메뉴 건너뛰기




Volumn 12, Issue 2, 2007, Pages 165-189

Certification process artifacts defined as measurable units for software assurance

Author keywords

Certification and accreditation; Metrics and measures; Ontological engineering; Requirements engineering; Risk assessment; Software intensive systems

Indexed keywords

COMPUTER SOFTWARE; LIFE CYCLE; ONTOLOGY; QUALITY ASSURANCE; REQUIREMENTS ENGINEERING; RISK ASSESSMENT;

EID: 34247487097     PISSN: 10774866     EISSN: 10991670     Source Type: Journal    
DOI: 10.1002/spip.313     Document Type: Article
Times cited : (14)

References (43)
  • 2
    • 34247509714 scopus 로고    scopus 로고
    • SM Criteria, Version 2.0. CMU/SEI-2001-TR-016 ESC-TR-2001-016
    • SM Criteria, Version 2.0. CMU/SEI-2001-TR-016 ESC-TR-2001-016.
  • 3
    • 0024031604 scopus 로고
    • The TAME project: Towards improvement-oriented software environments
    • Basili VR, Rombach HD. 1988. The TAME project: towards improvement-oriented software environments. IEEE Transactions on Software Engineering 14(6): 758-773.
    • (1988) IEEE Transactions on Software Engineering , vol.14 , Issue.6 , pp. 758-773
    • Basili, V.R.1    Rombach, H.D.2
  • 4
    • 34247515552 scopus 로고    scopus 로고
    • BS 7799.1999. Information Security Management.
    • BS 7799.1999. Information Security Management.
  • 5
    • 34247510151 scopus 로고    scopus 로고
    • Carr MJ, Konda SL, Monarch I, Ulrich FC, Walker CF. 1993. Taxonomy-based risk identification. Technical Report CMU/SEI-93-TR-6 ESC-TR-93-183. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.
    • Carr MJ, Konda SL, Monarch I, Ulrich FC, Walker CF. 1993. Taxonomy-based risk identification. Technical Report CMU/SEI-93-TR-6 ESC-TR-93-183. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.
  • 8
    • 34247540391 scopus 로고    scopus 로고
    • Common Criteria. 1999. Common Criteria for Information Technology Security Evaluation. Parts 1, 2 & 3. Version 2.1. ISO/IEC 15408-1:1999E
    • Common Criteria. 1999. Common Criteria for Information Technology Security Evaluation. Parts 1, 2 & 3. Version 2.1. ISO/IEC 15408-1:1999(E).
  • 10
    • 34247488775 scopus 로고    scopus 로고
    • DoD 8510.1-M. 2000. Department of Defense Information Technology Security Certification and Accreditation (DITSCAP) Application Manual.
    • DoD 8510.1-M. 2000. Department of Defense Information Technology Security Certification and Accreditation (DITSCAP) Application Manual.
  • 11
    • 34247468428 scopus 로고    scopus 로고
    • DoDI 5200.40. 1997. Department of Defense Information Technology Security Certification and Accreditation (DITSCAP).
    • DoDI 5200.40. 1997. Department of Defense Information Technology Security Certification and Accreditation (DITSCAP).
  • 14
    • 0003752445 scopus 로고
    • Information Technology - Software Life Cycle Processes
    • ISO/IEC 12207
    • ISO/IEC 12207. 1995. Information Technology - Software Life Cycle Processes.
    • (1995)
  • 15
    • 11844271802 scopus 로고    scopus 로고
    • Guidelines for the management of IT security. Technical Report BS ISO/IEC TR 13335-1:1996, ISBN
    • ISO/IEC 13335, 0580303918
    • ISO/IEC 13335. 1996. Guidelines for the management of IT security. Technical Report BS ISO/IEC TR 13335-1:1996, ISBN: 0580303918.
    • (1996)
  • 16
    • 34247485845 scopus 로고    scopus 로고
    • ISO/IEC 15504. 1998. Software Process Assessment (SPICE). Technical Report, http://www.isospice.type-pad.com/isospice_s15504/.
    • ISO/IEC 15504. 1998. Software Process Assessment (SPICE). Technical Report, http://www.isospice.type-pad.com/isospice_s15504/.
  • 17
    • 1842668349 scopus 로고    scopus 로고
    • Life Cycle Management - System Life Cycle Processes
    • ISO/IEC 15288 CD2
    • ISO/IEC 15288 CD2.2000. Life Cycle Management - System Life Cycle Processes.
    • (2000)
  • 18
    • 34247537508 scopus 로고    scopus 로고
    • Information Technology - Security Techniques - A Framework for IT Security Assurance
    • ISO/IEC 15443
    • ISO/IEC 15443. 2001. Information Technology - Security Techniques - A Framework for IT Security Assurance.
    • (2001)
  • 20
    • 0031483502 scopus 로고    scopus 로고
    • The meaning of requirements
    • Baltzer Science Publishers
