Currently browsing: Items authored or edited by Charles Haley
2010To Top
Tun, Thein Than; Yu, Yijun; Haley, C. and Nuseibeh, B.
(2010).
Montrieux, Lionel; Jürjens, Jan; Haley, Charles; Yu, Yijun; Schobbens, Pierre-Yves and Toussaint, Hubert
(2010).
2009To Top
Nuseibeh, Bashar; Haley, Charles B. and Foster, Craig
(2009).
Tun, Thein; Chapman, Rod; Haley, Charles; Laney, Robin and Nuseibeh, Bashar
(2009).
2008To Top
Haley, Charles B. and Nuseibeh, Bashar
(2008).
Tun, Thein Than; Chapman, Rod; Haley, Charles; Laney, Robin and Nuseibeh, Bashar (2008). Introducing new features to a critical software system. Technical Report 2008/11; Department of Computing, The Open University.
Haley, Charles B.; Laney, Robin; Moffett, Jonathan D. and Nuseibeh, Bashar
(2008).
Haley, Charles B. (2008). Arguing security: A framework for analyzing security requirements. Saarbrücken: VDM Verlag Dr Müller.
Haley, Charles B; Laney, Robin; Moffett, Jonathan D and Nuseibeh, Bashar
(2008).
2007To Top
Haley, Charles B.
(2007).
2006To Top
Haley, Charles B.; Laney, Robin; Moffett, Jonathan D. and Nuseibeh, Bashar
(2006).
Haley, Charles B.; Moffett, Jonathan D.; Laney, Robin and Nuseibeh, Bashar
(2006).
Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar
(2006).
Page, V.; Laney, R.; Dixon, M. and Haley, C.
(2006).
2005To Top
Haley, Charles B.; Laney, Robin C. and Nuseibeh, Bashar (2005). Validating Security Requirements Using Structured Toulmin-Style Argumentation. Technical Report 2005/04; Department of Computing, The Open University.
Haley, Charles B.; Moffett, Jonathan D.; Laney, Robin and Nuseibeh, Bashar
(2005).
2004To Top
Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar
(2004).
Moffett, Jonathan D.; Haley, Charles B. and Nuseibeh, Bashar (2004). Core Security Requirements Artefacts. Technical Report 2004/23; Department of Computing, The Open University.
Haley, Charles B.; Laney, Robin C. and Nuseibeh, Bashar
(2004).
Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar
(2004).
Haley, Charles B.; Laney, Robin C. and Nuseibeh, Bashar
(2004).
2003To Top
Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D and Nuseibeh, Bashar (2003). Picking Battles: the Impact of Trust Assumptions on the Elaboration of Security Requirements. Technical Report 2003/19; Department of Computing, The Open University.
Haley, Charles B.; Jackson, Michael A.; Laney, Robin C. and Nuseibeh, Bashar (2003). An Example Using Problem Frames: Analysis of a Lighting Control System. Technical Report 2003/18; Department of Computing, The Open University.
Haley, C. B.; Laney, R. C. and Nuseibeh, B. A, (2003). Deriving Security Requirements from Crosscutting Threat Descriptions. Technical Report 2003/11; Department of Computing, The Open University.
Haley, Charles B.
(2003).
Haley, Charles and Nuseibeh, Bashar
(2003).