메뉴 건너뛰기




Volumn 11, Issue 2, 2006, Pages 138-151

Using trust assumptions with security requirements

Author keywords

[No Author keywords available]

Indexed keywords


EID: 32044457421     PISSN: 09473602     EISSN: 1432010X     Source Type: Journal    
DOI: 10.1007/s00766-005-0023-4     Document Type: Article
Times cited : (34)

References (60)
  • 1
    • 32044439548 scopus 로고    scopus 로고
    • Part 1: Introduction and general model
    • ISO/IEC: Information Technology-Security Techniques-Evaluation Criteria for IT Security. ISO/IEC, Geneva Switzerland, 1 Dec International Standard 15408-1
    • ISO/IEC: Information Technology-Security Techniques-Evaluation Criteria for IT Security. Part 1: Introduction and general model. International Standard 15408-1, ISO/IEC, Geneva Switzerland, 1 Dec 1999
    • (1999)
  • 2
    • 0031385980 scopus 로고    scopus 로고
    • Classification of research efforts in requirements engineering
    • Zave P (1997) Classification of research efforts in requirements engineering. Comput Survey 29(4):315-321
    • (1997) Comput Survey , vol.29 , Issue.4 , pp. 315-321
    • Zave, P.1
  • 5
    • 84970947585 scopus 로고    scopus 로고
    • Software engineering for security: A roadmap
    • Finkelstein A (ed) ACM Press, New York
    • Devanbu P, Stubblebine S (2000) Software engineering for security: A roadmap. Finkelstein A (ed) The future of software engineering. ACM Press, New York
    • (2000) The Future of Software Engineering
    • Devanbu, P.1    Stubblebine, S.2
  • 6
    • 32044443362 scopus 로고    scopus 로고
    • Common concepts underlying safety, security, and survivability engineering
    • Technical Report CMU/SEI-2003-TN-033, Software Engineering Institute, Carnegie Mellon University, Pittsburgh
    • Firesmith DG (2003) Common concepts underlying safety, security, and survivability engineering. Technical Report CMU/SEI-2003-TN-033, Software Engineering Institute, Carnegie Mellon University, Pittsburgh
    • (2003)
    • Firesmith, D.G.1
  • 7
    • 32044433021 scopus 로고    scopus 로고
    • Core security requirements artefacts
    • Technical Report 2004/23, Department of Computing, The Open University, Milton Keynes
    • Moffett JD, Haley CB, Nuseibeh B (2004) Core security requirements artefacts. Technical Report 2004/23, Department of Computing, The Open University, Milton Keynes
    • (2004)
    • Moffett, J.D.1    Haley, C.B.2    Nuseibeh, B.3
  • 10
    • 0002686025 scopus 로고    scopus 로고
    • Trust (and mistrust) in secure applications
    • Viega J, Kohno T, Potter B (2001) Trust (and mistrust) in secure applications. Commun ACM 44(2):31-36
    • (2001) Commun ACM , vol.44 , Issue.2 , pp. 31-36
    • Viega, J.1    Kohno, T.2    Potter, B.3
  • 11
    • 84976781807 scopus 로고
    • Reflections on trusting trust
    • Thompson K (1984) Reflections on trusting trust. Commun ACM 27(8):761-763
    • (1984) Commun ACM , vol.27 , Issue.8 , pp. 761-763
    • Thompson, K.1
  • 14
    • 0030834984 scopus 로고    scopus 로고
    • Four dark corners of requirements engineering
    • Zave P, Jackson M (1997) Four dark corners of requirements engineering. Trans Softw Eng Method 6(1):1-30
    • (1997) Trans Softw Eng Method , vol.6 , Issue.1 , pp. 1-30
    • Zave, P.1    Jackson, M.2
  • 19
    • 35248826597 scopus 로고    scopus 로고
    • Trust management tools for internet applications
    • Heraklion, Crete, 28-30 May 2003. Springer, Berlin Heidelberg New York
    • Grandison T, Sloman M (2003) Trust management tools for internet applications. Proceedings of the 1st international conference on trust management, vol 2692, Heraklion, Crete, 28-30 May 2003. Springer, Berlin Heidelberg New York
    • (2003) Proceedings of the 1st International Conference on Trust Management , vol.2692
    • Grandison, T.1    Sloman, M.2
  • 24
    • 84942921136 scopus 로고    scopus 로고
    • Modelling trust for system design using the i * strategic actors framework
    • Falcone R, Singh MP, Tan YH (eds) Springer, Berlin Heidelberg New York, 15-16 October 2002
    • Yu E, Liu L (2001) Modelling trust for system design using the i* strategic actors framework. Falcone R, Singh MP, Tan YH (eds) Trust in cyber-societies, integrating the human and artificial perspectives Springer, Berlin Heidelberg New York, 15-16 October 2002, pp 175-194
    • (2001) Trust in Cyber-societies, Integrating the Human and Artificial Perspectives , pp. 175-194
    • Yu, E.1    Liu, L.2
  • 28
    • 0142156745 scopus 로고    scopus 로고
    • Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard
    • Chicago, 13-16 October 2003. Springer, Berlin Heidelberg New York
    • Giorgini P, Massacci F, Mylopoulos J (2003) Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard. Proceedings of the 22nd international conference on conceptual modeling, Chicago, 13-16 October 2003. Springer, Berlin Heidelberg New York, pp 263-276
    • (2003) Proceedings of the 22nd International Conference on Conceptual Modeling , pp. 263-276
