메뉴 건너뛰기




Volumn , Issue , 2006, Pages 257-264

Web engineering security: A practitioner's perspective

Author keywords

Development process; Security; Software engineering; Survey; Web engineering

Indexed keywords

DATA REDUCTION; SOCIETIES AND INSTITUTIONS; SOFTWARE ENGINEERING; SURVEYS; WEB SERVICES;

EID: 34250651288     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1145581.1145633     Document Type: Conference Paper
Times cited : (9)

References (26)
  • 1
    • 33847027959 scopus 로고    scopus 로고
    • The Bugs Stop Here
    • Berinato, S., The Bugs Stop Here, in CIO. 2003
    • (2003) CIO
    • Berinato, S.1
  • 2
    • 34250639317 scopus 로고    scopus 로고
    • The Global State of Information Security
    • Berinato, S., Global Security, The Global State of Information Security 2005. 13/10/2005. http://www.cio.com/archive/091505/global.html
    • (2005) Global Security , pp. 13-10
    • Berinato, S.1
  • 3
    • 34250635802 scopus 로고    scopus 로고
    • Global Security Survey. 2005
    • London, p
    • Deloitte, 2005 Global Security Survey. 2005, Deloitte Touché Tohmatsu: London, p. 1-44.
    • (2005) Deloitte Touché Tohmatsu , pp. 1-44
    • Deloitte1
  • 6
    • 34250643869 scopus 로고    scopus 로고
    • Exler, R., Security and the Application Development Process. 22/01/2006. http://www.csoonline.com/analyst/report3068.html
    • Exler, R., Security and the Application Development Process. 22/01/2006. http://www.csoonline.com/analyst/report3068.html
  • 8
    • 33847079274 scopus 로고    scopus 로고
    • Web Development Evolution: The Assimilation of Web Engineering Security
    • Buenos Aires, Argentina: IEEE CS Press
    • Glisson, W. B. and Weiland, R. Web Development Evolution: The Assimilation of Web Engineering Security. in 3rd Latin American Web Congress. 2005. Buenos Aires - Argentina: IEEE CS Press.
    • (2005) 3rd Latin American Web Congress
    • Glisson, W.B.1    Weiland, R.2
  • 12
    • 24344440328 scopus 로고    scopus 로고
    • CSI/FBIComputer Crime Survey
    • Computer Security Institute, p
    • Gordon, L. A., Loeb, M. P., Lucyshyn, W. and Richardson, R., 2005 CSI/FBIComputer Crime Survey, in Tenth Annual. 2005, Computer Security Institute, p. 1-25.
    • (2005) Tenth Annual , pp. 1-25
    • Gordon, L.A.1    Loeb, M.P.2    Lucyshyn, W.3    Richardson, R.4
  • 14
    • 34250686519 scopus 로고    scopus 로고
    • Policy Development
    • Tipton, H.F. and Krause, M, eds, Auerbach Publications: Boca Raton, p
    • Hare, C., Policy Development, in Information Security Managment Handbook, Tipton, H.F. and Krause, M., (eds). 2004. Auerbach Publications: Boca Raton, p. 925-943.
    • (2004) Information Security Managment Handbook , pp. 925-943
    • Hare, C.1
  • 15
    • 34250675982 scopus 로고    scopus 로고
    • A Matter of Trust
    • Krause, H.F.T.a.M, ed, Auerbach Publications: Boca Raton
    • Kaplan, R., A Matter of Trust, in Information Security Managment Handbook, Krause, H.F.T.a.M., (ed). 2004, Auerbach Publications: Boca Raton.
    • (2004) Information Security Managment Handbook
    • Kaplan, R.1
  • 17
    • 33847326664 scopus 로고    scopus 로고
    • Ph.D. Thesis, in Department of Computing Science, University of Glasgow: Glasgow
    • Mcdonald, A., The Agile Web Engineering (AWE) Process, Ph.D. Thesis, in Department of Computing Science. 2004, University of Glasgow: Glasgow.
    • (2004) The Agile Web Engineering (AWE) Process
    • Mcdonald, A.1
  • 18
    • 34250689422 scopus 로고    scopus 로고
    • Agile Web Engineering (A WE) Process: Perceptions within a Fortune 500 Financial Services Company
    • McDonald, A. and Weiland, R., Agile Web Engineering (A WE) Process: Perceptions within a Fortune 500 Financial Services Company. Journal of Web Engineering, 2005. 4(4): p. 283-312.
    • (2005) Journal of Web Engineering , vol.4 , Issue.4 , pp. 283-312
    • McDonald, A.1    Weiland, R.2
  • 20
    • 34250657676 scopus 로고    scopus 로고
    • Mimoso, M. S., Top Web application security problems identified SearchSecurity.com. April 12, 2005. http://searchsecurity.techtarget.com/ originalContent/0,289142,sid14-_gci873823,00.html?NewsEL=9.25
    • Mimoso, M. S., Top Web application security problems identified SearchSecurity.com. April 12, 2005. http://searchsecurity.techtarget.com/ originalContent/0,289142,sid14-_gci873823,00.html?NewsEL=9.25
  • 22
    • 33847063460 scopus 로고    scopus 로고
    • Organization for Internet Safety
    • Organization for Internet Safety, Guidelines for Security Vulnerability Reporting and Response. http://www.oisafety.org/guidelines/ Guidelines%20for%20Security%20Vulnerability%20Reporting%20and%20Response%20V2.0. pdf
    • Guidelines for Security Vulnerability Reporting and Response
  • 24
    • 2542492057 scopus 로고    scopus 로고
    • Systems Security Engineering Capability Maturity Model (SSE-CMM) Project, Carnegie Mellon University: Pennsylvania, p
    • Systems Security Engineering Capability Maturity Model (SSE-CMM) Project, Systems Security Engineering -Capability Maturity Model (SSE-CMM) Model Description Document. 2003, Carnegie Mellon University: Pennsylvania, p. 1-340.
    • (2003) Systems Security Engineering -Capability Maturity Model (SSE-CMM) Model Description Document , pp. 1-340
  • 25
    • 20844451793 scopus 로고    scopus 로고
    • Adopting a software security improvement program
    • Taylor, D. and McGraw, G., Adopting a software security improvement program, in IEEE Security & Privacy. 2005. p. 88-91.
    • (2005) IEEE Security & Privacy , pp. 88-91
    • Taylor, D.1    McGraw, G.2
  • 26
    • 0032074438 scopus 로고    scopus 로고
    • Experimental Models for Validating Technology
    • Zelkowitz, M. V. and Wallace, D. R., Experimental Models for Validating Technology. IEEE Computer, 1998. 31(5): p. 23-31.
    • (1998) IEEE Computer , vol.31 , Issue.5 , pp. 23-31
    • Zelkowitz, M.V.1    Wallace, D.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.