메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 79-92

Ensuring compliance between policies, requirements and software design: A case study

Author keywords

Access control; Policy specification; Requirements analysis; Software design

Indexed keywords

ACCESS CONTROL; POLICY SPECIFICATION; REQUIREMENTS ANALYSIS; SOFTWARE DESIGN;

EID: 33750956931     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWIA.2006.7     Document Type: Conference Paper
Times cited : (12)

References (35)
  • 1
    • 0141509901 scopus 로고    scopus 로고
    • Precluding incongruous behavior by aligning software requirements with security and privacy policies
    • A.I. Antón, J.B. Earp and R.A. Carter. Precluding Incongruous Behavior by Aligning Software Requirements with Security and Privacy Policies, Information and Software Technology, Vol. 45 (14), pp. 967-977, 2003.
    • (2003) Information and Software Technology , vol.45 , Issue.14 , pp. 967-977
    • Antón, A.I.1    Earp, J.B.2    Carter, R.A.3
  • 2
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases: Use cases with hostile intent
    • I. Alexander. Misuse Cases: Use Cases with Hostile Intent. IEEE Software, Vol. 20 (1), pp. 58-66, 2003.
    • (2003) IEEE Software , vol.20 , Issue.1 , pp. 58-66
    • Alexander, I.1
  • 7
    • 0141733117 scopus 로고    scopus 로고
    • Modelling access policies using roles in requirements engineering
    • Elsevier
    • R. Crook, D. Ince, and B. Nuseibeh. Modelling Access Policies Using Roles in Requirements Engineering, Information and Software Technology, 45(14), pp. 979-991, Elsevier, 2003.
    • (2003) Information and Software Technology , vol.45 , Issue.14 , pp. 979-991
    • Crook, R.1    Ince, D.2    Nuseibeh, B.3
  • 11
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D.E. Denning. A Lattice Model of Secure Information Flow, Comm. of the ACM, 19(5), pp. 236-243, 1976.
    • (1976) Comm. of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 20
    • 33750948728 scopus 로고    scopus 로고
    • Security and Privacy Requirements Analysis Tool (SPRAT) software requirements specification version 2.00
    • April 9
    • N. Jain, A.I. Anton, W.H. Stufflebeam, and Q. He. Security and Privacy Requirements Analysis Tool (SPRAT) Software Requirements Specification Version 2.00, NCSU CS Technical Report TR-2004-7, April 9, 2004.
    • (2004) NCSU CS Technical Report , vol.TR-2004-7
    • Jain, N.1    Anton, A.I.2    Stufflebeam, W.H.3    He, Q.4
  • 24
    • 4544255381 scopus 로고    scopus 로고
    • Elaborating security requirements by construction of intentional anti-models
    • A. van Lamsweerde. Elaborating Security Requirements by Construction of Intentional Anti-Models. 26th Int'l Conf. on Software Engineering (ICSE'04), pp. 148-157, 2004.
    • (2004) 26th Int'l Conf. on Software Engineering (ICSE'04) , pp. 148-157
    • Van Lamsweerde, A.1
  • 30
    • 0028401161 scopus 로고
    • Inquiry-based requirements analysis
    • C. Potts, K. Takahashi and A.I. Anton. Inquiry-Based Requirements Analysis, IEEE Software, 11(2), pp. 21-32, 1994.
    • (1994) IEEE Software , vol.11 , Issue.2 , pp. 21-32
    • Potts, C.1    Takahashi, K.2    Anton, A.I.3
  • 33
    • 85001776519 scopus 로고    scopus 로고
    • Transnational information sharing, event notification, rule enforcement and process coordination
    • S. Su, et al. Transnational Information Sharing, Event Notification, Rule Enforcement and Process Coordination. Int'l Journal of Electronic Government Research (IJEGR), Vol. 1 (2), pp. 1-26, 2005.
    • (2005) Int'l Journal of Electronic Government Research (IJEGR) , vol.1 , Issue.2 , pp. 1-26
    • Su, S.1
  • 35
    • 85026689401 scopus 로고
    • Modeling organizations for information systems requirements engineering
    • E. Yu. Modeling Organizations for Information Systems Requirements Engineering, 1st IEEE Int'l Symp. on Requirements Engineering, pp. 34-41,1993.
    • (1993) 1st IEEE Int'l Symp. on Requirements Engineering , pp. 34-41
    • Yu, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.