메뉴 건너뛰기




Volumn 219, Issue , 2006, Pages 123-137

Defining security requirements through misuse actions

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 33845264120     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-34831-5_10     Document Type: Article
Times cited : (24)

References (23)
  • 1
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases: Use cases with hostile intent
    • In January/February 2003, IEEE Computer Society Press, Los Alamitos, California
    • Alexander, I.: Misuse cases: Use cases with hostile intent. In IEEE Software, Vol. 20, No. 1, January/February 2003, IEEE Computer Society Press, Los Alamitos, California (2003) 58-66.
    • (2003) IEEE Software , vol.20 , Issue.1 , pp. 58-66
    • Alexander, I.1
  • 2
    • 84942866002 scopus 로고    scopus 로고
    • Security and privacy requirements analysis within a social setting
    • In Monterey, California, 8-12 September 2003, IEEE Computer Society Press, Los Alamitos, California
    • Liu, L., Yu, E. and Mylopoulos, J.: Security and privacy requirements analysis within a social setting. In Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE'03), Monterey, California, 8-12 September 2003, IEEE Computer Society Press, Los Alamitos, California (2003) 151-161.
    • (2003) Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE'03) , pp. 151-161
    • Liu, L.1    Yu, E.2    Mylopoulos, J.3
  • 3
    • 0002670359 scopus 로고    scopus 로고
    • Attack Trees: Modeling Security Threats
    • In December 1999, CMP Media LLC, Manhasset, New York, USA
    • Schneier, B.: Attack Trees: Modeling Security Threats. In Dr. Dobb's Journal, Vol. 24, No. 12, December 1999, CMP Media LLC, Manhasset, New York, USA (2003) 21-29.
    • (2003) Dr. Dobb's Journal , vol.24 , Issue.12 , pp. 21-29
    • Schneier, B.1
  • 4
    • 0034816038 scopus 로고    scopus 로고
    • A method for designing secure solutions
    • In IBM, Riverton, New Jersey, USA
    • Whitmore, J. J.: A method for designing secure solutions. In IBM Systems Journal, Vol. 40, No. 3, IBM, Riverton, New Jersey, USA (2001) 747-768. http://www.research.ibm.com/journal/sj
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 747-768
    • Whitmore, J.J.1
  • 5
    • 1242263785 scopus 로고    scopus 로고
    • Holistic security requirement engineering for electronic commerce
    • In Elsevier, UK
    • Zuccato, A.: Holistic security requirement engineering for electronic commerce. In Computers & Security, Vol. 23, No. 1, Elsevier, UK (2004) 63-76.
    • (2004) Computers & Security , vol.23 , Issue.1 , pp. 63-76
    • Zuccato, A.1
  • 6
    • 0010729284 scopus 로고    scopus 로고
    • (2nd Ed.), Microsoft Press, Redmond, Washington, USA
    • Howard, M., and LeBlanc, D. Writing secure code, (2nd Ed.), Microsoft Press, Redmond, Washington, USA (2003).
    • (2003) Writing Secure Code
    • Howard, M.1    LeBlanc, D.2
  • 14
    • 77952351104 scopus 로고    scopus 로고
    • The Account Analysis Pattern
    • In Irsee Germany, 3-7 July 2002, Universitätsverlag Konstanz, Konstanz, Germany
    • Fernandez, E. B. and Liu, Y.: The Account Analysis Pattern. In Proceedings of EuroPLoP 2002 (Pattern Languages of Programs), Irsee Germany, 3-7 July 2002, Universitätsverlag Konstanz, Konstanz, Germany, (2002). http://www.hillside.net/patterns/EuroPLoP2002/
    • (2002) Proceedings of EuroPLoP 2002 (Pattern Languages of Programs)
    • Fernandez, E.B.1    Liu, Y.2
  • 15
    • 0028495490 scopus 로고
    • Requirements specification for process control systems
    • In September 1994, IEEE Computer Society Press, Los Alamitos, California, USA
    • Leveson, N. G., Heimdahl, M. P. E., Hildreth, H. and Reese, J. D.: Requirements specification for process control systems. In IEEE Transactions on Software Engineering, Vol. 20, No 9, September 1994, IEEE Computer Society Press, Los Alamitos, California, USA (1994) 684-707.
    • (1994) IEEE Transactions on Software Engineering , vol.20 , Issue.9 , pp. 684-707
    • Leveson, N.G.1    Heimdahl, M.P.E.2    Hildreth, H.3    Reese, J.D.4
  • 19
    • 33845247360 scopus 로고    scopus 로고
    • Deriving access control policies from requirements specifications and database design
    • North Carolina State University CS Technical Report. TR-2004-24
    • He, Q. and Anton, A. I.: Deriving access control policies from requirements specifications and database design. North Carolina State University CS Technical Report. TR-2004-24, (2004).
    • (2004)
    • He, Q.1    Anton, A.I.2
  • 21
    • 4544255381 scopus 로고    scopus 로고
    • Elaborating security requirements by construction of intentional anti-models
    • In Edinburgh, UK, 23-28 May 2004, IEEE Computer Society Press, Los Alamitos, California, USA
    • van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In Proceedings of the 26th International Conference on Software Engineering (ICSE'04), Edinburgh, UK, 23-28 May 2004, IEEE Computer Society Press, Los Alamitos, California, USA (2004) 148-157.
    • (2004) Proceedings of the 26th International Conference on Software Engineering (ICSE'04) , pp. 148-157
    • van Lamsweerde, A.1
  • 22
    • 84979008962 scopus 로고    scopus 로고
    • Held in conjunction with The 11th International Workshop on Program Comprehension, IWPC 2003 10 May 2003, Portland, Oregon, USA, IEEE Computer Society Press, Los Alamitos, California, USA
    • Huang, S. and Tilley, A.: Workshop on Graphical Documentation for Programmers: Assessing the Efficacy of UML Diagrams for Program Understanding. Held in conjunction with The 11th International Workshop on Program Comprehension, IWPC 2003, 10 May 2003, Portland, Oregon, USA, IEEE Computer Society Press, Los Alamitos, California, USA (2003) 281-282.
    • (2003) Workshop on Graphical Documentation for Programmers: Assessing the Efficacy of UML Diagrams for Program Understanding , pp. 281-282
    • Huang, S.1    Tilley, A.2
  • 23
    • 17044440521 scopus 로고    scopus 로고
    • A qualitative assessment of the efficacy of UML diagrams as a form of graphical documentation in aiding program understanding
    • In (SIGDOC 2003: 12-15 October 2003; San Francisco, California, USA, ACM Press: New York, New York, USA
    • Tilley, S., and Huang, S.: A qualitative assessment of the efficacy of UML diagrams as a form of graphical documentation in aiding program understanding. In Proceedings of the 21st ACM Annual International Conference on Design of Communication (SIGDOC 2003: 12-15 October 2003; San Francisco, California, USA, ACM Press: New York, New York, USA (2003) 184-191.
    • (2003) Proceedings of the 21st ACM Annual International Conference on Design of Communication , pp. 184-191
    • Tilley, S.1    Huang, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.