[1] E. G. Amoroso, Fundamentals of Computer Security Technology. Upper Saddle River, NJ, USA: Prentice-Hall, Inc., 1994.
[2] W. A. Arbaugh, W. L. Fithen, and J. McHugh, “Windows of vulnerability: A case study analysis,” IEEE Comput., vol. 33, no. 12, pp. 52–59, Dec. 2000. [3] N. Baddoo and T. Hall, “Motivators of software process improvement: An analysis of practitioners’ views,” J. Syst. Softw., vol. 62, no. 2, pp. 85–96, 2002. [4] D. Balzarotti, M. Cova, V. V. Felmetsger, and G. Vigna, “Multimodule vulnerability analysis of web- 306
based applications,” in Proc. 14th ACM Conf. Comput. Commun. Security, 2007, pp. 25–35.
[5] M. Bar and M. Neta, “Humans prefer curved visual objects,” Psychol. Sci., vol. 17, no. 8, pp. 645–648, 2006.
[6] D. A. Basin, J. Doser, and T. Lodderstedt, “Model driven security for process-oriented systems,” in Proc. 8th ACM Symp. Access Control Models Technol., 2003, pp. 100–109.
[7] J. Bertin, Semiology of Graphics: Diagrams, Networks, Maps. Madison, WI, USA: Univ. of Wisconsin Press, 1983.
[8] C. Britton and S. Jones, “The untrained eye: How languages for software specification support understanding in untrained users,” Human–Comput. Interact., vol. 14, nos. 1–2, pp. 191–244, 1999.
[9] R. J. A. Buhr, D. Amyot, M. Elammari, D. Quesnel, T. Gray, and S. Mankovski, “Feature-interaction visualisation and resolution in an agent environment,” in Proc. Feature Interactions Telecommun. Softw. Syst. V, 1998, pp. 135–149.
[10] C. C. Burt, B. R. Bryant, R. R. Raje, A. Olson, and M. Auguston, “Model driven security: Unification of authorization models for fine-grain access control,” in Proc. Enterprise Distrib. Object Comput. Conf., 2003, pp. 159–171.
[11] A. Blackwell. (2009). Cognitive dimensions of notations resource site. [Online]. Available: http:// www.cl.cam.ac.uk/afb21/CognitiveDimensions/
[12] A. Blackwell and T. Green, “Notational systems— the cognitive dimensions of notations framework,” in HCI Models Theories Framework Interdisciplinary Science. San Mateo, CA, USA: Morgan Kaufmann, 2003.
[13] J. Dagit, J. Lawrance, C. Neumann, M. Burnett, R. Metoyer, and S. Adams, “Using cognitive dimensions: Advice from the trenches,” J. Visual Languages Comput., vol. 17, no. 4, pp. 302–327, 2006.
[14] A. Dardenne, A. van Lamsweerde, and S. Fickas, “Goal-directed requirements acquisition,” Sci. Comput. Program., vol. 20, no. 1, pp. 3–50, 1993.
[15] T. DeMarco, Structured Analysis and System Specification. Upper Saddle River, NJ 07458: Yourdon Press, 1979.
[16] E. Dubois and S. Wu, “A framework for dealing with and specifying security requirements in information systems,” in Proc. Inform. Syst. Security, 1996, pp. 88–99.
[17] O. El Ariss, W. Jianfei, and X. Dianxiang, “Towards an enhanced design level security: Integrating attack trees with statecharts,” in Proc. 5th Int. Conf. Secure Softw. Integr. Rel. Improvement, 2011, pp. 1–10.
[18] M. El-Attar (2013, May). Companion website to security enabled statecharts research. [Online]. Available: http://faculty.kfupm.edu.sa/ICS/melattar/ ExtendedStatechartsNotationFiles.html
[19] C. Ericson, “Fault tree analysis—a history,” in Proc. 17th Int. Syst. Safety Conf., 1999, pp. 1–9.
Dhanabal S, Sreenivasalu Manda V
Department of Information Technology,
Rathinam Technical Campus,
Coimbatore, India