메뉴 건너뛰기




Volumn 66, Issue 1, 2007, Pages 60-70

Software requirements and architecture modeling for evolving non-secure applications into secure applications

Author keywords

Application system; Evolution; Security; Software architecture; Software requirements

Indexed keywords

ELECTRONIC COMMERCE; MATHEMATICAL MODELS; REQUIREMENTS ENGINEERING; SECURITY OF DATA; SOFTWARE ARCHITECTURE;

EID: 33947608669     PISSN: 01676423     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.scico.2006.10.009     Document Type: Article
Times cited : (28)

References (28)
  • 1
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases: Use cases with hostile intent
    • Alexander I. Misuse cases: Use cases with hostile intent. IEEE Software 20 1 (2003) 58-66
    • (2003) IEEE Software , vol.20 , Issue.1 , pp. 58-66
    • Alexander, I.1
  • 2
    • 38049147663 scopus 로고    scopus 로고
    • C. Bidan, V. Issarny, Security benefits from software architecture, in: Proceedings of the 2nd International Conference on Coordination Languages and Models, 1997, pp. 64-80
  • 9
    • 0035790756 scopus 로고    scopus 로고
    • Reusable component interconnection patterns for distributed software architectures
    • May 2001, ACM Press, Toronto, Canada
    • Gomaa H., Menasce D., and Shin E. Reusable component interconnection patterns for distributed software architectures. Proceedings ACM Symposium on Software Reusability. May 2001 (2001), ACM Press, Toronto, Canada 69-77
    • (2001) Proceedings ACM Symposium on Software Reusability , pp. 69-77
    • Gomaa, H.1    Menasce, D.2    Shin, E.3
  • 10
    • 85178869583 scopus 로고    scopus 로고
    • H. Gomaa, M.E. Shin, Multiple-view meta-modeling of software product lines, in: The 8th IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 2002, December 2002, Maryland
  • 11
    • 85178867631 scopus 로고    scopus 로고
    • H. Gomaa, M.E. Shin, Modeling complex systems by separating application and security concerns, in: The 9th IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 2004, April 2004, Italy
  • 12
    • 33947586630 scopus 로고    scopus 로고
    • J. Jürjens, UMLsec: Extending UML for secure systems development, UML 2002, September 30-October 4, 2002, Dresden
  • 14
    • 33947597316 scopus 로고    scopus 로고
    • T. Lodderstedt, D. Basin, J. Doser, SecureUML: A UML-based modeling language for model-driven security, in: The 5th International Conference on the Unified Modeling Language, September 30-October 4, Dresden, Germany, 2002
  • 15
    • 85045573601 scopus 로고    scopus 로고
    • J. McDermott, C. Fox, Using abuse case models for security requirements analysis, in: Proc. of the 15th Annual Computer Security Application Conference, 1999, pp. 55-66
  • 16
    • 33947599369 scopus 로고    scopus 로고
    • J.D. Moffett, C.B. Haley, B. Nuseibeh, Core Security Requirements Artefacts, Technical Report, The Open University, UK, 2004
  • 17
    • 34247119309 scopus 로고    scopus 로고
    • R. Pettit, H. Gomaa, Modeling behavioral design patterns of concurrent objects, in: Proc. International Conference on Software Engineering, May 2006, Shanghai, China
  • 19
    • 84977598117 scopus 로고    scopus 로고
    • Towards an architectural treatment of software security: A connector-centric approach
    • Software Engineering for Secure Systems. SESS05
    • Ren J., Taylor R., Dourish P., and Redmiles D. Towards an architectural treatment of software security: A connector-centric approach. Software Engineering for Secure Systems. SESS05. ACM SIGSOFT Software Engineering Notes 30 4 (2005)
    • (2005) ACM SIGSOFT Software Engineering Notes , vol.30 , Issue.4
    • Ren, J.1    Taylor, R.2    Dourish, P.3    Redmiles, D.4
  • 20
    • 33947580030 scopus 로고    scopus 로고
    • Rose Real Time, http://www-306.ibm.com/software/awdtools/developer/rose/, IBM, 2005
  • 24
    • 33947608815 scopus 로고    scopus 로고
    • M.E. Shin, Evolution in multiple-view models in software product families, Ph.D. Dissertation, George Mason University, Fairfax, VA, 2002
  • 26
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre G., and Opdahl A.L. Eliciting security requirements with misuse cases. Requirements Engineering 10 1 (2005) 34-44
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 28
    • 33947596512 scopus 로고    scopus 로고
    • T. Srivatanakul, J.A. Clark, F. Polack, Writing effective security abuse cases, Technical Report YCS-2004-375, University of York, 2004


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.