메뉴 건너뛰기




Volumn , Issue , 2007, Pages 734-738

A security engineering process based on patterns

Author keywords

[No Author keywords available]

Indexed keywords

ADMINISTRATIVE DATA PROCESSING; ARTIFICIAL INTELLIGENCE; DECISION SUPPORT SYSTEMS; EXPERT SYSTEMS; MANAGEMENT INFORMATION SYSTEMS; PROCESS ENGINEERING; SECURITY SYSTEMS; TECHNOLOGY;

EID: 42449136587     PISSN: 15294188     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DEXA.2007.36     Document Type: Conference Paper
Times cited : (32)

References (11)
  • 4
    • 33746660228 scopus 로고    scopus 로고
    • Security engineering using problem frames
    • G. Müller, editor, Proceedings of the International Conference on Emerging Trends in Information and Communication Security ETRICS, Springer-Verlag
    • D. Hatebur, M. Heisel, and H. Schmidt. Security engineering using problem frames. In G. Müller, editor, Proceedings of the International Conference on Emerging Trends in Information and Communication Security (ETRICS), LNCS 3995, pages 238-253. Springer-Verlag, 2006.
    • (2006) LNCS , vol.3995 , pp. 238-253
    • Hatebur, D.1    Heisel, M.2    Schmidt, H.3
  • 5
    • 34548181856 scopus 로고    scopus 로고
    • D. Hatebur, M. Heisel, and H. Schmidt. A pattern system for security requirements engineering. In Proceedings of the International Conference on Availability, Reliability and Security (AReS), IEEE Transactions, pages 356-365. IEEE, 2007.
    • D. Hatebur, M. Heisel, and H. Schmidt. A pattern system for security requirements engineering. In Proceedings of the International Conference on Availability, Reliability and Security (AReS), IEEE Transactions, pages 356-365. IEEE, 2007.
  • 7
    • 0029191909 scopus 로고
    • Deriving specifications from requirements: An example
    • Seattle, USA, ACM Press
    • M. Jackson and P. Zave. Deriving specifications from requirements: an example. In Proceedings 17th Int. Conf. on Software Engineering, Seattle, USA, pages 15-24. ACM Press, 1995.
    • (1995) Proceedings 17th Int. Conf. on Software Engineering , pp. 15-24
    • Jackson, M.1    Zave, P.2
  • 9
    • 84944683046 scopus 로고    scopus 로고
    • Security-critical system development with extended use cases
    • G. Popp, J. Jürjens, G. Wimmel, and R. Breu. Security-critical system development with extended use cases. In APSEC, pages 478-487, 2003.
    • (2003) APSEC , pp. 478-487
    • Popp, G.1    Jürjens, J.2    Wimmel, G.3    Breu, R.4
  • 10
    • 84947731536 scopus 로고    scopus 로고
    • Preserving software quality characteristics from requirements analysis to architectural design
    • Springer Berlin, Heidelberg
    • H. Schmidt and I. Wentzlaff. Preserving software quality characteristics from requirements analysis to architectural design. In Proceedings of the European Workshop on Software Architectures (EWSA), volume 4344/2006, pages 189-203. Springer Berlin / Heidelberg, 2006.
    • (2006) Proceedings of the European Workshop on Software Architectures (EWSA) , vol.4344 , pp. 189-203
    • Schmidt, H.1    Wentzlaff, I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.