메뉴 건너뛰기




Volumn 4536 LNCS, Issue , 2007, Pages 226-230

Extreme programming security practices

Author keywords

[No Author keywords available]

Indexed keywords

LIFE CYCLE; RISK ASSESSMENT; SECURITY OF DATA; SOFTWARE ARCHITECTURE;

EID: 38149102523     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73101-6_42     Document Type: Conference Paper
Times cited : (24)

References (13)
  • 1
    • 38149002441 scopus 로고    scopus 로고
    • Common criteria for information technology security evaluation, version 2.5. ISO/IEC 18405 2005
    • Common criteria for information technology security evaluation, version 2.5. ISO/IEC 18405 (2005)
  • 2
    • 33746200049 scopus 로고    scopus 로고
    • Aydal, E.G., Paige, R.F., Chivers, H., Brooke, P.J.: Brooke. Security planning and refactoring in extreme programming. In: Abrahamsson, P., Marchesi, M., Succi, G. (eds.) XP 2006. LNCS, 4044, pp. 154-163. Springer, Heidelberg (2006)
    • Aydal, E.G., Paige, R.F., Chivers, H., Brooke, P.J.: Brooke. Security planning and refactoring in extreme programming. In: Abrahamsson, P., Marchesi, M., Succi, G. (eds.) XP 2006. LNCS, vol. 4044, pp. 154-163. Springer, Heidelberg (2006)
  • 3
    • 38149033098 scopus 로고    scopus 로고
    • Agile security for information warefare: A call for research
    • Turku, Finland, June
    • Baskerville, R.: Agile security for information warefare: a call for research. In: Proc. ECIS2004, Turku, Finland, June (2004)
    • (2004) Proc. ECIS2004
    • Baskerville, R.1
  • 5
    • 38149057689 scopus 로고    scopus 로고
    • Extreme security engineering
    • Fairfax, VA October
    • Beznosov, K.: Extreme security engineering. In: Proc. BizSec Fairfax, VA (October 2003)
    • (2003) Proc. BizSec
    • Beznosov, K.1
  • 6
    • 26444465547 scopus 로고    scopus 로고
    • Chivers, H., Paige, R.F., Ge, X.: Agile security using an incremental security architecture. In: Baumeister, H., Marchesi, M., Holcombe, M. (eds.) XP 2005. LNCS, 3556, pp. 57-65. Springer, Heidelberg (2005)
    • Chivers, H., Paige, R.F., Ge, X.: Agile security using an incremental security architecture. In: Baumeister, H., Marchesi, M., Holcombe, M. (eds.) XP 2005. LNCS, vol. 3556, pp. 57-65. Springer, Heidelberg (2005)
  • 7
    • 0038635225 scopus 로고    scopus 로고
    • May
    • Fowler, M.: Is design dead? (May 2004), http://www.martinfowler.com/ articles/designDead.html
    • (2004) Is design dead
    • Fowler, M.1
  • 10
    • 0004198635 scopus 로고    scopus 로고
    • 2nd edn. Prentice Hall, Englewood Cliffs
    • Pfleeger, C.P.: Security in Computing, 2nd edn. Prentice Hall, Englewood Cliffs (1997)
    • (1997) Security in Computing
    • Pfleeger, C.P.1
  • 12
    • 38149006453 scopus 로고    scopus 로고
    • Guidelines on securing public web servers
    • Technical report, NIST 800-44 September
    • Tracy, M., Jansen, W., McLamon, M.: Guidelines on securing public web servers. Technical report, NIST 800-44 (September 2002)
    • (2002)
    • Tracy, M.1    Jansen, W.2    McLamon, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.