메뉴 건너뛰기




Volumn , Issue , 2006, Pages 213-220

PWSSec: Process for Web services security

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA; STANDARDS;

EID: 38949162568     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICWS.2006.107     Document Type: Conference Paper
Times cited : (32)

References (37)
  • 2
    • 38949167705 scopus 로고    scopus 로고
    • Cautious Web Services Software Adoption Continues; IDC Expects Spending to Reach $11 Billion by 2008
    • IDC
    • IDC, "Cautious Web Services Software Adoption Continues; IDC Expects Spending to Reach $11 Billion by 2008," 2004.
    • (2004)
  • 6
    • 20444440807 scopus 로고    scopus 로고
    • Sound Development of Secure Service-based Systems
    • presented at, New York, USA
    • M. Deubler, J. Grünbauer, J. Jürjens, and G. Wimmel, "Sound Development of Secure Service-based Systems," presented at ICSOC04, New York, USA, 2004.
    • (2004) ICSOC04
    • Deubler, M.1    Grünbauer, J.2    Jürjens, J.3    Wimmel, G.4
  • 10
    • 0004277827 scopus 로고    scopus 로고
    • Carnegie Mellon. Software Engineering Institute. CMU/SEI-99-TR-007, April April
    • L. Bass and R. Kazman, "Architecture Based Development," Carnegie Mellon. Software Engineering Institute. CMU/SEI-99-TR-007, April 1999 April 1999.
    • (1999) Architecture Based Development , pp. 1999
    • Bass, L.1    Kazman, R.2
  • 14
    • 0002670359 scopus 로고    scopus 로고
    • Attack Trees: Modeling Security Threats
    • B. Schneier, "Attack Trees: Modeling Security Threats," Dr. Dobb's Journal, 1999.
    • (1999) Dr. Dobb's Journal
    • Schneier, B.1
  • 16
    • 38949090653 scopus 로고    scopus 로고
    • G. Sindre and A. L. Opdahl, Eliciting Security Requirements with Misuse Cases, presented at TOOLS-37'00, Sydney, Australia, 2000.
    • G. Sindre and A. L. Opdahl, "Eliciting Security Requirements with Misuse Cases," presented at TOOLS-37'00, Sydney, Australia, 2000.
  • 17
    • 0037240812 scopus 로고    scopus 로고
    • I. Alexander, Misuse Cases: Use Cases with Hostile Intent, IEEE Computer Software, 20, pp. 58-66, 2003
    • I. Alexander, "Misuse Cases: Use Cases with Hostile Intent," IEEE Computer Software, vol. 20, pp. 58-66, 2003.
  • 21
    • 17844409254 scopus 로고    scopus 로고
    • Requirements Reuse for Improving Information Systems Security: A Practitioner's Approach
    • A. Toval, J. Nicolás, B. Moros, and F. García, "Requirements Reuse for Improving Information Systems Security: A Practitioner's Approach," Requirements Engineering Journal, vol. 6, pp. 205-219, 2001.
    • (2001) Requirements Engineering Journal , vol.6 , pp. 205-219
    • Toval, A.1    Nicolás, J.2    Moros, B.3    García, F.4
  • 22
    • 38949109580 scopus 로고    scopus 로고
    • I. C. Society, Software Engineering Body of Knowledge, 2004.
    • I. C. Society, "Software Engineering Body of Knowledge," 2004.
  • 23
    • 0029408391 scopus 로고
    • The 4+1 View Model of Software Architecture
    • P. Krutchen, "The 4+1 View Model of Software Architecture," IEEE Software, pp. 42-50, 1995.
    • (1995) IEEE Software , pp. 42-50
    • Krutchen, P.1
  • 26
    • 35048901438 scopus 로고    scopus 로고
    • E. Ferrari and B. Thuraisingham, Security and Privacy for Web Databases and Services, E. 2004 and L. 2992, Eds. Berlin Heidelberg 2004: Springer-Verlag, 2004, pp. 17-28.
    • E. Ferrari and B. Thuraisingham, "Security and Privacy for Web Databases and Services," E. 2004 and L. 2992, Eds. Berlin Heidelberg 2004: Springer-Verlag, 2004, pp. 17-28.
