메뉴 건너뛰기




Volumn 2, Issue , 2006, Pages 79-82

An aspect-oriented approach to security requirements analysis

Author keywords

Aspect oriented software development; Mitigation; Security requirements; Threats; Use case

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER CRIME; COMPUTER SOFTWARE; COMPUTER SYSTEM FIREWALLS;

EID: 34247501334     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMPSAC.2006.109     Document Type: Conference Paper
Times cited : (11)

References (13)
  • 1
    • 0037240812 scopus 로고    scopus 로고
    • Misuse Cases: Use Cases with Hostile Intent
    • January/February
    • I. Alexander. "Misuse Cases: Use Cases with Hostile Intent". IEEE Software, 58-66 (January/February 2003).
    • (2003) IEEE Software , pp. 58-66
    • Alexander, I.1
  • 3
    • 34247543112 scopus 로고    scopus 로고
    • R. Crook, D. Iace, L. Liu, and B. Nuseibeh, B. Security Requirements Engineering: When Anti-Requirements Hit the Fan. In Proc. of RE'02, Germany, 2002.
    • R. Crook, D. Iace, L. Liu, and B. Nuseibeh, B. "Security Requirements Engineering: When Anti-Requirements Hit the Fan". In Proc. of RE'02, Germany, 2002.
  • 4
    • 3042686396 scopus 로고    scopus 로고
    • Security Use Cases
    • May-June
    • D. Firesmith. "Security Use Cases". Journal of Object Technology, Vol. 2, No. 3, 53-64. (May-June 2003).
    • (2003) Journal of Object Technology , vol.2 , Issue.3 , pp. 53-64
    • Firesmith, D.1
  • 5
    • 34247547528 scopus 로고    scopus 로고
    • Aspect-Oriented Security Requirements Analysis
    • Masters Thesis, Department of Computer Science, North Dakota State University, Dec
    • V. Goel. "Aspect-Oriented Security Requirements Analysis", Masters Thesis, Department of Computer Science, North Dakota State University, Dec. 2005.
    • (2005)
    • Goel, V.1
  • 6
    • 5744229775 scopus 로고    scopus 로고
    • C. B. Haley, R.C. Laney, and B. Nuseibeh, B. Deriving Security Requirements from Crosscutting Threat Descriptions. In Proc. AOSD'04, pp 112-121, 2004.
    • C. B. Haley, R.C. Laney, and B. Nuseibeh, B. "Deriving Security Requirements from Crosscutting Threat Descriptions." In Proc. AOSD'04, pp 112-121, 2004.
  • 11
    • 0034497420 scopus 로고    scopus 로고
    • Eliciting Security Requirements by Misuse Cases
    • G. Sindre and A. L. Opdahl. "Eliciting Security Requirements by Misuse Cases". In Proc. of TOOLS Pacific 2000, pp. 120-131, 2000.
    • (2000) Proc. of TOOLS Pacific 2000 , pp. 120-131
    • Sindre, G.1    Opdahl, A.L.2
  • 13
    • 4544255381 scopus 로고    scopus 로고
    • Elaborating Security Requirements by Construction of Intentional Anti-models
    • A. Van Lamsweerde. "Elaborating Security Requirements by Construction of Intentional Anti-models". In Proc. of ICSE'04, pp.148-157, 2004.
    • (2004) Proc. of ICSE'04 , pp. 148-157
    • Van Lamsweerde, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.