메뉴 건너뛰기




Volumn 23, Issue 1, 2004, Pages 63-76

Holistic security requirement engineering for electronic commerce

Author keywords

Electronic commerce; Holistic requirements engineering; Risk analysis; Security requirement; Security requirement engineering

Indexed keywords

DATA PRIVACY; ELECTRONIC COMMERCE; INFORMATION TECHNOLOGY; RISK ASSESSMENT;

EID: 1242263785     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(04)00065-3     Document Type: Article
Times cited : (36)

References (29)
  • 4
    • 1242318258 scopus 로고    scopus 로고
    • Basic protection manual
    • Bundesamt fuer Sicherheit in der Informationstechnologie
    • BSI. Basic protection manual. Technical report, Bundesamt fuer Sicherheit in der Informationstechnologie; 2002.
    • (2002) Technical Report
  • 5
    • 0035149661 scopus 로고    scopus 로고
    • From risk analysis to security requirements
    • Gerber M., von Solms R. From risk analysis to security requirements. Comput Secur. 20:(7):2000;577-584.
    • (2000) Comput Secur , vol.20 , Issue.7 , pp. 577-584
    • Gerber, M.1    Von Solms, R.2
  • 15
    • 0242329011 scopus 로고    scopus 로고
    • The use of business process modelling in information systems security analysis and design
    • Kokolakis S., Demopoulos A., Kiountouzis E. The use of business process modelling in information systems security analysis and design. Inform Manag Comput Secur. 8:(3):2000;107-116.
    • (2000) Inform Manag Comput Secur , vol.8 , Issue.3 , pp. 107-116
    • Kokolakis, S.1    Demopoulos, A.2    Kiountouzis, E.3
  • 18
    • 0029392060 scopus 로고
    • A technique to include computer security, safety, and resilience requirements as part of the requirement specification
    • Mostert D., von Solms S. A technique to include computer security, safety, and resilience requirements as part of the requirement specification. J Syst Software. 31:1995;45-53.
    • (1995) J Syst Software , vol.31 , pp. 45-53
    • Mostert, D.1    Von Solms, S.2
  • 21
    • 0026238138 scopus 로고
    • A framework for security requirements
    • Pfleeger S.L. A framework for security requirements. Comput Secur. 10:(6):1991;515-523.
    • (1991) Comput Secur , vol.10 , Issue.6 , pp. 515-523
    • Pfleeger, S.L.1
  • 24
    • 0034814690 scopus 로고    scopus 로고
    • Information security - A multidimensional discipline
    • von Solms B. Information security - a multidimensional discipline. Comput Secur. 20:2001;504-508.
    • (2001) Comput Secur , vol.20 , pp. 504-508
    • Von Solms, B.1
  • 26
    • 0030706923 scopus 로고    scopus 로고
    • Information security embedded in the design of telematics systems
    • Tettero O., Out D., Franken H., Schot J. Information security embedded in the design of telematics systems. Comput Secur. 16:(2):1997;145-164.
    • (1997) Comput Secur , vol.16 , Issue.2 , pp. 145-164
    • Tettero, O.1    Out, D.2    Franken, H.3    Schot, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.