    • Jackson M. 1997. The meaning of requirements. Annals of Software Engineering, Vol. 3. Baltzer Science Publishers: 5-21.
    • (1997) Annals of Software Engineering , vol.3 , pp. 5-21
    • Jackson, M.1
  • 21
    • 0033328454 scopus 로고    scopus 로고
    • On integrating assessment and measurement: Towards continuous assessment of software engineering processes
    • IEEE Computer Society: Boca Raton, Florida, USA, Nov 4-6, 22
    • Järvinen J, Hamann D, Van Solingen R. 1999. On integrating assessment and measurement: towards continuous assessment of software engineering processes. In Proceedings of the 6th International Symposium on Software Metrics METRICS. IEEE Computer Society: Boca Raton, Florida, USA, Nov 4-6, 22.
    • (1999) Proceedings of the 6th International Symposium on Software Metrics METRICS
    • Järvinen, J.1    Hamann, D.2    Van Solingen, R.3
  • 24
    • 33846560895 scopus 로고    scopus 로고
    • Life cycle security and DITSCAP
    • Kimbell J, WalrathM. 2001. Life cycle security and DITSCAP. IANewsletter. 4(2): 16-26. http://iac.dtic.mil/iatac.
    • (2001) IANewsletter , vol.4 , Issue.2 , pp. 16-26
    • Kimbell, J.1    WalrathM2
  • 31
    • 34247543888 scopus 로고    scopus 로고
    • th IEEE International Conference on Software Engineering (ICSE '05), Workshop on Software Engineering for Secure Systems (SESS)., 30(4). Also appeared in ACM SIGSOFT Software Engineering Notes, ACM Press: St. Louis, MO, 43-49.
    • th IEEE International Conference on Software Engineering (ICSE '05), Workshop on Software Engineering for Secure Systems (SESS)., Vol. 30(4). Also appeared in ACM SIGSOFT Software Engineering Notes, ACM Press: St. Louis, MO, 43-49.
  • 33
    • 34247502770 scopus 로고    scopus 로고
    • GenOM User's Guide V2.0
    • Technical Report TR-NiSE-05-05, Knowledge Intensive Software Engineering Research Group, Department of Software and Information Systems, UNC, Charlotte
    • Lee SW, Yavagal D. 2005. GenOM User's Guide V2.0. Technical Report TR-NiSE-05-05, Knowledge Intensive Software Engineering Research Group, Department of Software and Information Systems, UNC, Charlotte.
    • (2005)
    • Lee, S.W.1    Yavagal, D.2
  • 34
    • 24344470236 scopus 로고    scopus 로고
    • Handling and reporting security advisories: A scorecard approach
    • Lekkas D, Spinellis D. 2005. Handling and reporting security advisories: a scorecard approach. IEEE Security and Privacy 3(4): 32-41.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.4 , pp. 32-41
    • Lekkas, D.1    Spinellis, D.2
  • 35
    • 1842550305 scopus 로고    scopus 로고
    • McGuinness D, van Harmelen F eds, Recommendation
    • McGuinness D, van Harmelen F (eds). 2004. OWL Web Ontology Language Overview. W3C Recommendation: http://www.w3.org/TR/owl-features/.
    • (2004) OWL Web Ontology Language Overview
  • 36
    • 4444369345 scopus 로고    scopus 로고
    • Domain understanding is key to successful to system development
    • Springer-Verlag: London, UK
    • Offen R. 2002. Domain understanding is key to successful to system development. Requirements Engineering Journal, Vol. 7(3). Springer-Verlag: London, UK, 172-175.
    • (2002) Requirements Engineering Journal , vol.7 , Issue.3 , pp. 172-175
    • Offen, R.1
  • 38
    • 34247525528 scopus 로고    scopus 로고
    • SSE-CMM. 2003. System Security Engineering Capability Maturity Model (SSE CMM) Model Description Document, Version 3.0
    • SSE-CMM. 2003. System Security Engineering Capability Maturity Model (SSE CMM) Model Description Document, Version 3.0. http://www.sse-cmm.org.
  • 39
    • 0003618149 scopus 로고    scopus 로고
    • Scenario-based requirements analysis
    • Springer-Verlag: New York, USA
    • Sutcliffe A. 1998. Scenario-based requirements analysis. Requirements Engineering Journal, Vol. 3(1). Springer-Verlag: New York, USA, 48-65.
    • (1998) Requirements Engineering Journal , vol.3 , Issue.1 , pp. 48-65
    • Sutcliffe, A.1
  • 43
    • 34247489732 scopus 로고    scopus 로고
    • Web C&A™ Reference Manual
    • Version 4.0
    • Xacta. 2004. Web C&A™ Reference Manual, Version 4.0. Service Pack 2. http://www.xacta.com/.
    • (2004) Service Pack , vol.2
    • Xacta1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.