메뉴 건너뛰기




Volumn 4801 LNCS, Issue , 2007, Pages 423-437

A comparison of two approaches to safety analysis based on use cases

Author keywords

Experiment; FMEA; Misuse cases; Safety engineering

Indexed keywords

ELECTRIC EQUIPMENT; FAILURE ANALYSIS; SOFTWARE ENGINEERING;

EID: 38349047888     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75563-0_29     Document Type: Conference Paper
Times cited : (30)

References (37)
  • 1
    • 2942750151 scopus 로고    scopus 로고
    • Engineering Safety Requirements, Safety Constraints, and Safety-Critical Requirements
    • Firesmith, D.G.: Engineering Safety Requirements, Safety Constraints, and Safety-Critical Requirements. Journal of Object Technology 3, 27-42 (2004)
    • (2004) Journal of Object Technology , vol.3 , pp. 27-42
    • Firesmith, D.G.1
  • 2
    • 38349021844 scopus 로고    scopus 로고
    • Using Abuse Case Models for Security Requirements Analysis
    • Dignum, F.P.M, Greaves, M, eds, Issues in Agent Communication, Springer, Heidelberg
    • McDermott, J., Fox, C.: Using Abuse Case Models for Security Requirements Analysis. In: Dignum, F.P.M., Greaves, M. (eds.) Issues in Agent Communication. LNCS, vol. 1916, Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1916
    • McDermott, J.1    Fox, C.2
  • 3
    • 84963992451 scopus 로고    scopus 로고
    • Software Engineering for Safety: A Roadmap
    • Finkelstein, A, ed, ACM Press, New York
    • Lutz, R.R.: Software Engineering for Safety: A Roadmap. In: Finkelstein, A. (ed.) The Future of Software Engineering, pp. 213-226. ACM Press, New York (2000)
    • (2000) The Future of Software Engineering , pp. 213-226
    • Lutz, R.R.1
  • 5
    • 33845227913 scopus 로고    scopus 로고
    • Poels, G., Burton-Jones, A., Gemino, A., Parsons, J., Ramesh, V.: Experimental Research on Conceptual Modeling: What Should We Be Doing and Why? In: Embley, D.W., Olivé, A., Ram, S. (eds.) ER 2006. LNCS, 4215, pp. 544-547. Springer, Heidelberg (2006)
    • Poels, G., Burton-Jones, A., Gemino, A., Parsons, J., Ramesh, V.: Experimental Research on Conceptual Modeling: What Should We Be Doing and Why? In: Embley, D.W., Olivé, A., Ram, S. (eds.) ER 2006. LNCS, vol. 4215, pp. 544-547. Springer, Heidelberg (2006)
  • 6
    • 0034833312 scopus 로고    scopus 로고
    • Deriving Safety Requirements Using Scenarios
    • Nuseibeh, B, Easterbrook, S, eds, Toronto, Canada, pp, IEEE Computer Society Press, Los Alamitos
    • Allenby, K., Kelly, T.: Deriving Safety Requirements Using Scenarios. In: Nuseibeh, B., Easterbrook, S. (eds.) Fifth IEEE International Symposium on Requirements Engineering (RE'01), Toronto, Canada, pp. 228-235. IEEE Computer Society Press, Los Alamitos (2001)
    • (2001) Fifth IEEE International Symposium on Requirements Engineering (RE'01) , pp. 228-235
    • Allenby, K.1    Kelly, T.2
  • 7
    • 38349060225 scopus 로고    scopus 로고
    • Guidelines, S.A.E.: Methods for Conducting the Safety Assessment Process on Civil Airborne Systems and Equipment. Society of Automotive Engineers (1996)
    • Guidelines, S.A.E.: Methods for Conducting the Safety Assessment Process on Civil Airborne Systems and Equipment. Society of Automotive Engineers (1996)
  • 9
    • 24944590511 scopus 로고    scopus 로고
    • Automatic Translation from Requirements Model into Use Cases Modeling on UML
    • Gervasi, O, Gavrilova, M, Kumar, V, Laganà, A, Lee, H.P, Mun, Y, Taniar, D, Tan, C.J.K, eds, ICCSA 2005, Springer, Heidelberg
    • Kim, H.-K., Chung, Y.-K.: Automatic Translation from Requirements Model into Use Cases Modeling on UML. In: Gervasi, O., Gavrilova, M., Kumar, V., Laganà, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3482, pp. 769-777. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3482 , pp. 769-777
    • Kim, H.-K.1    Chung, Y.-K.2
  • 11
    • 23944450104 scopus 로고    scopus 로고
