%PDF-1.5 % 4 0 obj << /S /GoTo /D (section.1) >> endobj 7 0 obj (Introduction) endobj 8 0 obj << /S /GoTo /D (section.2) >> endobj 11 0 obj (Related work) endobj 12 0 obj << /S /GoTo /D (section.3) >> endobj 15 0 obj (Methodology) endobj 16 0 obj << /S /GoTo /D (subsection.3.1) >> endobj 19 0 obj (Evaluation Scenario) endobj 20 0 obj << /S /GoTo /D (subsection.3.2) >> endobj 23 0 obj (OWASP Top 10) endobj 24 0 obj << /S /GoTo /D (section.4) >> endobj 27 0 obj (Selection of methods) endobj 28 0 obj << /S /GoTo /D (subsection.4.1) >> endobj 31 0 obj (UML based approaches) endobj 32 0 obj << /S /GoTo /D (subsubsection.4.1.1) >> endobj 35 0 obj (SecureUML) endobj 36 0 obj << /S /GoTo /D (subsubsection.4.1.2) >> endobj 39 0 obj (UMLsec) endobj 40 0 obj << /S /GoTo /D (subsubsection.4.1.3) >> endobj 43 0 obj (Misusecase) endobj 44 0 obj << /S /GoTo /D (subsection.4.2) >> endobj 47 0 obj (Aspect oriented software development) endobj 48 0 obj << /S /GoTo /D (subsubsection.4.2.1) >> endobj 51 0 obj (Aspect oriented modeling) endobj 52 0 obj << /S /GoTo /D (subsubsection.4.2.2) >> endobj 55 0 obj (Software Architecture Model \(SAM\)) endobj 56 0 obj << /S /GoTo /D (subsubsection.4.2.3) >> endobj 59 0 obj (Protocol Checker) endobj 60 0 obj << /S /GoTo /D (subsection.4.3) >> endobj 63 0 obj (Goal driven approaches) endobj 64 0 obj << /S /GoTo /D (subsubsection.4.3.1) >> endobj 67 0 obj (KAOS) endobj 68 0 obj << /S /GoTo /D (subsubsection.4.3.2) >> endobj 71 0 obj (Secure Tropos) endobj 72 0 obj << /S /GoTo /D (section.5) >> endobj 75 0 obj (Evaluation) endobj 76 0 obj << /S /GoTo /D (subsection.5.1) >> endobj 79 0 obj (Secure UML) endobj 80 0 obj << /S /GoTo /D (subsection.5.2) >> endobj 83 0 obj (UMLsec) endobj 84 0 obj << /S /GoTo /D (subsection.5.3) >> endobj 87 0 obj (Misusecase) endobj 88 0 obj << /S /GoTo /D (subsection.5.4) >> endobj 91 0 obj (Aspect oriented modeling) endobj 92 0 obj << /S /GoTo /D (subsection.5.5) >> endobj 95 0 obj (SAM) endobj 96 0 obj << /S /GoTo /D (subsection.5.6) >> endobj 99 0 obj (KAOS) endobj 100 0 obj << /S /GoTo /D (subsection.5.7) >> endobj 103 0 obj (Secure Tropos) endobj 104 0 obj << /S /GoTo /D (section.6) >> endobj 107 0 obj (Discussion) endobj 108 0 obj << /S /GoTo /D (subsection.6.1) >> endobj 111 0 obj (Comparing results) endobj 112 0 obj << /S /GoTo /D (subsection.6.2) >> endobj 115 0 obj (Current Application and Combination of Methods) endobj 116 0 obj << /S /GoTo /D (section.7) >> endobj 119 0 obj (Conclusions) endobj 120 0 obj << /S /GoTo /D [121 0 R /Fit] >> endobj 127 0 obj << /Length 2919 /Filter /FlateDecode >> stream xڝY[۶~#5w;iML