |k 0/110000/ |k 1/110000/110300/ |p 2 | ||
| 998 | |g 1070808652 |a Hesse, Tom-Michael |m 1070808652:Hesse, Tom-Michael |d 110000 |d 110300 |e 110000PH1070808652 |e 110300PH1070808652 |k 0/110000/ |k 1/110000/110300/ |p 1 |x j | ||
| 999 | |a KXP-PPN1502844036 |e 2844427375 | ||
| BIB | |a Y | ||
| JSO | |a {"note":["Gesehen am 13.05.2015"],"person":[{"family":"Hesse","given":"Tom-Michael","role":"oth","display":"Hesse, Tom-Michael"},{"family":"Paech","given":"Barbara","display":"Paech, Barbara","role":"oth"}],"physDesc":[{"extent":"6 S."}],"language":["eng"],"recId":"1502844036","relHost":[{"disp":"Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoringIEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)","type":{"bibl":"edited-book","media":"Online-Ressource"},"language":["eng"],"recId":"1656875594","physDesc":[{"extent":"Online-Ressource (47 S.)"}],"note":["Gesehen am 13.05.2015"],"title":[{"subtitle":"proceedings; August 25, 2014, Karlskrona, Sweden","title":"IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)","title_sort":"IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)"}],"name":{"displayForm":["Kristian Beckers ... (eds.)"]},"titleAlt":[{"title":"ESPRE 2014"},{"title":"2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)"},{"title":"IEEE First International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)"}],"person":[{"family":"Beckers","given":"Kristian","display":"Beckers, Kristian","roleDisplay":"Hrsg.","role":"edt"}],"origin":[{"dateIssuedDisp":"2014","dateIssuedKey":"2014","publisherPlace":"Piscataway, NJ","publisher":"IEEE"}],"part":{"extent":"6","year":"2013","pages":"1-6","text":"(2013), Seite 1-6"},"id":{"eki":["1656875594"]}}],"id":{"doi":["10.1109/ESPRE.2014.6890520"],"eki":["1502844036"]},"origin":[{"dateIssuedDisp":"2014","dateIssuedKey":"2014"}],"name":{"displayForm":["Tom-Michael Hesse; Stefan Gärtner; Tobias Roehm; Barbara Paech; Kurt Schneider; Bernd Bruegge"]},"title":[{"title_sort":"Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring","title":"Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring"}],"type":{"bibl":"edited-book","media":"Online-Ressource"}} | ||
| SRT | |a SEMIAUTOMA2014 | ||