메뉴 건너뛰기




Volumn 25, Issue 1, 2008, Pages 20-27

Security requirements for the rest of us: A survey

Author keywords

Requirements elicitation; Security requirements; Software engineering

Indexed keywords

COMPUTER SYSTEM FIREWALLS; DATA PRIVACY; SOFTWARE ENGINEERING;

EID: 39449099894     PISSN: 07407459     EISSN: None     Source Type: Journal    
DOI: 10.1109/MS.2008.19     Document Type: Article
Times cited : (104)

References (33)
  • 1
    • 39449114401 scopus 로고    scopus 로고
    • P. Coffee, Security Onus Is on Developers, eWeek, 6 June 2006, www.eweek.com/article2/0,1895,1972593,00.asp.
    • P. Coffee, "Security Onus Is on Developers," eWeek, 6 June 2006, www.eweek.com/article2/0,1895,1972593,00.asp.
  • 2
    • 23944475544 scopus 로고    scopus 로고
    • When Security Meets Software Engineering: A Case of Modeling Secure Information Systems
    • H. Mouratidis, P. Giorgini, and G. Manson, "When Security Meets Software Engineering: A Case of Modeling Secure Information Systems," Information Systems, vol. 30, no. 8, 2005, pp. 609-629.
    • (2005) Information Systems , vol.30 , Issue.8 , pp. 609-629
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.3
  • 3
    • 33747302976 scopus 로고    scopus 로고
    • Web Application Security Engineering
    • J.D. Meier, "Web Application Security Engineering," IEEE Security & Privacy, vol. 4, no. 4, 2006, pp. 16-24.
    • (2006) IEEE Security & Privacy , vol.4 , Issue.4 , pp. 16-24
    • Meier, J.D.1
  • 4
    • 19944387279 scopus 로고    scopus 로고
    • Why Users Cannot Use Security
    • S. Furnell, "Why Users Cannot Use Security," Computers & Security vol. 24, no. 4, 2005, pp. 274-279.
    • (2005) Computers & Security , vol.24 , Issue.4 , pp. 274-279
    • Furnell, S.1
  • 6
    • 33244470714 scopus 로고    scopus 로고
    • The Affordable Application of Formal Methods to Software Engineering
    • ACM Press
    • J.F. Davis, "The Affordable Application of Formal Methods to Software Engineering," ACM SIGAda Ada Letters, ACM Press, 2005, pp. 57-62.
    • (2005) ACM SIGAda Ada Letters , pp. 57-62
    • Davis, J.F.1
  • 7
    • 2942757657 scopus 로고    scopus 로고
    • Engineering Security Requirements
    • D.G. Firesmith, "Engineering Security Requirements," J. Object Technology, vol. 2, no. 1, 2003, pp. 53-68.
    • (2003) J. Object Technology , vol.2 , Issue.1 , pp. 53-68
    • Firesmith, D.G.1
  • 8
    • 40449096402 scopus 로고    scopus 로고
    • Security Requirements Engineering: A Framework for Representation and Analysis
    • to be published in
    • C.B. Haley et al., "Security Requirements Engineering: A Framework for Representation and Analysis," to be published in IEEE Trans. Software Eng.; http://doi.ieeecomputersociety.org/10.1109/ TSE.2007.70754.
    • IEEE Trans. Software Eng
    • Haley, C.B.1
  • 9
    • 39449130657 scopus 로고    scopus 로고
    • Collaboration in a Secure Development Process Part 1
    • June
    • G. Peterson, "Collaboration in a Secure Development Process Part 1," Information Security Bull., June 2004, pp. 165-172.
    • (2004) Information Security Bull , pp. 165-172
    • Peterson, G.1
  • 11
    • 79960596773 scopus 로고    scopus 로고
    • Extending XP Practices to Support Security Requirements Engineering
    • SESS, ACM Press