    • Pettit IV, R.G., Street, J.A.: Lessons Learned Applying UML in the Design of Mission-Critical Software. In: Nunes, N.J., Selic, B., Rodrigues da Silva, A., Toval Alvarez, A. (eds.) UML Modeling Languages and Applications. LNCS, 3297, pp. 129-137. Springer, Heidelberg (2005)
    • Pettit IV, R.G., Street, J.A.: Lessons Learned Applying UML in the Design of Mission-Critical Software. In: Nunes, N.J., Selic, B., Rodrigues da Silva, A., Toval Alvarez, A. (eds.) UML Modeling Languages and Applications. LNCS, vol.3297, pp. 129-137. Springer, Heidelberg (2005)
  • 12
    • 41149147242 scopus 로고    scopus 로고
    • Use Case-Based Modeling and Analysis of Failsafe Fault-Tolerance
    • Glinz, M, ed, St.Louis, USA, pp, IEEE Computer Society Press, Los Alamitos
    • Ebnenasir, A., Cheng, B.H.C., Konrad, S.: Use Case-Based Modeling and Analysis of Failsafe Fault-Tolerance. In: Glinz, M. (ed.) 14th IEEE International Requirements Engineering Conference (RE'06), St.Louis, USA, pp. 343-344. IEEE Computer Society Press, Los Alamitos (2006)
    • (2006) 14th IEEE International Requirements Engineering Conference (RE'06) , pp. 343-344
    • Ebnenasir, A.1    Cheng, B.H.C.2    Konrad, S.3
  • 13
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting Security Requirements with Misuse Cases
    • Sindre, G., Opdahl, A.L.: Eliciting Security Requirements with Misuse Cases. Requirements Engineering 10, 34-44 (2005)
    • (2005) Requirements Engineering , vol.10 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 14
    • 84948950071 scopus 로고    scopus 로고
    • Initial Industrial Experience of Misuse Cases in Trade-Off Analysis
    • Pohl, K, ed, Essen, Germany, pp, IEEE Computer Society Press, Los Alamitos
    • Alexander, I.F.: Initial Industrial Experience of Misuse Cases in Trade-Off Analysis. In: Pohl, K. (ed.) 10th Anniversary IEEE Joint International Requirements Engineering Conference (RE'02), Essen, Germany, pp. 9-13. IEEE Computer Society Press, Los Alamitos (2002)
    • (2002) 10th Anniversary IEEE Joint International Requirements Engineering Conference (RE'02) , pp. 9-13
    • Alexander, I.F.1
  • 15
    • 0037240812 scopus 로고    scopus 로고
    • Misuse Cases, Use Cases with Hostile Intent
    • Alexander, I.F.: Misuse Cases, Use Cases with Hostile Intent. IEEE Software 20, 58-66 (2003)
    • (2003) IEEE Software , vol.20 , pp. 58-66
    • Alexander, I.F.1
  • 16
    • 35048845223 scopus 로고    scopus 로고
    • An Approach for Model-Based Risk Assessment
    • Heisel, M, Liggesmeyer, P, Wittmann, S, eds, SAFECOMP 2004, Springer, Heidelberg
    • Gran, B.A., Fredriksen, R., Thunem, A.P.-J.: An Approach for Model-Based Risk Assessment. In: Heisel, M., Liggesmeyer, P., Wittmann, S. (eds.) SAFECOMP 2004. LNCS, vol. 3219, pp. 311-324. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3219 , pp. 311-324
    • Gran, B.A.1    Fredriksen, R.2    Thunem, A.P.-J.3
  • 17
    • 38349052444 scopus 로고    scopus 로고
    • Jürjens, J.: Developing Safety-Critical Systems with UML. In: Stevens, P., Whittle, J., Booch, G. (eds.) (UML 2003). LNCS, 2863, pp. 144-159. Springer, Heidelberg (2003)
    • Jürjens, J.: Developing Safety-Critical Systems with UML. In: Stevens, P., Whittle, J., Booch, G. (eds.) (UML 2003). LNCS, vol. 2863, pp. 144-159. Springer, Heidelberg (2003)
  • 19
    • 38349038633 scopus 로고    scopus 로고
    • Berkenkötter, K., Hannemann, U., Peleska, J., HYBRIS,: HYBRIS - Efficient Specification and Analysis of Hybrid Systems - Part III: RCSD - A UML 2.0 Profile for the Railway Control System Domain (Draft Version). Univ. Bremen, Germany (2006)
    • Berkenkötter, K., Hannemann, U., Peleska, J., HYBRIS,: HYBRIS - Efficient Specification and Analysis of Hybrid Systems - Part III: RCSD - A UML 2.0 Profile for the Railway Control System Domain (Draft Version). Univ. Bremen, Germany (2006)
  • 20
    • 38349060223 scopus 로고    scopus 로고
