메뉴 건너뛰기




Volumn Part F129303, Issue , 1998, Pages 5-16

A practical approach to security assessment

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; RISK ASSESSMENT; RISK PERCEPTION; SOFTWARE ENGINEERING; SPECIFICATIONS;

EID: 35048902231     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/283699.283731     Document Type: Conference Paper
Times cited : (9)

References (20)
  • 2
    • 0024012763 scopus 로고
    • A spiral model of software development
    • May
    • Boehm, B., "A Spiral Model of Software Development", IEEE Computer, May 1988, pp. 61-72.
    • (1988) IEEE Computer , pp. 61-72
    • Boehm, B.1
  • 3
    • 0029253405 scopus 로고
    • Specification and validation of a security policy model
    • Feb.
    • Boswell, A., "Specification and Validation of a Security Policy Model", IEEE Transactions on Software Engineering, Vol. 21, No. 2, Feb. 1995, pp. 63-68.
    • (1995) IEEE Transactions on Software Engineering , vol.21 , Issue.2 , pp. 63-68
    • Boswell, A.1
  • 6
    • 0018466858 scopus 로고
    • Social processes and proofs of theorems and programs
    • May
    • DeMillo, R., R. Lipton, and A. Perlis, Social Processes and Proofs of Theorems and Programs, Communications of the ACM, Vol. 22, No. 5, May 1979, pp. 271-280.
    • (1979) Communications of the ACM , vol.22 , Issue.5 , pp. 271-280
    • DeMillo, R.1    Lipton, R.2    Perlis, A.3
  • 7
    • 0024085326 scopus 로고
    • Program verification: The very idea
    • Sept.
    • Fetzer, J., "Program Verification: The Very Idea", Communications of the ACM, Vol. 31, No. 9, Sept. 1988.
    • (1988) Communications of the ACM , vol.31 , Issue.9
    • Fetzer, J.1
  • 8
    • 0028516418 scopus 로고
    • Strategies for incorporating formal specifications in software development
    • Oct.
    • Fraser, M., K. Kumar, and V. Vaishnavi, Strategies for Incorporating Formal Specifications in Software Development, Communications of the ACM, Vol. 37, No. 10, Oct. 1994, pp. 74-86.
    • (1994) Communications of the ACM , vol.37 , Issue.10 , pp. 74-86
    • Fraser, M.1    Kumar, K.2    Vaishnavi, V.3
  • 10
    • 0025489197 scopus 로고
    • Seven myths of formal methods
    • Sept.
    • Hall, A., "Seven Myths of Formal Methods", IEEE Software, Vol. 7, No. 5, Sept. 1990.
    • (1990) IEEE Software , vol.7 , Issue.5
    • Hall, A.1
  • 11
    • 0022012274 scopus 로고
    • Applying formal specification to software development in industry
    • Feb.
    • Hayes, I., "Applying Formal Specification to Software Development in Industry", IEEE Transactions on Software Engineering, Vol. SE-11, No. 2, Feb. 1985, pp. 169-178.
    • (1985) IEEE Transactions on Software Engineering , vol.SE-11 , Issue.2 , pp. 169-178
    • Hayes, I.1
  • 12
    • 0018918712 scopus 로고
    • Specifying software requirements for complex systems: New techniques and their application
    • Jan.
    • Heninger, K, "Specifying Software Requirements for Complex Systems: New Techniques and their Application", IEEE Transactions on Software Engineering, Vol. SE-6, No. 1, Jan. 1980.
    • (1980) IEEE Transactions on Software Engineering , vol.SE-6 , Issue.1
    • Heninger, K.1
  • 14
    • 0025492027 scopus 로고
    • Integrating formal methods into the development process
    • Sept.
    • Kemmerer, R. A., "Integrating Formal Methods into the Development Process", IEEE Software, Sept. 1990, pp. 37-50.
    • (1990) IEEE Software , pp. 37-50
    • Kemmerer, R.A.1
  • 18
    • 0003954843 scopus 로고
    • Formal methods and their role in the certification of critical systems
    • January
    • Rushby, J., "Formal Methods and their Role in the Certification of Critical Systems", SRI-CSL-95-01, January 1995. http://www.csl.sri.com/csl-95-l.html
    • (1995) SRI-CSL-95-01
    • Rushby, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.