메뉴 건너뛰기




Volumn 27, Issue 5, 2005, Pages 445-455

Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation

Author keywords

Information security management system; Security requirements engineering; Standard for privacy protection

Indexed keywords

DATA PRIVACY; LAWS AND LEGISLATION; REGULATORY COMPLIANCE; REQUIREMENTS ENGINEERING; STANDARDS; TECHNICAL PRESENTATIONS;

EID: 17744386721     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2005.01.003     Document Type: Article
Times cited : (66)

References (14)
  • 1
    • 17744389340 scopus 로고    scopus 로고
    • A requirements taxonomy for reducing web site privacy vulnerabilities
    • A.I. Antòn, and J.B. Earp A requirements taxonomy for reducing web site privacy vulnerabilities Requir. Eng. 9 3 2004 169 185
    • (2004) Requir. Eng. , vol.9 , Issue.3 , pp. 169-185
    • Antòn, A.I.1    Earp, J.B.2
  • 2
    • 84942866002 scopus 로고    scopus 로고
    • Security and privacy requirements analysis within a social setting
    • L. Liu, E.S.K. Yu, and J. Mylopoulos Security and privacy requirements analysis within a social setting Proc. of RE'03 2003 151 161
    • (2003) Proc. of RE'03 , pp. 151-161
    • Liu, L.1    Yu, E.S.K.2    Mylopoulos, J.3
  • 5
    • 17744386105 scopus 로고    scopus 로고
    • From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering
    • A. van Lamsweerde, S. Brohez, R. De Landt-sheer, and D. Janssens From system goals to intruder anti-goals: attack generation and resolution for security requirements engineering Proc. of RHAS'03 2003 49 56
    • (2003) Proc. of RHAS'03 , pp. 49-56
    • Van Lamsweerde, A.1    Brohez, S.2    De Landt-Sheer, R.3    Janssens, D.4
  • 7
    • 17744364435 scopus 로고    scopus 로고
    • Information technology-code of practice for information security management
    • ISO/IEC Information technology-code of practice for information security management ISO/IEC 17799 2000
    • (2000) ISO/IEC 17799
  • 8
    • 4944223328 scopus 로고    scopus 로고
    • Cassandra: Flexible trust management, applied to electronic health records
    • M.Y. Becker, and P. Sewell Cassandra: flexible trust management, applied to electronic health records Proc. of CSFW'04 2004 139 154
    • (2004) Proc. of CSFW'04 , pp. 139-154
    • Becker, M.Y.1    Sewell, P.2
  • 9
    • 0042468094 scopus 로고    scopus 로고
    • Paper: A study on the certification of the information security management systems
    • A.R.-W. Fung, K.-J. Farn, and A.C. Lin Paper: a study on the certification of the information security management systems Comput. Stand. Interfaces 25 5 2003 447 461
    • (2003) Comput. Stand. Interfaces , vol.25 , Issue.5 , pp. 447-461
    • Fung, A.R.-W.1    Farn, K.-J.2    Lin, A.C.3
  • 10
    • 35048857793 scopus 로고    scopus 로고
    • Filling the gap between requirements engineering and public key/trust management infrastructures
    • P. Giorgini, F. Massacci, J. Mylopoulous, and N. Zannone Filling the gap between requirements engineering and public key/trust management infrastructures Proc. of EuroPKI'04, LNCS 3093 2004 98 111
    • (2004) Proc. of EuroPKI'04, LNCS 3093 , pp. 98-111
    • Giorgini, P.1    Massacci, F.2    Mylopoulous, J.3    Zannone, N.4
  • 11
    • 17744387515 scopus 로고    scopus 로고
    • Using a Security Requirements Engineering Methodology in Practice: The compliance with the Italian Data Protection Legislation
    • Univ. di Trento
    • F. Massacci, M. Prest, N. Zannone, Using a Security Requirements Engineering Methodology in Practice: The compliance with the Italian Data Protection Legislation, Technical Report DIT-04-103, Univ. di Trento 2004. Available on the web at http://eprints.biblio.unitn.it.
    • (2004) Technical Report , vol.DIT-04-103
    • Massacci, F.1    Prest, M.2    Zannone, N.3
  • 12
    • 0041524980 scopus 로고    scopus 로고
    • Information security governance
    • P. Williams Information security governance Inf. Secur. Tech. Rep. 6 3 2001 60 70
    • (2001) Inf. Secur. Tech. Rep. , vol.6 , Issue.3 , pp. 60-70
    • Williams, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.