메뉴 건너뛰기




Volumn 32, Issue 8, 2007, Pages 1166-1183

Security Attack Testing (SAT)-testing the security of information systems at design time

Author keywords

Information system security testing; Information systems development methodology; Integrating security and software engineering; Scenarios

Indexed keywords

FORMAL LANGUAGES; HEALTH CARE; SECURITY OF DATA; SOCIAL ASPECTS; SOFTWARE ENGINEERING;

EID: 34548508691     PISSN: 03064379     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.is.2007.03.002     Document Type: Article
Times cited : (48)

References (37)
  • 3
    • 84970947585 scopus 로고    scopus 로고
    • P. Devanbu, S. Stubblebine, Software engineering for security: a roadmap, in: Proceedings of the Conference of the Future of Software Engineering, 2000.
  • 4
    • 34548485203 scopus 로고    scopus 로고
    • A. Michailova, M. Doche, M. Butler, Constraints for scenario-based testing of object-oriented programs, Technical Report, Electronics and Computer Science Department, University of Southampton, 2002.
  • 5
    • 4544255381 scopus 로고    scopus 로고
    • A. Van Lamsweerde, Elaborating security requirements by construction of intentional anti-models, in: Proceedings of the International Conference on Software Engineering, 2004, pp. 148-157.
  • 7
    • 85045573601 scopus 로고    scopus 로고
    • J. McDermott, C. Fox, Using abuse care models for security requirements analysis, in: Proceedings of the 15th Annual Computer Security Applications Conference, December 1999.
  • 8
    • 34548486149 scopus 로고    scopus 로고
    • M. Schumacher, U. Roedig, Security engineering with patterns, in: the Proceedings of the 8th Conference on Pattern Languages for Programs (PLoP 2001), Illinois, USA, September 2001.
  • 9
    • 17744389340 scopus 로고    scopus 로고
    • A requirements taxonomy for reducing web site privacy vulnerabilities
    • Anton A.I., and Earp J.B. A requirements taxonomy for reducing web site privacy vulnerabilities. Requirements Eng. 9 3 (2004) 169-185
    • (2004) Requirements Eng. , vol.9 , Issue.3 , pp. 169-185
    • Anton, A.I.1    Earp, J.B.2
  • 11
    • 34548492657 scopus 로고    scopus 로고
    • L. Liu, E. Yu, J. Mylopoulos, Analysing security requirements as relationships among strategic actors, in: Proceedings of the 2nd Symposium on Requirements Engineering for Information Security (SREIS'02), Raleigh-North Carolina, 2002.
  • 12
    • 8344270973 scopus 로고    scopus 로고
    • H. Mouratidis, P. Giorgini, G. Manson, An ontology for modelling security: The tropos approach, knowledge-based intelligent information and engineering systems, Lecture Notes in Artificial Intelligence, vol. 2773, 2003.
  • 14
    • 35048845022 scopus 로고    scopus 로고
    • H. Mouratidis, P. Giorgini, G. Manson, Integrating security and systems engineering: towards the modelling of secure information systems, in: Proceedings of the 15th International Conference on Advanced Information Systems (CaiSE), 2003.
  • 15
    • 23944475544 scopus 로고    scopus 로고
    • When Security Meets Software Engineering: A Case of Modelling Secure Information Systems
    • Mouratidis H., Giorgini P., and Manson G. When Security Meets Software Engineering: A Case of Modelling Secure Information Systems. Inf. Syst. 30 8 (2005) 609-629
    • (2005) Inf. Syst. , vol.30 , Issue.8 , pp. 609-629
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.3
  • 16
    • 33745804721 scopus 로고    scopus 로고
    • Modelling secure systems using an agent oriented approach and security patterns
    • Mouratidis H., Weiss G., and Giorgini P. Modelling secure systems using an agent oriented approach and security patterns. Int. J. Software Eng. Knowledge Eng. 16 3 (2006) 471
    • (2006) Int. J. Software Eng. Knowledge Eng. , vol.16 , Issue.3 , pp. 471
    • Mouratidis, H.1    Weiss, G.2    Giorgini, P.3
  • 18
    • 34548481442 scopus 로고    scopus 로고
