메뉴 건너뛰기




Volumn 35, Issue 9, 2005, Pages 873-897

Applying security design analysis to a service-based system

Author keywords

Design; Distributed systems; Grid; Risk; Security; Service based

Indexed keywords

COMPUTER APPLICATIONS; COMPUTER ARCHITECTURE; CONSTRAINT THEORY; DATA PROCESSING; DISTRIBUTED COMPUTER SYSTEMS; PROJECT MANAGEMENT; REAL TIME SYSTEMS; RISK ASSESSMENT;

EID: 22144449985     PISSN: 00380644     EISSN: None     Source Type: Journal    
DOI: 10.1002/spe.693     Document Type: Conference Paper
Times cited : (10)

References (27)
  • 1
    • 33746338083 scopus 로고    scopus 로고
    • Carnegie Mellon, Software Engineering Institute, CERT Coordination Centre
    • Alberts C, Dorofee A. OCTAVE Method Implementation Guide Version 2.0. Carnegie Mellon, Software Engineering Institute, CERT Coordination Centre. Available at: http://www.cert.org/octave/download/intro.html.
    • OCTAVE Method Implementation Guide Version 2.0
    • Alberts, C.1    Dorofee, A.2
  • 2
    • 1842829828 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST), SP 800-30, January
    • Risk Management Guide for Information Technology Systems. National Institute of Standards and Technology (NIST), SP 800-30, January 2002. Available at: http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf.
    • (2002) Risk Management Guide for Information Technology Systems
  • 4
    • 3042809894 scopus 로고    scopus 로고
    • Tangible ROI through secure software engineering
    • Soo Hoo K, Sudbury AW, Jaquith AR. Tangible ROI through secure software engineering. Secure Business Quarterly 2001; 1(2). Available at: http://www.sbq.com/sbq/rosi/.
    • (2001) Secure Business Quarterly , vol.1 , Issue.2
    • Soo Hoo, K.1    Sudbury, A.W.2    Jaquith, A.R.3
  • 7
    • 22144449959 scopus 로고    scopus 로고
    • Delivering a Grid enabled Distributed Aircraft Maintenance Environment (DAME)
    • Nottingham, U.K., 2003. EPSRC
    • Jackson T, Austin J, Fletcher M, Jessop M. Delivering a Grid enabled Distributed Aircraft Maintenance Environment (DAME). Proceedings of the UK e-Science All Hands Meeting, Nottingham, U.K., 2003. EPSRC, 2003. Available at: http://www.nesc.ac.uk/events/ahm2003/AHMCD/.
    • (2003) Proceedings of the UK E-Science All Hands Meeting
    • Jackson, T.1    Austin, J.2    Fletcher, M.3    Jessop, M.4
  • 9
    • 22144449238 scopus 로고    scopus 로고
    • Adapting security risk analysis to service-based systems
    • Oxford, U.K. Technical Report YCS 380, Department of Computer Science, University of York
    • Chivers H, Fletcher M. Adapting security risk analysis to service-based systems. Proceedings of the Grid Security Practice and Experience Workshop, Oxford, U.K. Technical Report YCS 380, Department of Computer Science, University of York, 2004.
    • (2004) Proceedings of the Grid Security Practice and Experience Workshop
    • Chivers, H.1    Fletcher, M.2
  • 10
    • 22144469094 scopus 로고    scopus 로고
    • Security and systems engineering
    • Department of Computer Science, University of York, June
    • Chivers H. Security and systems engineering. Technical Report YCS 378, Department of Computer Science, University of York, June 2004.
    • (2004) Technical Report YCS , vol.378
    • Chivers, H.1
  • 11
    • 0038562418 scopus 로고
    • National Institute of Standards and Technology (NIST), SP 800-12, October
    • An Introduction to Computer Security: The NIST Handbook. National Institute of Standards and Technology (NIST), SP 800-12, October 1995. Available at: http://csrc.nist.gov/publications/nistpubs/800-12/.
    • (1995) An Introduction to Computer Security: The NIST Handbook
  • 14
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • Baskerville R. Information systems security design methods: Implications for information systems development. ACM Computing Surveys 1993; 25(4):375-414.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 15
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision-making
    • Straub DW, Welke RJ. Coping with systems risk: Security planning models for management decision-making. MIS Quarterly 1998; 22(4):441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 17
    • 84941189169 scopus 로고    scopus 로고
    • Insight Consulting Limited
    • CRAMM Risk Assessment Tool Overview. Insight Consulting Limited. Available at: http://www.cramm.com/riskassessment.htm.
    • CRAMM Risk Assessment Tool Overview
  • 20
    • 0029191009 scopus 로고
    • A dealing with non-functional requirements: Three experimental studies of a process-oriented approach
    • Seattle, WA. ACM Press: New York
    • Chung L, Nixon BA. A dealing with non-functional requirements: Three experimental studies of a process-oriented approach. Proceedings of the 17th International Conference on Software Engineering, Seattle, WA. ACM Press: New York, 1995; 25-37.
    • (1995) Proceedings of the 17th International Conference on Software Engineering , pp. 25-37
    • Chung, L.1    Nixon, B.A.2
  • 21
    • 0026883734 scopus 로고
    • Representing and using nonfunctional requirements: A process-oriented approach
    • Mylopoulos J, Chung L, Nixon B. Representing and using nonfunctional requirements: A process-oriented approach. IEEE Transactions on Software Engineering 1992; 18(6):483-497.
    • (1992) IEEE Transactions on Software Engineering , vol.18 , Issue.6 , pp. 483-497
    • Mylopoulos, J.1    Chung, L.2    Nixon, B.3
  • 23
    • 4243980729 scopus 로고    scopus 로고
    • Strategies for developing policies and requirements for secure electronic commerce systems
    • Ghosh AK (ed.). Kluwer Academic Publishers
    • Antón AI, Earp JB. Strategies for developing policies and requirements for secure electronic commerce systems. Recent Advances in Secure and Private E-Commerce, Ghosh AK (ed.). Kluwer Academic Publishers, 2001; 29-46.
    • (2001) Recent Advances in Secure and Private E-commerce , pp. 29-46
    • Antón, A.I.1    Earp, J.B.2
  • 24
    • 12344314483 scopus 로고    scopus 로고
    • A framework for security requirements engineering
    • Department of Computer Science, University of York, 20 August
    • Moffett JD, Nuseibeh BA. A framework for security requirements engineering. Technical Report YCS-2003-368, Department of Computer Science, University of York, 20 August 2003.
    • (2003) Technical Report , vol.YCS-2003-368
    • Moffett, J.D.1    Nuseibeh, B.A.2
  • 26
    • 22144453559 scopus 로고    scopus 로고
    • Model-based security risk analysis for Web applications: The CORAS approach
    • St Anne's College, Oxford, U.K. (Electronic Workshops in Computing). British Computer Society: Swindon, U.K.
    • Dimitrakos T, Raptis D, Ritchie B, Stølen K. Model-based security risk analysis for Web applications: The CORAS approach. Proceedings of the EuroWeb 2002. St Anne's College, Oxford, U.K. (Electronic Workshops in Computing). British Computer Society: Swindon, U.K., 2002. Available at: http://ewic.bcs.org/conferences/2002/euroweb/index.htm.
    • (2002) Proceedings of the EuroWeb 2002
    • Dimitrakos, T.1    Raptis, D.2    Ritchie, B.3    Stølen, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.