    • G. Boström et al., "Extending XP Practices to Support Security Requirements Engineering," Proc. 2006 Int'l Worksbop Software Eng. for Secure Systems (SESS), ACM Press, 2006, pp. 11-18.
    • (2006) Proc. 2006 Int'l Worksbop Software Eng. for Secure Systems , pp. 11-18
    • Boström, G.1
  • 12
    • 27644580707 scopus 로고    scopus 로고
    • Demystifying the Threat Modeling Process
    • P. Torr, "Demystifying the Threat Modeling Process," IEEE Security & Privacy, vol. 3, no. 5, 2005, pp. 66-70.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.5 , pp. 66-70
    • Torr, P.1
  • 14
    • 24344438696 scopus 로고    scopus 로고
    • Secure Software Development by Example
    • A. Apvrille and M. Pourzandi, "Secure Software Development by Example," IEEE Security & Privacy, vol. 3, no. 4, 2005, pp. 10-17.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.4 , pp. 10-17
    • Apvrille, A.1    Pourzandi, M.2
  • 15
    • 39449122413 scopus 로고    scopus 로고
    • A Methodology for Secure Software Design
    • paper presented at the
    • E.B. Fernandez, "A Methodology for Secure Software Design," paper presented at the Int'l Symp. Web Services and Applications (ISWS), 2004; www.cse.fau.edu/~ed/EFLVSecSysDes1.pdf.
    • (2004) Int'l Symp. Web Services and Applications (ISWS)
    • Fernandez, E.B.1
  • 16
    • 27644524446 scopus 로고    scopus 로고
    • Bridging the Gap between Software Development and Information Security
    • K.R. van Wyk and G. McGraw, "Bridging the Gap between Software Development and Information Security," IEEE Security & Privacy, vol. 3, no. 5, 2005, pp. 75-79.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.5 , pp. 75-79
    • van Wyk, K.R.1    McGraw, G.2
  • 17
    • 19644380905 scopus 로고    scopus 로고
    • Problem Frame Semantics for Software Development
    • J.G. Hall, L. Rapanotti, and M. Jackson, "Problem Frame Semantics for Software Development," Software and Systems Modeling, vol. 4, no. 2, 2005, pp. 189-198.
    • (2005) Software and Systems Modeling , vol.4 , Issue.2 , pp. 189-198
    • Hall, J.G.1    Rapanotti, L.2    Jackson, M.3
  • 19
    • 33845197906 scopus 로고    scopus 로고
    • Information Modeling for Automated Risk Analysis
    • Proc. Comm. and Multimedia Security, Springer
    • H. Chivers, "Information Modeling for Automated Risk Analysis," Proc. Comm. and Multimedia Security, LNCS 4237, Springer, 2006, pp. 228-239.
    • (2006) LNCS , vol.4237 , pp. 228-239
    • Chivers, H.1
  • 20
    • 4544255381 scopus 로고    scopus 로고
    • Elaborating Security Requirements by Construction of Intentional Anti-models
    • IEEE CS Press
    • A. van Lamsweerde, "Elaborating Security Requirements by Construction of Intentional Anti-models," Proc. 26th Int'l Conf. Software Eng. (ICSE 04), IEEE CS Press, 2004, pp. 148-157.
    • (2004) Proc. 26th Int'l Conf. Software Eng. (ICSE 04) , pp. 148-157
    • van Lamsweerde, A.1
  • 21
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting Security Requirements with Misuse Cases
    • G. Sindre and A.L. Opdahl, "Eliciting Security Requirements with Misuse Cases," Requirements Eng., vol. 10, no. 1, 2005, pp. 34-44.
    • (2005) Requirements Eng , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 22
    • 85045573601 scopus 로고    scopus 로고
    • Using Abuse Case Models for Security Requirements Analysis
    • IEEE CS Press
