메뉴 건너뛰기




Volumn 2, Issue , 2005, Pages 398-403

Misuse case-based design and analysis of secure software architecture

Author keywords

Misuse case; Security; Software architecture; Use case

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER SOFTWARE; HOSPITAL DATA PROCESSING; INFORMATION ANALYSIS; SECURITY SYSTEMS;

EID: 24744457547     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/itcc.2005.199     Document Type: Conference Paper
Times cited : (30)

References (15)
  • 3
    • 0034497420 scopus 로고    scopus 로고
    • Eliciting security requirements by misuse cases
    • Sindre, G. and Opdahl, A.L. Eliciting security requirements by misuse cases. In Proc. of TOOLS Pacific 2000, pp. 120-131, 2000.
    • (2000) Proc. of TOOLS Pacific 2000 , pp. 120-131
    • Sindre, G.1    Opdahl, A.L.2
  • 5
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases: Use cases with hostile intent
    • January/February
    • Alexander, I. Misuse Cases: Use Cases with Hostile Intent. IEEE Software, 58-66 (January/February 2003).
    • (2003) IEEE Software , pp. 58-66
    • Alexander, I.1
  • 7
    • 2942713443 scopus 로고    scopus 로고
    • Security use cases
    • May-June
    • Firesmith, D.: Security Use Cases. Journal of Object Technology, Vol. 2, No. 3, 53-64. (May-June 2003).
    • (2003) Journal of Object Technology , vol.2 , Issue.3 , pp. 53-64
    • Firesmith, D.1
  • 14
    • 0030283177 scopus 로고    scopus 로고
    • Scenario-based analysis of software architecture
    • November
    • Kazman, R., Abowd, G., Bass, L., and Clements, P. Scenario-based analysis of software architecture. IEEE Software, pp. 47-55, November 1996.
    • (1996) IEEE Software , pp. 47-55
    • Kazman, R.1    Abowd, G.2    Bass, L.3    Clements, P.4
  • 15


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.