메뉴 건너뛰기




Volumn 3225, Issue , 2004, Pages 416-427

Effective security requirements analysis: HAZOP and use cases

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 35048899397     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30144-8_35     Document Type: Article
Times cited : (38)

References (14)
  • 8
    • 35048845864 scopus 로고    scopus 로고
    • The JMCIS information flow improvement (JIFI) assurance strategy
    • Center for High Assurance Computer Systems Information Technology Division, Naval Research Lab., Washington, D.C., May
    • A.P. Moore. The JMCIS information flow improvement (JIFI) assurance strategy. Technical Report 500-190, Center for High Assurance Computer Systems Information Technology Division, Naval Research Lab., Washington, D.C., May 1997.
    • (1997) Technical Report 500-190
    • Moore, A.P.1
  • 11
    • 0004269078 scopus 로고
    • System and Reliablity Research Office of U.S. Nuclear Regulatory Commission, Washington, DC.
    • N.H. Roberts, W.E. Vesely, D.F. Haasl, and F.F. Goldberg. Fault Tree Handbook. System and Reliablity Research Office of U.S. Nuclear Regulatory Commission, Washington, DC., 1981.
    • (1981) Fault Tree Handbook
    • Roberts, N.H.1    Vesely, W.E.2    Haasl, D.F.3    Goldberg, F.F.4
  • 14
    • 0034497420 scopus 로고    scopus 로고
    • Eliciting security requirements by misuse cases
    • G. Sindre and A.L. Opdahl. Eliciting security requirements by misuse cases. In Proc. of TOOLS Pacific 2000, pages 120-131, 2000.
    • (2000) Proc. of TOOLS Pacific 2000 , pp. 120-131
    • Sindre, G.1    Opdahl, A.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.