메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 160-167

Representing security goals, policies, and objects

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; INFORMATION SYSTEMS; MATHEMATICAL MODELS; UNIFIED MODELING LANGUAGE;

EID: 33947623138     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIS-COMSAR.2006.73     Document Type: Conference Paper
Times cited : (4)

References (23)
  • 3
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Jan
    • G. Sindre and A. L. Opdahl, "Eliciting security requirements with misuse cases," Requirements Engineering Journal, vol. 10, no. 1, Jan 2005.
    • (2005) Requirements Engineering Journal , vol.10 , Issue.1
    • Sindre, G.1    Opdahl, A.L.2
  • 5
    • 2942757657 scopus 로고    scopus 로고
    • Engineering security requirements
    • Jan-Feb
    • D. G. Firesmith, "Engineering security requirements," Journal of Object Technology, vol. 2, no. 1, pp. 53-58, Jan-Feb 2003.
    • (2003) Journal of Object Technology , vol.2 , Issue.1 , pp. 53-58
    • Firesmith, D.G.1
  • 6
    • 33947648196 scopus 로고    scopus 로고
    • Online, Available
    • M. D. Quel, "The sans policy primer," 2001. [Online]. Available: http://www.sans.org/resources/policies/PolicyPrimer.pdf
    • (2001) The sans policy primer
    • Quel, M.D.1
  • 8
    • 79955143136 scopus 로고    scopus 로고
    • Secureuml: A uml-based modeling language for model-driven security
    • 2460, Springer-Verlag, pp
    • T. Lodderstedt, D. Basin, and J. Doser, "Secureuml: A uml-based modeling language for model-driven security," UML 2002, LNCS 2460, Springer-Verlag, pp. 426-441, 2002.
    • (2002) LNCS , vol.UML 2002 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 9
    • 79955163100 scopus 로고    scopus 로고
    • Umlsec: Extending uml for secure systems development
    • 2460, Springer-Verlag
    • J. Jrjens, "Umlsec: Extending uml for secure systems development," UML 2002, LNCS 2460, Springer-Verlag, 2002.
    • (2002) LNCS , vol.UML 2002
    • Jrjens, J.1
  • 11
    • 35048841167 scopus 로고    scopus 로고
    • Requirements engineering meets trust management: Model, methodology, and reasoning
    • Proceedings of iTrust'04
    • P. G. F. Massacci, J. Mylopoulos, and N. Zannone, "Requirements engineering meets trust management: Model, methodology, and reasoning." in Proceedings of iTrust'04, LNCS 2995, 2004, pp. 176-190.
    • (2004) LNCS , vol.2995 , pp. 176-190
    • Massacci, P.G.F.1    Mylopoulos, J.2    Zannone, N.3
  • 12
    • 84942866002 scopus 로고    scopus 로고
    • Security and privacy requirements analysis within a social setting
    • IEEE Press
    • L. Liu, E. Yu, and J. Mylopoulos, "Security and privacy requirements analysis within a social setting," in Proceedings of RE'03, IEEE Press, 2003, pp. 151-161.
    • (2003) Proceedings of RE'03 , pp. 151-161
    • Liu, L.1    Yu, E.2    Mylopoulos, J.3
  • 13
    • 27644537252 scopus 로고    scopus 로고
    • Modeling security requirements through ownership, permission and delegation
    • IEEE Press
    • P. G. F. Massacci, J. Mylopoulos, and N. Zannone, "Modeling security requirements through ownership, permission and delegation," in Proceedings of RE'05, IEEE Press, 2005.
    • (2005) Proceedings of RE'05
    • Massacci, P.G.F.1    Mylopoulos, J.2    Zannone, N.3
  • 14
    • 27644540336 scopus 로고    scopus 로고
    • On modeling access policies: Relating roles to their organizational context
    • IEEE Press
    • R. Crook, D. Ince, and B. Nuseibeh, "On modeling access policies: Relating roles to their organizational context," in Proceedings of RE'05, IEEE Press, 2005.
    • (2005) Proceedings of RE'05
    • Crook, R.1    Ince, D.2    Nuseibeh, B.3
  • 18
    • 84944048132 scopus 로고    scopus 로고
    • The ponder policy specification language
    • Policy Workshop 2001, Bristol, U.K, Springer-Verlag, Jan
    • N. Damianou, N. Dulay, E. Lupu, and M. Sloman, "The ponder policy specification language," Policy Workshop 2001, Bristol, U.K., Springer-Verlag, LNCS, Jan. 2001.
    • (2001) LNCS
    • Damianou, N.1    Dulay, N.2    Lupu, E.3    Sloman, M.4
  • 20
    • 0034837933 scopus 로고    scopus 로고
    • Goal-oriented requirements engineering: A guided tour
    • Toronto: IEEE Press
    • A. van Lamsweerde, "Goal-oriented requirements engineering: A guided tour," in Proceedings of RE'01. Toronto: IEEE Press, 2001.
    • (2001) Proceedings of RE'01
    • van Lamsweerde, A.1
  • 21
    • 33745127388 scopus 로고    scopus 로고
    • Representing nfrs and frs: A goal-oriented and use case driven approach
    • Software Engineering Research and Applications SERA
    • L. Chung and S. Supakkul, "Representing nfrs and frs: A goal-oriented and use case driven approach," Software Engineering Research and Applications (SERA'2004)- LNCS, vol. 3647, pp. 29-41, 2005.
    • (2004) LNCS , vol.3647 , pp. 29-41
    • Chung, L.1    Supakkul, S.2
  • 23
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • J. H. Saltzer and M. D. Schroeder, "The protection of information in computer systems." in Proceedings of the IEEE, vol. 63(9), 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9
    • Saltzer, J.H.1    Schroeder, M.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.