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3
  • 29
    • 35048841167 scopus 로고    scopus 로고
    • 2004 Requirements engineering meets trust management: Model, method, and reasoning
    • Oxford, 28 March-1 April 2004. Lecture notes in computer science. Springer, Berlin Heidelberg New York
    • Giorgini P, Massacci F, Mylopoulos J, Zannone N (2004) Requirements engineering meets trust management: Model, method, and reasoning. Proceedings of the 2nd international conference on trust management, Oxford, 28 March-1 April 2004. Lecture notes in computer science. Springer, Berlin Heidelberg New York
    • Proceedings of the 2nd International Conference on Trust Management
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 34
    • 0034291619 scopus 로고    scopus 로고
    • Handling obstacles in goal-oriented requirements engineering
    • van Lamsweerde A, Letier E (2000) Handling obstacles in goal-oriented requirements engineering. Transact Softw Eng (IEEE) 26(10):978-1005
    • (2000) Transact Softw Eng (IEEE) , vol.26 , Issue.10 , pp. 978-1005
    • van Lamsweerde, A.1    Letier, E.2
  • 36
    • 17744386105 scopus 로고    scopus 로고
    • From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering
    • 11th international requirements engineering conference (RE'03), Monterey, 8 September 2003
    • van Lamsweerde A, Brohez S, De Landtsheer R, Janssens D (2003) From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering. Requirements for high assurance systems workshop (RHAS'03), 11th international requirements engineering conference (RE'03), Monterey, 8 September 2003
    • (2003) Requirements for High Assurance Systems Workshop (RHAS'03)
    • van Lamsweerde, A.1    Brohez, S.2    De Landtsheer, R.3    Janssens, D.4
  • 39
    • 0035564297 scopus 로고    scopus 로고
    • Using WinWin quality requirements management tools: A case study
    • In H, Boehm BW (2001) Using WinWin quality requirements management tools: A case study. Ann Softw Eng 11(1):141-174
    • (2001) Ann Softw Eng , vol.11 , Issue.1 , pp. 141-174
    • In, H.1    Boehm, B.W.2
  • 45
    • 32044436702 scopus 로고    scopus 로고
    • Writing effective security abuse cases
    • Technical Report YCS-2004-375, Department of Computer Science, University of York, York, 11 May 2004
    • Srivatanakul T, Clark JA, Polack F (2004) Writing effective security abuse cases. Technical Report YCS-2004-375, Department of Computer Science, University of York, York, 11 May 2004
    • (2004)
    • Srivatanakul, T.1    Clark, J.A.2    Polack, F.3
  • 49
    • 84879473056 scopus 로고    scopus 로고
    • Integrating the NFR framework in a RE model
    • Presented at Early aspects 2004: aspect-oriented requirements engineering and architecture design (AORE'04), with the 3rd international conference on aspect-oriented software development (AOSD'04), Lancaster University, UK
    • Brito I, Moreira A (2004) Integrating the NFR framework in a RE model. Presented at Early aspects 2004: Aspect-oriented requirements engineering and architecture design (AORE'04), with the 3rd international conference on aspect-oriented software development (AOSD'04), Lancaster University, UK
    • (2004)
    • Brito, I.1    Moreira, A.2
  • 55
    • 0026882989 scopus 로고
    • Supporting systems development by capturing deliberations during requirements engineering
    • Ramesh B, Dhar V (1992) Supporting systems development by capturing deliberations during requirements engineering. IEEE Trans Softw Eng 18(6):498-510
    • (1992) IEEE Trans Softw Eng , vol.18 , Issue.6 , pp. 498-510
    • Ramesh, B.1    Dhar, V.2
  • 58
    • 32044465722 scopus 로고    scopus 로고
    • Arguing security: Validating security requirements using structured argumentation
    • Technical Report 2005/04, Department of Computing, The Open University, Milton Keynes, 21 March 2005
    • Haley CB, Laney RC, Nuseibeh B (2005) Arguing security: Validating security requirements using structured argumentation. Technical Report 2005/04, Department of Computing, The Open University, Milton Keynes, 21 March 2005
    • (2005)
    • Haley, C.B.1    Laney, R.C.2    Nuseibeh, B.3
  • 60
    • 35048837543 scopus 로고    scopus 로고
    • Picking battles: The impact of trust assumptions on the elaboration of security requirements
    • St Anne's College, Oxford, 29 March-1April 2004. Lecture notes in computer science. Springer, Berlin Heidelberg New York
    • Haley CB, Laney RC, Moffett JD, Nuseibeh B (2004) Picking battles: The impact of trust assumptions on the elaboration of security requirements. Proceedings of the 2nd international conference on trust management (iTrust'04), vol 2995, St Anne's College, Oxford, 29 March-1April 2004. Lecture notes in computer science. Springer, Berlin Heidelberg New York, pp 347-354
    • (2004) Proceedings of the 2nd International Conference on Trust Management (iTrust'04) , vol.2995 , pp. 347-354
    • Haley, C.B.1    Laney, R.C.2    Moffett, J.D.3    Nuseibeh, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.