메뉴 건너뛰기




Volumn 19, Issue 12, 2006, Pages 14-19

Experiences in eliciting security requirements

Author keywords

[No Author keywords available]

Indexed keywords

REQUIREMENTS ELICITATION METHODS; SECURITY REQUIREMENTS; SECURITY REQUIREMENTS ELICITATION;

EID: 33845342159     PISSN: None     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (3)

References (13)
  • 2
    • 0034497420 scopus 로고    scopus 로고
    • Eliciting security requirements by misuse cases
    • Sydney, Australia, Nov. 20-23, 2000. Los Alamitos, CA: Institute of Electrical and Electronics Engineers Computer Society
    • Sindre, G., and A.L. Opdahl, "Eliciting Security Requirements by Misuse Cases." 37th International Conference on Technology of Object-Oriented Languages (Tools 37-Pacific 2000). Sydney, Australia, Nov. 20-23, 2000. Los Alamitos, CA: Institute of Electrical and Electronics Engineers Computer Society, 2000.
    • (2000) 37th International Conference on Technology of Object-oriented Languages (Tools 37-Pacific 2000)
    • Sindre, G.1    Opdahl, A.L.2
  • 6
    • 33845328318 scopus 로고
    • Systems Designers Scientific. London, England: SD-Scicon
    • Systems Designers Scientific. CORE The Method: User Manual. London, England: SD-Scicon, 1986.
    • (1986) CORE the Method: User Manual
  • 7
    • 0004120213 scopus 로고
    • Berkeley, University of California
    • Kunz, W., and H. Rittel. Issues as Elements of Information Systems. Berkeley: Institute of Urban and Regional Development, University of California, 1970 〈www.iurd.ced. berkeley.edu/pub/WP-131.pdf〉.
    • (1970) Issues as Elements of Information Systems
    • Kunz, W.1    Rittel, H.2
  • 10
  • 11
    • 0033683937 scopus 로고    scopus 로고
    • An assessment of the relative efficiency of a facilitator-driven requirements collection process with respect to the conventional interview method
    • Los Alamitos, CA: IEEEComputer Society Press
    • Hubbard, R., Nancy R. Mead, and C. Schroeder. "An Assessment of the Relative Efficiency of a Facilitator-Driven Requirements Collection Process With Respect to the Conventional Interview Method," Proc. of the International Conference on Requirements Engineering. Los Alamitos, CA: IEEEComputer Society Press, 2000.
    • (2000) Proc. of the International Conference on Requirements Engineering
    • Hubbard, R.1    Mead, N.R.2    Schroeder, C.3
  • 12
    • 84860049512 scopus 로고    scopus 로고
    • United States. Dept. of Homeland Security. National Cyber Security Division
    • United States. Dept. of Homeland Security. BuildSecurityIn Portal. National Cyber Security Division 〈https://buildsecurityin.us-cert.gov/ 〉.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.