메뉴 건너뛰기




Volumn 3982 LNCS, Issue , 2006, Pages 1044-1053

A comparative study of proposals for establishing security requirements for the development of secure information systems

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION RETRIEVAL SYSTEMS; PROBLEM SOLVING; REQUIREMENTS ENGINEERING; SOFTWARE ENGINEERING;

EID: 33745912495     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11751595_109     Document Type: Conference Paper
Times cited : (17)

References (26)
  • 2
    • 0002082632 scopus 로고
    • The development duality of information systems security
    • Baskeville, R., The development duality of information systems security. Journal of Management Systems, 1992. 4(1): p. 1-12.
    • (1992) Journal of Management Systems , vol.4 , Issue.1 , pp. 1-12
    • Baskeville, R.1
  • 4
    • 4544242352 scopus 로고    scopus 로고
    • Balancing agility and discipline: Evaluating and integrating agile and plan-driven methods
    • Boehm, B. and Turner, R., Balancing Agility and Discipline: Evaluating and Integrating Agile and Plan-Driven Methods. 2004: ICSE'04. p. 718-719.
    • (2004) ICSE'04 , pp. 718-719
    • Boehm, B.1    Turner, R.2
  • 5
    • 84935093956 scopus 로고    scopus 로고
    • Towards a systematic development of secure systems
    • Breu, R., Burger, K., Hafner, M., and Popp, G., Towards a Systematic Development of Secure Systems. 2004: WOSIS 2004.
    • (2004) WOSIS 2004
    • Breu, R.1    Burger, K.2    Hafner, M.3    Popp, G.4
  • 6
  • 8
    • 2942757657 scopus 로고    scopus 로고
    • Engineering security requirements
    • Firesmith, D.G., Engineering Security Requirements. Journal of Object Technology, 2003. 2(1): p. 53-68.
    • (2003) Journal of Object Technology , vol.2 , Issue.1 , pp. 53-68
    • Firesmith, D.G.1
  • 10
    • 2942753973 scopus 로고    scopus 로고
    • Specifying reusable security requirements
    • Firesmith, D.G., Specifying Reusable Security Requirements. 2004: Journal of Object Technology, p. 61-75.
    • (2004) Journal of Object Technology , pp. 61-75
    • Firesmith, D.G.1
  • 13
    • 33745880766 scopus 로고    scopus 로고
    • Modeling security requirements for information systems development
    • Jennex, M.E., Modeling security requirements for information systems development. 2005: SREIS 2005.
    • (2005) SREIS 2005
    • Jennex, M.E.1
  • 15
    • 33745899098 scopus 로고    scopus 로고
    • Automatic translation form requirements model into use cases modeling on UML
    • C. Youn-Ky, Editor
    • Kim., H.-K., Automatic Translation Form Requirements Model into Use Cases Modeling on UML, C. Youn-Ky, Editor. 2005: ICCSA 2005.
    • (2005) ICCSA 2005
    • Kim, H.-K.1
  • 20
    • 33747329910 scopus 로고    scopus 로고
    • Threat modeling as a basis for security requirements
    • Myagmar, S., J. Lee, A., and Yurcik, W., Threat Modeling as a Basis for Security Requirements. 2005: SREIS 2005.
    • (2005) SREIS 2005
    • Myagmar, S.1    Lee, J.A.2    Yurcik, W.3
  • 21
    • 39449131317 scopus 로고    scopus 로고
    • Agile security requirements engineering
    • Peeters, J., Agile Security Requirements Engineering. 2005: SREIS 2005.
    • (2005) SREIS 2005
    • Peeters, J.1
  • 24
    • 17844409254 scopus 로고    scopus 로고
    • Requirements reuse for improving information systems security: A practitioner's approach
    • Toval, A., Nicolas, J., Moros, B., and García, F., Requirements Reuse for Improving Information Systems Security: A Practitioner's Approach. 2001: Requirements Engineering Journal, p. 205-219.
    • (2001) Requirements Engineering Journal , pp. 205-219
    • Toval, A.1    Nicolas, J.2    Moros, B.3    García, F.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.