메뉴 건너뛰기




Volumn 29, Issue 2, 2007, Pages 244-253

A common criteria based security requirements engineering process for the development of secure information systems

Author keywords

Common Criteria; ISO IEC 15408; ISO IEC 17799; Security requirement; Security requirements engineering

Indexed keywords

COMPUTER SOFTWARE; DATABASE SYSTEMS; INFORMATION TECHNOLOGY; SECURITY SYSTEMS; SOFTWARE ENGINEERING;

EID: 33751416458     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2006.04.002     Document Type: Article
Times cited : (193)

References (21)
  • 1
    • 0002082632 scopus 로고
    • The development duality of information systems security
    • Baskerville R. The development duality of information systems security. Journal of Management Systems 4 1 (1992) 1-12
    • (1992) Journal of Management Systems , vol.4 , Issue.1 , pp. 1-12
    • Baskerville, R.1
  • 2
    • 33751404625 scopus 로고    scopus 로고
    • G. Booch, J. Rumbaugh, I. Jacobson, The Unified Software Development Process, ed. Addison-Wesley. 1999.
  • 4
    • 33751418748 scopus 로고    scopus 로고
    • CERT, http://www.cert.org.
  • 5
    • 84945272841 scopus 로고    scopus 로고
    • Requirements Classification and Reuse: Crossing Domains Boundaries
    • Cybulsky J., and Reed K. Requirements Classification and Reuse: Crossing Domains Boundaries. ICSR'2000 (2000) 190-210
    • (2000) ICSR'2000 , pp. 190-210
    • Cybulsky, J.1    Reed, K.2
  • 6
    • 2942757657 scopus 로고    scopus 로고
    • Engineering security requirements
    • Firesmith D.G. Engineering security requirements. Journal of Object Technology 2 1 (2003) 53-68
    • (2003) Journal of Object Technology , vol.2 , Issue.1 , pp. 53-68
    • Firesmith, D.G.1
  • 8
    • 33751420306 scopus 로고    scopus 로고
    • ISO/IEC_JTC1/SC27, Information technology - Security techniques - Evaluation criteria for IT security, ISO/IEC 15408:2005 (Common Criteria v3.0). 2005.
  • 9
    • 33751413323 scopus 로고    scopus 로고
    • Integrating the Common Criteria Into the Software Engineering Lifecycle
    • Kam S.H. Integrating the Common Criteria Into the Software Engineering Lifecycle. IDEAS'05 (2005) 267-273
    • (2005) IDEAS'05 , pp. 267-273
    • Kam, S.H.1
  • 13
    • 17744386721 scopus 로고    scopus 로고
    • Using a security requirements engineering methodology in practice: the compliance with the Italian data protection legislation
    • Massacci F., Prest M., and Zannone N. Using a security requirements engineering methodology in practice: the compliance with the Italian data protection legislation. Computers Standards and Interfaces 27 (2005) 445-455
    • (2005) Computers Standards and Interfaces , vol.27 , pp. 445-455
    • Massacci, F.1    Prest, M.2    Zannone, N.3
  • 17
    • 85008523798 scopus 로고    scopus 로고
    • Weaving together requirements and architectures
    • Nuseibeh D. Weaving together requirements and architectures. IEEE Computer (2001) 115-117
    • (2001) IEEE Computer , pp. 115-117
    • Nuseibeh, D.1
  • 20
    • 17844409254 scopus 로고    scopus 로고
    • Requirements reuse for improving information systems security: a practitioner's approach
    • Toval A., Nicolás J., Moros B., and García F. Requirements reuse for improving information systems security: a practitioner's approach. Requirements Engineering Journal (2001) 205-219
    • (2001) Requirements Engineering Journal , pp. 205-219
    • Toval, A.1    Nicolás, J.2    Moros, B.3    García, F.4
  • 21
    • 1242263785 scopus 로고    scopus 로고
    • Holistic security requirement engineering for electronic commerce
    • Zuccato A. Holistic security requirement engineering for electronic commerce. Computers and Security, 23 (2004) 63-76
    • (2004) Computers and Security , vol.23 , pp. 63-76
    • Zuccato, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.