    • M.R. Blackburn, R.D. Busser, A.M. Nauman, R. Chandramouli, Model-Based Approach to Security Test Automation, in: Proceedings of Quality Week, 2001
  • 19
    • 84990316932 scopus 로고    scopus 로고
    • A novel agent-based system to support the single assessment process of older people
    • Mouratidis H., Philp I., and Manson G. A novel agent-based system to support the single assessment process of older people. J. Health Inf. 9 3 (2003) 149-162
    • (2003) J. Health Inf. , vol.9 , Issue.3 , pp. 149-162
    • Mouratidis, H.1    Philp, I.2    Manson, G.3
  • 20
    • 34548471884 scopus 로고    scopus 로고
    • Multiagent Systems and Security Requirements Analysis, in Advances in Software Engineering for Multiagent Systems
    • Lucena C., Garcia A., Romanovsky A., Castro J., and Alencar P. (Eds), Springer, Berlin
    • Brescianni P., Giorgini P., Mouratidis H., and Manson G. Multiagent Systems and Security Requirements Analysis, in Advances in Software Engineering for Multiagent Systems. In: Lucena C., Garcia A., Romanovsky A., Castro J., and Alencar P. (Eds). Lecture Notes in Artificial Intelligence vol. 2940 (2003), Springer, Berlin
    • (2003) Lecture Notes in Artificial Intelligence , vol.2940
    • Brescianni, P.1    Giorgini, P.2    Mouratidis, H.3    Manson, G.4
  • 22
    • 34548513190 scopus 로고    scopus 로고
    • H. Mouratidis, A security oriented approach in the development of multiagent Systems: applied to the management of the health and social care needs of older people in England, Ph.D. thesis, University of Sheffield, 2004.
  • 23
    • 34548488123 scopus 로고    scopus 로고
    • J. Ryser, M. Glinz, SCENT-a method employing scenarios to systematically derive test cases for system test, Technical Report 2000.03, Institut für Informatik, University of Zurich, 2000.
  • 24
    • 0028401161 scopus 로고
    • Inquiry based requirements analysis
    • Potts C., Takahashi K., and Anton A.I. Inquiry based requirements analysis. IEEE Software 11 2 (1994) 21-32
    • (1994) IEEE Software , vol.11 , Issue.2 , pp. 21-32
    • Potts, C.1    Takahashi, K.2    Anton, A.I.3
  • 25
    • 34548502852 scopus 로고    scopus 로고
    • A.I. Anton, W.M. McCracken, C. Potts, Goal Decomposition and Scenario Analysis in Business Process Reengineering, in: Proceedings of the 6th Conference on Advanced Information Systems (CAiSE-1994), Utrecht-The Netherlands, 1994.
  • 26
    • 34548484023 scopus 로고    scopus 로고
    • J.M. Carroll, M.B. Rosson, Getting around the task-artifact cycle: how to make claims and design by scenario, IBM Research Report, Human Computer Interaction, RC 17908 (75365), 1991.
  • 31
    • 5344270031 scopus 로고    scopus 로고
    • Cleanroom software development: an empirical Evaluation
    • Selby R.W., Basili V.R., and Baker F.T. Cleanroom software development: an empirical Evaluation. IEEE Trans. Software Eng. 13 9 (1997) 1027-1037
    • (1997) IEEE Trans. Software Eng. , vol.13 , Issue.9 , pp. 1027-1037
    • Selby, R.W.1    Basili, V.R.2    Baker, F.T.3
  • 33
    • 34548475452 scopus 로고    scopus 로고
    • IEEE Standard Glossary of Software Engineering Terminology, IEEE Std 729, 1990.
  • 35
    • 0031507415 scopus 로고    scopus 로고
    • Software requirements and acceptance testing
    • Hsia P., Kung D., and Sell C. Software requirements and acceptance testing. Ann. Software Eng. 3 (1997) 291-317
    • (1997) Ann. Software Eng. , vol.3 , pp. 291-317
    • Hsia, P.1    Kung, D.2    Sell, C.3
  • 36
    • 84863719914 scopus 로고    scopus 로고
    • W.T. Tsai, A. Saimi, L. Yu, R. Paul, Scenario-based object oriented testing framework, in: Proceedings of the 3rd International Conference on Quality Software, 2002, p. 410.
  • 37
    • 84950270969 scopus 로고    scopus 로고
    • J. Wittevrongel, F. Maurer, SCENTOR: scenario-based testing of e-business applications, in: Proceedings of the 10th IEEE International Workshop on Enabling Technology: Infrastructure for Collaborative Enterprises, 2001, USA, p. 41.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.