메뉴 건너뛰기




Volumn 3, Issue 1, 2004, Pages 61-75

Specifying reusable security requirements

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER HARDWARE; COMPUTER SYSTEM FIREWALLS; COMPUTER VIRUSES; CYBERNETICS; DATA ACQUISITION; DATA PRIVACY; HIERARCHICAL SYSTEMS; IDENTIFICATION (CONTROL SYSTEMS); PARAMETER ESTIMATION; PERSONNEL; PUBLIC POLICY; QUALITY ASSURANCE; RISK ASSESSMENT; SECURITY OF DATA;

EID: 2942753973     PISSN: 16601769     EISSN: None     Source Type: Journal    
DOI: 10.5381/jot.2004.3.1.c6     Document Type: Review
Times cited : (177)

References (13)
  • 1
    • 2942742232 scopus 로고    scopus 로고
    • Misuse case help to elicit nonfunctional requirements
    • [Alexander 2001]
    • [Alexander 2001] Alexander, I. "Misuse Case Help to Elicit Nonfunctional Requirements", IEE CCEJ, 2001. Available at http://wwweasyweb.easynet.co.uk/~iany/consultancy/papers.htm
    • (2001) IEE CCEJ
    • Alexander, I.1
  • 2
    • 0003619725 scopus 로고    scopus 로고
    • [Alberts 1999], Technical Report CMU/SEI-99-TR-017
    • SM) Framework, Technical Report CMU/SEI-99-TR-017 (1999). Available at http://www.sei.cmu.edu/publications/documents/99.reports/99tr017/ 99tr017abstract.html
    • (1999) SM) Framework
    • Alberts, C.J.1
  • 3
    • 2942757341 scopus 로고    scopus 로고
    • [Firesmith]
    • [Firesmith 2003a] OPEN Process Framework Website. Available at http://www.donald-firesmith.com/
    • (2003) OPEN Process Framework Website
  • 4
    • 2942757657 scopus 로고    scopus 로고
    • Engineering security requirements
    • [Firesmith 2003b], January-February
    • [Firesmith 2003b] Firesmith, D.G. "Engineering Security Requirements," in Journal of Object Technology, vol. 2, no. 1, January-February 2003, pp. 53-68. http://www.jot.fm/issues/issue_2003_01/column6
    • (2003) Journal of Object Technology , vol.2 , Issue.1 , pp. 53-68
    • Firesmith, D.G.1
  • 5
    • 2942713443 scopus 로고    scopus 로고
    • Security use cases
    • [Firesmith 2003c], May-June
    • [Firesmith 2003c] Firesmith, D.G. "Security Use Cases," in Journal of Object Technology vol. 2, no. 3, May-June 2003, pp. 53-64. http://www.jot.fm/issues/issue_2003_05/column6
    • (2003) Journal of Object Technology , vol.2 , Issue.3 , pp. 53-64
    • Firesmith, D.G.1
  • 10
    • 0034291619 scopus 로고    scopus 로고
    • Handling obstacles in goal-oriented requirements engineering
    • [Lamsweerde 2000], October
    • [Lamsweerde 2000] Axel van Lamsweerde and Emmanuel Letier, "Handling Obstacles in Goal-Oriented Requirements Engineering," IEEE Transactions on Software Engineering, Vol. 26, No. 10, October 2000, pp. 978-1005
    • (2000) IEEE Transactions on Software Engineering , vol.26 , Issue.10 , pp. 978-1005
    • Van Lamsweerde, A.1    Letier, E.2
  • 12
    • 2942742392 scopus 로고    scopus 로고
    • [Stoneburner 1999], NISTIR 6462, National Institutes of Standards and Technology (NIST), U.S. Department of Commerce, December, B-4-7
    • [Stoneburner 1999] Stoneburner, Gary, CSPP- Guidance for COTS Security Protection Profiles, NISTIR 6462, National Institutes of Standards and Technology (NIST), U.S. Department of Commerce, (December 1999), B-4-7. Available at http://csrc.nist.gov/publications/nistir/index.html.
    • (1999) CSPP- Guidance for COTS Security Protection Profiles
    • Stoneburner, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.