Author of the publication

Introducing Abuse Frames for Analysing Security Requirements.

, , , , and . RE, page 371-372. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sofware quality: Theory and management, A.C. Gillies. Chapman & Hall, Andover, 1992, ISBN 0-412-951301. Price: £19.95.. Journal of Software Maintenance, 6 (2): 99-100 (1994)Object oriented design with applications: Booch, G Benjamin Cummings, Redwood City, CA, USA (1991) £25.95 pp 58(.. Microprocessors and Microsystems - Embedded Hardware Design, 16 (6): 332 (1992)Introducing Abuse Frames for Analysing Security Requirements., , , , and . RE, page 371-372. IEEE Computer Society, (2003)Algebraic Validation of software Metrics., and . ESEC, volume 550 of Lecture Notes in Computer Science, page 343-363. Springer, (1991)The Effectiveness of T-Way Test Data Generation., , and . SAFECOMP, volume 5219 of Lecture Notes in Computer Science, page 16-29. Springer, (2008)A Program Design Language Based Software Maintenance Tool.. Softw., Pract. Exper., 15 (6): 583-594 (1985)Software Metrics in Software Engineering and Artificial Intelligence., and . International Journal of Software Engineering and Knowledge Engineering, 1 (4): 463-476 (1991)The Rapid Generation of a Class of Software Tools., and . Comput. J., 29 (2): 151-160 (1986)The evaluation of access costs in object databases., , and . Information & Software Technology, 42 (8): 557-569 (2000)Unit Testing in Practice., , and . ISSRE, page 3-13. IEEE Computer Society, (2004)