메뉴 건너뛰기




Volumn 9, Issue 2-3, 2001, Pages 112-122

Integrating security design into the software development process for e-commerce systems

Author keywords

Computer security; Risk; Software development

Indexed keywords

COMPUTER SIMULATION; INFORMATION TECHNOLOGY; RISK ASSESSMENT; SECURITY OF DATA; SOFTWARE ENGINEERING; WORLD WIDE WEB;

EID: 0035780486     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220110394758     Document Type: Review
Times cited : (14)

References (18)
  • 3
    • 0011519737 scopus 로고    scopus 로고
    • 1995, Quality Attributes, Technical Report, CMU/SEI-95-TR-021, ESC-95-TR-021
    • Barbacci M. et al. (1995), Quality Attributes, Technical Report, CMU/SEI-95-TR-021, ESC-95-TR-021.
    • Barbacci, M.1
  • 6
    • 0011510134 scopus 로고    scopus 로고
    • A framework for reengineering three-tier client server systems on the Web
    • Chan, M.T. (1998), "A framework for reengineering three-tier client server systems on the Web", International Journal of Applied Software Technology, Vol. 4 No. 4, pp. 123-48.
    • (1998) International Journal of Applied Software Technology , vol.4 , Issue.4 , pp. 123-148
    • Chan, M.T.1
  • 7
    • 0002296440 scopus 로고    scopus 로고
    • Modeling Web application architectures with UML
    • October
    • Conallen, J. (1999), "Modeling Web application architectures with UML", Communications of the ACM, Vol. 42 No. 10, October, pp. 63-71.
    • (1999) Communications of the ACM , vol.42 , Issue.10 , pp. 63-71
    • Conallen, J.1
  • 9
    • 0002096587 scopus 로고    scopus 로고
    • UML 2001: A standardization odyssey
    • October
    • Kobryn, C. (1999), "UML 2001: a standardization odyssey", Comm. of the ACM, Vol. 42 No. 10, October, pp. 29-37.
    • (1999) Comm. of the ACM , vol.42 , Issue.10 , pp. 29-37
    • Kobryn, C.1
  • 10
    • 84986089117 scopus 로고    scopus 로고
    • A hypertext information security model for organisations
    • Kwok, L.F. (1997), "A hypertext information security model for organisations", Information Management and Computer Security, Vol. 5 No. 4, pp. 138-48.
    • (1997) Information Management and Computer Security , vol.5 , Issue.4 , pp. 138-148
    • Kwok, L.F.1
  • 11
    • 0030385768 scopus 로고    scopus 로고
    • A security officers' workbench
    • Kwok, L.F. and Longley, D. (1996), "A security officers' workbench", Computers and Security, Vol. 15 No. 8, pp. 695-705.
    • (1996) Computers and Security , vol.15 , Issue.8 , pp. 695-705
    • Kwok, L.F.1    Longley, D.2
  • 13
    • 0001854263 scopus 로고    scopus 로고
    • Designing component-based frameworks using patterns in the UML
    • October
    • Larsen G. (1999), "Designing component-based frameworks using patterns in the UML", Communications of the ACM, Vol. 42 No. 10, October, pp. 38-45.
    • (1999) Communications of the ACM , vol.42 , Issue.10 , pp. 38-45
    • Larsen, G.1
  • 15
    • 0011421303 scopus 로고    scopus 로고
    • white paper (last updated 19 November, 1999)
    • Microsoft (1999), DCOM Architecture, white paper, available at: http://www.microsoft.com/com/wpaper/default.asp#DCOMPapers (last updated 19 November, 1999).
    • (1999) DCOM Architecture
  • 17
    • 0011463327 scopus 로고    scopus 로고
    • Panel: Alternative assurances; Implementation of better ways!
    • Baltimore, MD, October
    • Proceedings of the 20th National Information Systems Security Conference, "Panel: alternative assurances: implementation of better ways!", Baltimore, MD, October 1997, pp. 712-13.
    • (1997) Proceedings of the 20th National Information Systems Security Conference , pp. 712-713
  • 18
    • 0011420638 scopus 로고    scopus 로고
    • last updated 24 March 2001
    • World Wide Web Consortium (2001), World Wide Web Security FAQ, available at: http:// www.w3.org/security/faq/www-security-faq.html (last updated 24 March 2001).
    • (2001) World Wide Web Security FAQ


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.