    • J. McDermott and C. Fox, "Using Abuse Case Models for Security Requirements Analysis," Proc. Computer Security Applications Conf. IEEE CS Press, 1999, pp. 55-64.
    • (1999) Proc. Computer Security Applications Conf , pp. 55-64
    • McDermott, J.1    Fox, C.2
  • 23
    • 2942713443 scopus 로고    scopus 로고
    • Security Use Cases
    • D.G. Firesmith, "Security Use Cases," J. Object Technology, vol. 2, no. 3, 2003, pp. 53-64.
    • (2003) J. Object Technology , vol.2 , Issue.3 , pp. 53-64
    • Firesmith, D.G.1
  • 24
    • 77954606675 scopus 로고    scopus 로고
    • Proc. 12th Working Conf. Requirements Eng.: Foundation for Software Quality
    • REFSQ, Essener Informatik Beiträge
    • L. Røstad, "An Extended Misuse Case Notation: Including Vulnerabilities and the Insider Threat," Proc. 12th Working Conf. Requirements Eng.: Foundation for Software Quality (REFSQ), Essener Informatik Beiträge, 2006, pp. 33-34.
    • (2006) , pp. 33-34
    • Røstad, L.1
  • 27
    • 0002670359 scopus 로고    scopus 로고
    • Attack Trees - Modeling Security Threats
    • Dec
    • B. Schneier, "Attack Trees - Modeling Security Threats," Dr. Dobb's J., Dec. 1999, pp. 21-29.
    • (1999) Dr. Dobb's J , pp. 21-29
    • Schneier, B.1
  • 29
    • 0029191009 scopus 로고
    • Dealing with Non-functional Requirements: Three Experimental Studies of a Process-Oriented Approach
    • IEEE CS Press
    • L. Chung and B.A. Nixon, "Dealing with Non-functional Requirements: Three Experimental Studies of a Process-Oriented Approach," Proc. 17th Int'l Conf. Software Eng. (ICSE 95), IEEE CS Press, 1995, pp. 25-37.
    • (1995) Proc. 17th Int'l Conf. Software Eng. (ICSE 95) , pp. 25-37
    • Chung, L.1    Nixon, B.A.2
  • 30
    • 84979855000 scopus 로고    scopus 로고
    • L. Chung, Dealing with Security Requirements during the Development of Information Systems, Proc. 5th Int'l Conf. Advanced Information Systems Eng. (CAiSE), LNCS 685, Springer, 1993, pp. 234-251.
    • L. Chung, "Dealing with Security Requirements during the Development of Information Systems," Proc. 5th Int'l Conf. Advanced Information Systems Eng. (CAiSE), LNCS 685, Springer, 1993, pp. 234-251.
  • 31
    • 39449122071 scopus 로고    scopus 로고
    • A Goal-Oriented Approach to Identifying and Mitigating Security Risks
    • IEEE CS Press
    • J. Cleland-Huang et al., "A Goal-Oriented Approach to Identifying and Mitigating Security Risks," Proc. Int'l Symp. Secure Software Eng. IEEE CS Press, 2006, pp. 167-177.
    • (2006) Proc. Int'l Symp. Secure Software Eng , pp. 167-177
    • Cleland-Huang, J.1
  • 32
    • 0010920417 scopus 로고    scopus 로고
    • From Object-Oriented to Goal-Oriented Requirements Analysis
    • J. Mylopoulos, L. Chung, and E. Yu, "From Object-Oriented to Goal-Oriented Requirements Analysis," Comm. ACM, vol. 42, no. 1, 1999, pp. 31-37.
    • (1999) Comm. ACM , vol.42 , Issue.1 , pp. 31-37
    • Mylopoulos, J.1    Chung, L.2    Yu, E.3
  • 33
    • 33747216149 scopus 로고    scopus 로고
    • Security Policies and the Software Developer
    • D. Verdon, "Security Policies and the Software Developer," IEEE Security & Privacy, vol. 4, no. 4, 2006, pp. 42-49.
    • (2006) IEEE Security & Privacy , vol.4 , Issue.4 , pp. 42-49
    • Verdon, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.