    • Tenzer, J.: Exploration games for safety-critical system design with UML 2.0. In: Fernandez, E.B., et al. (eds.): 3rd International Workshop on Critical Systems Development with UML, CSDUML'04, Lisbon, Portugal, 12 Oct, Technical Report 10415. pp. 41-55. Technische Universität München, (2004)
    • Tenzer, J.: Exploration games for safety-critical system design with UML 2.0. In: Fernandez, E.B., et al. (eds.): 3rd International Workshop on Critical Systems Development with UML, CSDUML'04, Lisbon, Portugal, 12 Oct, Technical Report 10415. pp. 41-55. Technische Universität München, (2004)
  • 21
    • 38349067971 scopus 로고    scopus 로고
    • Stålhane, T., Pham, H.T.: Assessment and Analysis of Robustness for a Web-Based System. In: Isaias, P., et al. (eds.) IADIS International Conference on WWW/Internet, Murcia, Spain, 5-8 October, IADIS Press (2006)
    • Stålhane, T., Pham, H.T.: Assessment and Analysis of Robustness for a Web-Based System. In: Isaias, P., et al. (eds.) IADIS International Conference on WWW/Internet, Murcia, Spain, 5-8 October, IADIS Press (2006)
  • 22
    • 33646849419 scopus 로고    scopus 로고
    • Safety Methods in Software Process Improvement
    • Richardson, I, Abrahamsson, P, Messnarz, R, eds, Software Process Improvement, Springer, Heidelberg
    • Lauritzen, T., Stålhane, T.: Safety Methods in Software Process Improvement. In: Richardson, I., Abrahamsson, P., Messnarz, R. (eds.) Software Process Improvement. LNCS, vol. 3792, pp. 95-105. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3792 , pp. 95-105
    • Lauritzen, T.1    Stålhane, T.2
  • 23
    • 35048875222 scopus 로고    scopus 로고
    • Fernandez-Medina, E., Trujillo, J., Villaroel, R., Piattini, M.: Extending UML for Designing Secure Data Warehouses. In: Atzeni, P., Chu, W., Lu, H., Zhou, S., Ling, T.-W. (eds.) ER 2004. LNCS, 3288, Springer, Heidelberg (2004)
    • Fernandez-Medina, E., Trujillo, J., Villaroel, R., Piattini, M.: Extending UML for Designing Secure Data Warehouses. In: Atzeni, P., Chu, W., Lu, H., Zhou, S., Ling, T.-W. (eds.) ER 2004. LNCS, vol. 3288, Springer, Heidelberg (2004)
  • 24
    • 38349035015 scopus 로고    scopus 로고
    • Rodriguez, A., Fernandez-Medina, E., Piattini, M.: Capturing Security Requirements in Business Processes through a UML 2. In: Roddick, J.F., Benjamins, V.R., Si-Saïd Cherfi, S., Chiang, R., Claramunt, C., Elmasri, R., Grandi, F., Han, H., Hepp, M., Lytras, M., Mišić, V.B., Poels, G., Song, I.-Y., Trujillo, J., Vangenot, C. (eds.). ER 2006. LNCS, 4231, Springer, Heidelberg (2006)
    • Rodriguez, A., Fernandez-Medina, E., Piattini, M.: Capturing Security Requirements in Business Processes through a UML 2. In: Roddick, J.F., Benjamins, V.R., Si-Saïd Cherfi, S., Chiang, R., Claramunt, C., Elmasri, R., Grandi, F., Han, H., Hepp, M., Lytras, M., Mišić, V.B., Poels, G., Song, I.-Y., Trujillo, J., Vangenot, C. (eds.). ER 2006. LNCS, vol. 4231, Springer, Heidelberg (2006)
  • 25
    • 79955143136 scopus 로고    scopus 로고
    • Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.). UML 2002. LNCS, 2460, pp. 426-441. Springer, Heidelberg (2002)
    • Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.). UML 2002. LNCS, vol. 2460, pp. 426-441. Springer, Heidelberg (2002)
  • 26
    • 85086954040 scopus 로고    scopus 로고
    • Jürjens, J.: Sound methods and effective tools for model-based security engineering with UML. In: Inverardi, P., Jazayeri, M. (eds.) ICSE 2005. LNCS, 4309, pp. 322-331. Springer, Heidelberg (2006)
    • Jürjens, J.: Sound methods and effective tools for model-based security engineering with UML. In: Inverardi, P., Jazayeri, M. (eds.) ICSE 2005. LNCS, vol. 4309, pp. 322-331. Springer, Heidelberg (2006)
  • 27
    • 38149121542 scopus 로고    scopus 로고
    • Mal-activity diagrams to capture attacks on business processes
    • Sawyer, P, Paech, B, Heymans, P, eds, REFSQ 2007, Springer, Heidelberg
    • Sindre, G.: Mal-activity diagrams to capture attacks on business processes. In: Sawyer, P., Paech, B., Heymans, P. (eds.). REFSQ 2007. LNCS, vol. 4542, pp. 355-366. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4542 , pp. 355-366
