메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 654-661

A comparison of the common criteria with proposals of information systems security requirements

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION TECHNOLOGY; PROBLEM SOLVING; STANDARDS; SYSTEMS ANALYSIS;

EID: 33750950652     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2006.2     Document Type: Conference Paper
Times cited : (16)

References (28)
  • 1
  • 2
    • 0002082632 scopus 로고
    • The development duality of information systems security
    • Baskeville, R., The development duality of information systems security. Journal of Management Systems, 1992. 4(1): p. 1-12.
    • (1992) Journal of Management Systems , vol.4 , Issue.1 , pp. 1-12
    • Baskeville, R.1
  • 4
    • 4544242352 scopus 로고    scopus 로고
    • Balancing agility and discipline: Evaluating and integrating agile and plan-driven methods
    • Boehm, B. and R. Turner, Balancing Agility and Discipline: Evaluating and Integrating Agile and Plan-Driven Methods. 2004: ICSE'04. p. 718-719.
    • (2004) ICSE'04. , pp. 718-719
    • Boehm, B.1    Turner, R.2
  • 5
    • 84935093956 scopus 로고    scopus 로고
    • Towards a systematic development of secure systems
    • Breu, R., et al., Towards a Systematic Development of Secure Systems. 2004: WOSIS 2004.
    • (2004) WOSIS 2004
    • Breu, R.1
  • 8
    • 2942757657 scopus 로고    scopus 로고
    • Engineering security requirements
    • Firesmith, D.G., Engineering Security Requirements. Journal of Object Technology, 2003. 2(1): p. 53-68.
    • (2003) Journal of Object Technology , vol.2 , Issue.1 , pp. 53-68
    • Firesmith, D.G.1
  • 10
    • 2942753973 scopus 로고    scopus 로고
    • Specifying reusable security requirements
    • Firesmith, D.G., Specifying Reusable Security Requirements. 2004: Journal of Object Technology, p. 61-75.
    • (2004) Journal of Object Technology , pp. 61-75
    • Firesmith, D.G.1
  • 11
    • 68249148138 scopus 로고    scopus 로고
    • Security requirements for web services based on SIREN
    • Gutiérrez, C., et al., Security Requirements for Web Services based on SIREN. 2005: SREIS-2005.
    • (2005) SREIS-2005
    • Gutiérrez, C.1
  • 14
    • 33745880766 scopus 로고    scopus 로고
    • Modeling security requirements for information systems development
    • Jennex, M.E., Modeling security requirements for information systems development. 2005: SREIS 2005.
    • (2005) SREIS 2005
    • Jennex, M.E.1
  • 16
    • 33745899098 scopus 로고    scopus 로고
    • Automatic translation form requirements model into use cases modeling on UML
    • C. Youn-Ky, Editor
    • Kim., H.-K., Automatic Translation Form Requirements Model into Use Cases Modeling on UML, C. Youn-Ky, Editor. 2005: ICCSA 2005.
    • (2005) ICCSA 2005
    • Kim, H.-K.1
  • 21
    • 33747329910 scopus 로고    scopus 로고
    • Threat modeling as a basis for security requirements
    • Myagmar, S., A. J. Lee, and W. Yurcik, Threat Modeling as a Basis for Security Requirements. 2005: SREIS 2005.
    • (2005) SREIS 2005
    • Myagmar, S.1    Lee, A.J.2    Yurcik, W.3
  • 22
    • 39449131317 scopus 로고    scopus 로고
    • Agile security requirements engineering
    • Peeters, J., Agile Security Requirements Engineering. 2005: SREIS 2005.
    • (2005) SREIS 2005
    • Peeters, J.1
  • 24
    • 84944683046 scopus 로고    scopus 로고
    • Security-critical system development with extended use cases
    • Popp, G., et al., Security-Critical System Development with Extended Use Cases. 2003: 10th Asia-Pacific Software Engineering Conference, p. 478-487.
    • (2003) 10th Asia-Pacific Software Engineering Conference , pp. 478-487
    • Popp, G.1
  • 26
    • 17844409254 scopus 로고    scopus 로고
    • Requirements reuse for improving information systems security: A practitioner's approach
    • Toval, A., et al., Requirements Reuse for Improving Information Systems Security: A Practitioner's Approach. 2001: Requirements Engineering Journal, p. 205-219.
    • (2001) Requirements Engineering Journal , pp. 205-219
    • Toval, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.