메뉴 건너뛰기




Volumn , Issue , 2006, Pages 305-312

Agile development of secure web applications

Author keywords

Feature driven development; Security risk assessment; Web applications

Indexed keywords

INFORMATION SYSTEMS; REQUIREMENTS ENGINEERING; RISK ASSESSMENT; SECURITY OF DATA; SOFTWARE DESIGN;

EID: 34250689142     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1145581.1145641     Document Type: Conference Paper
Times cited : (38)

References (21)
  • 2
    • 34250637809 scopus 로고    scopus 로고
    • SSADM-CRAMM subject guide for SSADM version 3 and GRAMM version 2. Technical report, Central Computer and Telecommunications Agency, IT Security and Privacy Group., 1991.
    • SSADM-CRAMM subject guide for SSADM version 3 and GRAMM version 2. Technical report, Central Computer and Telecommunications Agency, IT Security and Privacy Group., 1991.
  • 3
    • 34250635370 scopus 로고    scopus 로고
    • CRAMM. Technical Report, Insight Consulting Limited
    • CRAMM. Technical Report http://www.cramm.com, Insight Consulting Limited, 2003.
    • (2003)
  • 4
    • 33746243592 scopus 로고    scopus 로고
    • Extreme programming and refactoring for building secure web-based applications and web services
    • Thesis, Computer Science Department, University of York
    • E. Aydal. Extreme programming and refactoring for building secure web-based applications and web services. MSc in Software Engineering Thesis, Computer Science Department, University of York, 2005.
    • (2005) MSc in Software Engineering
    • Aydal, E.1
  • 6
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • R. Baskerville. Information systems security design methods: Implications for information systems development. ACM Computing Surveys, 25(4):375-414, 1993.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 7
    • 34250664916 scopus 로고    scopus 로고
    • K. Beznosov. extreme Security Engineering. In Proceeding of First ACM BizSec Workshop, Fairfax VA, USA, October 2003.
    • K. Beznosov. extreme Security Engineering. In Proceeding of First ACM BizSec Workshop, Fairfax VA, USA, October 2003.
  • 8
    • 84945122170 scopus 로고    scopus 로고
    • Operationally critical threat, asset, and vulnerability evaluation (OCTAVE)
    • CERT Coordination Centre, Technical Report, Software Engineering Institute, CERT Coordination Centre
    • CERT Coordination Centre. Operationally critical threat, asset, and vulnerability evaluation (OCTAVE). Technical Report http://www.cert.org/octave/, Software Engineering Institute, CERT Coordination Centre, 2003.
    • (2003)
  • 9
    • 34250647985 scopus 로고
    • Security and systems engineering
    • Technical Report YCS378, Department of Computer Science, University of York, June
    • H. Chivers. Security and systems engineering. Technical Report YCS378, Department of Computer Science, University of York, June 1994.
    • (1994)
    • Chivers, H.1
  • 10
    • 26444465547 scopus 로고    scopus 로고
    • H. Chivers, R. Paige, and X. Ge. Agile security using an incremental security architecture. In Proceeding of the Sixth International Conference on eXtreme Programming and Agile Processes in Software Engineering (XP2005), Spring-Verlag LNCS 3556, pages 57-65, Sheffield, UK, 2005.
    • H. Chivers, R. Paige, and X. Ge. Agile security using an incremental security architecture. In Proceeding of the Sixth International Conference on eXtreme Programming and Agile Processes in Software Engineering (XP2005), Spring-Verlag LNCS 3556, pages 57-65, Sheffield, UK, 2005.
  • 11
    • 0027282863 scopus 로고
    • HDM model-based approach to hypertext application design
    • F. Garzotto, P. Paolini, and D. Schwabe. HDM model-based approach to hypertext application design. ACM Trans. Inf. Syst., 11(1): 1-26, 1993.
    • (1993) ACM Trans. Inf. Syst , vol.11 , Issue.1 , pp. 1-26
    • Garzotto, F.1    Paolini, P.2    Schwabe, D.3
  • 13
    • 34250657925 scopus 로고    scopus 로고
    • T. Grance, J. Hash, and M. Stevens. Security considerations in the information system development life cycle. Technical report, National Institute of Standards and Technology (NIST), Special Publication 800-64, October 2003. (revision 1 released June 2004).
    • T. Grance, J. Hash, and M. Stevens. Security considerations in the information system development life cycle. Technical report, National Institute of Standards and Technology (NIST), Special Publication 800-64, October 2003. (revision 1 released June 2004).
  • 14
    • 34250654798 scopus 로고    scopus 로고
    • B. S. Institution. Information security mangement part 2: Specification for information security management systems. Technical report, BS 7799-2:1999, 1999.
    • B. S. Institution. Information security mangement part 2: Specification for information security management systems. Technical report, BS 7799-2:1999, 1999.
  • 17
    • 33847326664 scopus 로고    scopus 로고
    • Agile web engineering (AWE) process
    • Technical report, Department of Computer Science, University of Glasgow, UK, December
    • A. McDonald and R. Welland. Agile web engineering (AWE) process. Technical report, Department of Computer Science, University of Glasgow, UK, December 2001.
    • (2001)
    • McDonald, A.1    Welland, R.2
  • 21
    • 1842829828 scopus 로고    scopus 로고
    • Risk management guide for information technology systems. Technical report, National Institute of Standards and Technology (NIST)
    • July
    • G. Stoneburner, A. Goguen, and A. Feringa. Risk management guide for information technology systems. Technical report, National Institute of Standards and Technology (NIST), Special Publication 800-30, July 2002.
    • (2002) Special Publication , vol.800 -30
    • Stoneburner, G.1    Goguen, A.2    Feringa, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.