    • Sindre, G.1
  • 28
    • 38349061876 scopus 로고    scopus 로고
    • Capturing Dependability Threats in Conceptual Modelling
    • Krogstie, J, et al, eds, Springer, Heidelberg
    • Sindre, G., Opdahl, A.L.: Capturing Dependability Threats in Conceptual Modelling. In: Krogstie, J., et al. (eds.) Conceptual Modelling in Information Systems Engineering, pp. 247-260. Springer, Heidelberg (2007)
    • (2007) Conceptual Modelling in Information Systems Engineering , pp. 247-260
    • Sindre, G.1    Opdahl, A.L.2
  • 29
    • 38349024697 scopus 로고    scopus 로고
    • Diallo, M.H., Romero-Mariona, J., Sim, S.E., Richardson, D.J.: A Comparative Evaluation of Three Approaches to Specifying Security Requirements. REFSQ'06, Luxembourg (2006)
    • Diallo, M.H., Romero-Mariona, J., Sim, S.E., Richardson, D.J.: A Comparative Evaluation of Three Approaches to Specifying Security Requirements. REFSQ'06, Luxembourg (2006)
  • 30
    • 38049047671 scopus 로고    scopus 로고
    • A look at misuse cases for safety concerns
    • Henderson-Sellers, B, et al, eds, IFIP WG8.1 Working Conference on Situational Method Engineering: Fundamentals and Experiences ME'07, Geneva, Switzerland, Springer, Heidelberg
    • Sindre, G.: A look at misuse cases for safety concerns. In: Henderson-Sellers, B., et al. (eds.) IFIP WG8.1 Working Conference on Situational Method Engineering: Fundamentals and Experiences (ME'07), Geneva, Switzerland. IFIP Series, Springer, Heidelberg (2007)
    • (2007) IFIP Series
    • Sindre, G.1
  • 32
    • 84936823933 scopus 로고
    • User Acceptance of Computer Technology: A Comparison of Two Theoretical Models
    • Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science 35, 982-1003 (1989)
    • (1989) Management Science , vol.35 , pp. 982-1003
    • Davis, F.D.1    Bagozzi, R.P.2    Warshaw, P.R.3
  • 33
    • 38349025011 scopus 로고    scopus 로고
    • Tukey, J.W.: Data analysis and behavioral science or learning to bear the quantitative's man burden by shunning badmandments. In: Jones, L.W. (ed.) The Collected Works of John W. Tukey, Wadsworth, Monterey, C.A. Tukey, Ill, pp. 187-389 (1986)
    • Tukey, J.W.: Data analysis and behavioral science or learning to bear the quantitative's man burden by shunning badmandments. In: Jones, L.W. (ed.) The Collected Works of John W. Tukey, Wadsworth, Monterey, C.A. Tukey, vol. Ill, pp. 187-389 (1986)
  • 34
    • 0010404351 scopus 로고    scopus 로고
    • University of Queensland, Australia, Brisbane
    • Hopkins, W.G.: A New View of Statistics. University of Queensland, Australia, Brisbane (2001)
    • (2001) A New View of Statistics
    • Hopkins, W.G.1
  • 36
    • 14844283058 scopus 로고    scopus 로고
    • Using Students as Experiment Subjects - An Analysis on Graduate and Freshmen Student Data
    • Linkman, S, ed, Keele University, Staffordshire, UK
    • Runeson, P.: Using Students as Experiment Subjects - An Analysis on Graduate and Freshmen Student Data. In: Linkman, S. (ed.) 7th International Conference on Empirical Assessment & Evaluation in Software Engineering (EASE'03), pp. 95-102. Keele University, Staffordshire, UK (2003)
    • (2003) 7th International Conference on Empirical Assessment & Evaluation in Software Engineering (EASE'03) , pp. 95-102
    • Runeson, P.1
  • 37
    • 4344598248 scopus 로고    scopus 로고
    • Evaluating the Effect of a Delegated versus Centralized Control Style on the Maintainability of Object-oriented Software
    • Arisholm, E., Sjøberg, D.I.K.: Evaluating the Effect of a Delegated versus Centralized Control Style on the Maintainability of Object-oriented Software. IEEE Transactions on Software Engineering 30, 521-534 (2004)
    • (2004) IEEE Transactions on Software Engineering , vol.30 , pp. 521-534
    • Arisholm, E.1    Sjøberg, D.I.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.