Capturing and documentation of decisions in security requirements engineering through heuristics

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Gärtner, Stefan (BerichterstatterIn) , Hesse, Tom-Michael (BerichterstatterIn) , Paech, Barbara (BerichterstatterIn)
Dokumenttyp: Article (Journal) Konferenzschrift
Sprache:Englisch
Veröffentlicht: 2014
In: Softwaretechnik-Trends
Year: 2014, Jahrgang: 34, Heft: 1, Pages: 21-22
ISSN:0720-8928
Schlagworte:
Online-Zugang:Verlag, kostenfrei, Volltext: http://pi.informatik.uni-siegen.de/stt/34_1/01_Fachgruppenberichte/RE/10_article-gaertner-fgre2013.pdf
Verlag, Volltext: http://pi.informatik.uni-siegen.de/stt/34_1/index.html
Volltext
Verfasserangaben:Stefan Gärtner, Tom-Michael Hesse, Kurt Schneider, Barbara Paech

MARC

LEADER 00000caa a22000002c 4500
001 1502923807
003 DE-627
005 20220811234349.0
007 cr uuu---uuuuu
008 150518s2014 xx |||||o 00| ||eng c
035 |a (DE-627)1502923807 
035 |a (DE-576)432923802 
035 |a (DE-599)BSZ432923802 
035 |a (OCoLC)1340691522 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
084 |a 28  |2 sdnb 
245 0 0 |a Capturing and documentation of decisions in security requirements engineering through heuristics  |c Stefan Gärtner, Tom-Michael Hesse, Kurt Schneider, Barbara Paech 
264 1 |c 2014 
300 |a 2 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Gesehen am 15.05.2017 
655 7 |a Konferenzschrift  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
700 1 |a Gärtner, Stefan  |4 oth 
700 1 |a Hesse, Tom-Michael  |d 1988-  |0 (DE-588)1070808652  |0 (DE-627)824605438  |0 (DE-576)432732187  |4 oth 
700 1 |a Paech, Barbara  |d 1959-  |0 (DE-588)172299799  |0 (DE-627)697208648  |0 (DE-576)133166821  |4 oth 
773 0 8 |i In  |t Softwaretechnik-Trends  |d Bonn : GI, 1994  |g 34(2014), 1, Seite 21-22  |h Online-Ressource  |w (DE-627)329970836  |w (DE-600)2048134-2  |w (DE-576)120989824  |x 0720-8928  |7 nnas  |a Capturing and documentation of decisions in security requirements engineering through heuristics 
773 1 8 |g volume:34  |g year:2014  |g number:1  |g pages:21-22  |g extent:2  |a Capturing and documentation of decisions in security requirements engineering through heuristics 
856 4 0 |u http://pi.informatik.uni-siegen.de/stt/34_1/01_Fachgruppenberichte/RE/10_article-gaertner-fgre2013.pdf  |x Verlag  |z kostenfrei  |3 Volltext 
856 4 0 |u http://pi.informatik.uni-siegen.de/stt/34_1/index.html  |x Verlag  |3 Volltext 
951 |a AR 
992 |a 20150518 
993 |a ConferencePaper 
994 |a 2014 
998 |g 1070808652  |a Hesse, Tom-Michael  |m 1070808652:Hesse, Tom-Michael  |d 110000  |d 110300  |e 110000PH1070808652  |e 110300PH1070808652  |k 0/110000/  |k 1/110000/110300/  |p 2 
998 |g 172299799  |a Paech, Barbara  |m 172299799:Paech, Barbara  |d 110000  |d 110300  |e 110000PP172299799  |e 110300PP172299799  |k 0/110000/  |k 1/110000/110300/  |p 4  |y j 
999 |a KXP-PPN1502923807  |e 2844620965 
BIB |a Y 
SER |a journal 
JSO |a {"title":[{"title":"Capturing and documentation of decisions in security requirements engineering through heuristics","title_sort":"Capturing and documentation of decisions in security requirements engineering through heuristics"}],"name":{"displayForm":["Stefan Gärtner, Tom-Michael Hesse, Kurt Schneider, Barbara Paech"]},"type":{"media":"Online-Ressource","bibl":"article-journal"},"recId":"1502923807","language":["eng"],"physDesc":[{"extent":"2 S."}],"person":[{"family":"Gärtner","given":"Stefan","display":"Gärtner, Stefan","role":"oth"},{"display":"Hesse, Tom-Michael","role":"oth","family":"Hesse","given":"Tom-Michael"},{"given":"Barbara","family":"Paech","role":"oth","display":"Paech, Barbara"}],"note":["Gesehen am 15.05.2017"],"origin":[{"dateIssuedDisp":"2014","dateIssuedKey":"2014"}],"id":{"eki":["1502923807"]},"relHost":[{"note":["Gesehen am 30.08.22"],"physDesc":[{"extent":"Online-Ressource"}],"language":["ger"],"recId":"329970836","type":{"bibl":"periodical","media":"Online-Ressource"},"disp":"Capturing and documentation of decisions in security requirements engineering through heuristicsSoftwaretechnik-Trends","id":{"zdb":["2048134-2"],"issn":["0720-8928"],"eki":["329970836"]},"part":{"text":"34(2014), 1, Seite 21-22","issue":"1","volume":"34","pages":"21-22","year":"2014","extent":"2"},"origin":[{"dateIssuedDisp":"1994-","publisher":"GI","publisherPlace":"Bonn","dateIssuedKey":"1994"}],"pubHistory":["Nachgewiesen 14.1994 -"],"titleAlt":[{"title":"Softwaretechnik - Trends"}],"name":{"displayForm":["Gesellschaft für Informatik"]},"title":[{"subtitle":"Mitteilungen der Fachgruppen","title_sort":"Softwaretechnik-Trends","title":"Softwaretechnik-Trends"}]}]} 
SRT |a CAPTURINGA2014