  • 27
    • 38949200576 scopus 로고    scopus 로고
    • C. J. Alberts, S. G. Behrens, R. D. Pethia, and W. R. Wilson, OCTAVE Framework, Version 1.0, Carnegie Mellon. SEI. CMU/SEI-99-TR-017, September 1999 1999
    • C. J. Alberts, S. G. Behrens, R. D. Pethia, and W. R. Wilson, "OCTAVE Framework, Version 1.0," Carnegie Mellon. SEI. CMU/SEI-99-TR-017, September 1999 1999.
  • 28
    • 2942757657 scopus 로고    scopus 로고
    • Engineering Security Requirements
    • D. G. Firesmith, "Engineering Security Requirements," Journal of Object Technology, vol. 2, pp. 53-68, 2003.
    • (2003) Journal of Object Technology , vol.2 , pp. 53-68
    • Firesmith, D.G.1
  • 30
    • 38949173485 scopus 로고    scopus 로고
    • M. R. Barbacci, R. Ellison, A. J. Lattanze, J. A. Stafford, C. B. Weinstock, and W. G. Wood, Quality Attribute Workshops (QWAs). Third Edition., Carnegie Mellon. Software Engineering Institute. CMU/SEI2003-TR-016, August 2003 2003.
    • M. R. Barbacci, R. Ellison, A. J. Lattanze, J. A. Stafford, C. B. Weinstock, and W. G. Wood, "Quality Attribute Workshops (QWAs). Third Edition.," Carnegie Mellon. Software Engineering Institute. CMU/SEI2003-TR-016, August 2003 2003.
  • 31
    • 38949142589 scopus 로고    scopus 로고
    • TOGAF The Open Group Architecture Framework, Versión 8.1. Enterprise Edition, The Open Group 2003
    • "TOGAF (The Open Group Architecture Framework). Versión 8.1. "Enterprise Edition"," The Open Group 2003.
  • 33
    • 2942753973 scopus 로고    scopus 로고
    • Specifying Reusable Security Requirements
    • D. G. Firesmith, "Specifying Reusable Security Requirements," Journal of Object Technology, vol. 3, pp. 61-75, 2004.
    • (2004) Journal of Object Technology , vol.3 , pp. 61-75
    • Firesmith, D.G.1
  • 34
    • 2942563935 scopus 로고    scopus 로고
    • A Process Framework for Characterising Security Properties of Component-Based Software Systems
    • presented at
    • K. M. Khan and J. Han, "A Process Framework for Characterising Security Properties of Component-Based Software Systems," presented at Australian Software Engineering Conference (ASWEC04), 2004.
    • (2004) Australian Software Engineering Conference (ASWEC04)
    • Khan, K.M.1    Han, J.2
  • 35
    • 38949138048 scopus 로고    scopus 로고
    • G. Jonsdottir, L. Davis, and R. Gamble, Designing Secure Integration Architectures, presented at ICCBSS 2003, 2003.
    • G. Jonsdottir, L. Davis, and R. Gamble, "Designing Secure Integration Architectures," presented at ICCBSS 2003, 2003.
  • 36
    • 33644973176 scopus 로고    scopus 로고
    • Applying the Tropos Methodology for Analysing Web Services Requirements and Reasoning about Qualities of Services
    • M. Aiello and P. Giorgini, "Applying the Tropos Methodology for Analysing Web Services Requirements and Reasoning about Qualities of Services," UPGRADE, vol. 5, pp. 20-26, 2004.
    • (2004) UPGRADE , vol.5 , pp. 20-26
    • Aiello, M.1    Giorgini, P.2
  • 37
    • 38949154073 scopus 로고    scopus 로고
    • Specification and Querying of Security Constraints in the EFSOC Framework
    • presented at, New York City, USA, Willem-Jan van den Heuvel
    • K. Leune and M. Papazaglou, "Specification and Querying of Security Constraints in the EFSOC Framework," presented at International Conference on Service Oriented Computing, New York City, USA, Willem-Jan van den Heuvel.
    • International Conference on Service Oriented Computing
    • Leune, K.1    Papazaglou, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.