메뉴 건너뛰기




Volumn 5074 LNCS, Issue , 2008, Pages 541-555

Adapting secure tropos for security risk management in the early phases of information systems development

Author keywords

Information system; Risk management; Secure Tropos; Security

Indexed keywords

ADMINISTRATIVE DATA PROCESSING; FINANCE; FINANCIAL DATA PROCESSING; HEALTH; INDUSTRIAL ENGINEERING; INFORMATION SCIENCE; INFORMATION SYSTEMS; INSURANCE; LINGUISTICS; MANAGEMENT; MANAGEMENT INFORMATION SYSTEMS; MODAL ANALYSIS; QUERY LANGUAGES; RISK ANALYSIS; RISK ASSESSMENT; RISK MANAGEMENT; RISKS; STANDARDS; SYSTEMS ENGINEERING; TERMINOLOGY;

EID: 45849134150     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-69534-9_40     Document Type: Conference Paper
Times cited : (63)

References (29)
  • 2
    • 45849122825 scopus 로고    scopus 로고
    • United States Senate and House of Representatives in Congress: Sarbanes-Oxley Act of 2002. Public Law 107-204 (116 Statute 745) (2002)
    • United States Senate and House of Representatives in Congress: Sarbanes-Oxley Act of 2002. Public Law 107-204 (116 Statute 745) (2002)
  • 13
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting Security Requirements with Misuse Cases
    • Sindre, G., Opdahl, A.L.: Eliciting Security Requirements with Misuse Cases. Requirements Engineering Journal 10(1), 34-44 (2005)
    • (2005) Requirements Engineering Journal , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 14
    • 38149121542 scopus 로고    scopus 로고
    • Mal-activity Diagrams for Capturing Attacks on Business Processes
    • Sawyer, P, Paech, B, Heymans, P, eds, REFSQ 2007, Springer, Heidelberg
    • Sindre, G.: Mal-activity Diagrams for Capturing Attacks on Business Processes. In: Sawyer, P., Paech, B., Heymans, P. (eds.) REFSQ 2007. LNCS, vol. 4542, pp. 355-366. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4542 , pp. 355-366
    • Sindre, G.1
  • 15
    • 79955143136 scopus 로고    scopus 로고
    • Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-based Modeling Language for Model-driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, 2460, pp. 426-441. Springer, Heidelberg (2002)
    • Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-based Modeling Language for Model-driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426-441. Springer, Heidelberg (2002)
  • 16
    • 79955163100 scopus 로고    scopus 로고
    • Jurjens, J.: UMLsec: Extending UML for Secure Systems Development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, 2460, pp. 412-425. Springer, Heidelberg (2002)
    • Jurjens, J.: UMLsec: Extending UML for Secure Systems Development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412-425. Springer, Heidelberg (2002)
  • 17
    • 45849106846 scopus 로고    scopus 로고
    • Elahi, G., Yu, E.: A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. LNCS, 4801, pp. 87-101. Springer, Heidelberg (2007)
    • Elahi, G., Yu, E.: A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. LNCS, vol. 4801, pp. 87-101. Springer, Heidelberg (2007)
  • 18
    • 4544255381 scopus 로고    scopus 로고
    • Elaborating Security Requirements by Construction of Intentional Anti-models
    • IEEE Computer Society, Los Alamitos
    • van Lamsweerde, A.: Elaborating Security Requirements by Construction of Intentional Anti-models. In: Proceedings of the 26th International Conference on Software Engineering (ICSE 2004), pp. 148-157. IEEE Computer Society, Los Alamitos (2004)
    • (2004) Proceedings of the 26th International Conference on Software Engineering (ICSE , pp. 148-157
    • van Lamsweerde, A.1
  • 20
    • 24944578244 scopus 로고    scopus 로고
    • Modelling social and individual trust in requirements engineering methodologies
    • Proceedings of the 3nd International Conference on Trust Management, Springer, Heidelberg
    • Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modelling social and individual trust in requirements engineering methodologies. In: Proceedings of the 3nd International Conference on Trust Management. LNCS, pp. 161-176. Springer, Heidelberg (2005)
    • (2005) LNCS , pp. 161-176
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 21
    • 33746038490 scopus 로고    scopus 로고
    • Mouratidis, H., Jurjens, J., Fox, J.: Towards a Comprehensive Framework for Secure Systems Development. In: Dubois, E., Pohl, K. (eds.) CAiSE 2006. LNCS, 4001, pp. 48-62. Springer, Heidelberg (2006)
    • Mouratidis, H., Jurjens, J., Fox, J.: Towards a Comprehensive Framework for Secure Systems Development. In: Dubois, E., Pohl, K. (eds.) CAiSE 2006. LNCS, vol. 4001, pp. 48-62. Springer, Heidelberg (2006)
  • 23
    • 0036721855 scopus 로고    scopus 로고
    • Towards Requirements-Driven Information Systems Engineering: The TROPOS Project
    • Castro, J., Kolp, M., Mylopoulos, J.: Towards Requirements-Driven Information Systems Engineering: The TROPOS Project. Information Systems 27, 365-389 (2002)
    • (2002) Information Systems , vol.27 , pp. 365-389
    • Castro, J.1    Kolp, M.2    Mylopoulos, J.3
  • 24
    • 23944475544 scopus 로고    scopus 로고
    • When Security Meets Software Engineering: A Case of Modelling Secure Information Systems
    • Mouratidis, H., Giorgini, P., Manson, G.A.: When Security Meets Software Engineering: a Case of Modelling Secure Information Systems. Information Systems 30(8), 609-629 (2005)
    • (2005) Information Systems , vol.30 , Issue.8 , pp. 609-629
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.A.3
  • 25
    • 35048845022 scopus 로고    scopus 로고
    • Mouratidis, H., Giorgini, P., Manson, G.: Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, 2681, pp. 63-78. Springer, Heidelberg (2003)
    • Mouratidis, H., Giorgini, P., Manson, G.: Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol. 2681, pp. 63-78. Springer, Heidelberg (2003)
  • 27
    • 84990316932 scopus 로고    scopus 로고
    • A Novel Agent-Based System to Support the Single Assessment Process of Older People
    • Mouratidis, H., Philp, I., Manson, G.: A Novel Agent-Based System to Support the Single Assessment Process of Older People. Journal of Health Informatics 9(3), 149-162 (2003)
    • (2003) Journal of Health Informatics , vol.9 , Issue.3 , pp. 149-162
    • Mouratidis, H.1    Philp, I.2    Manson, G.3
  • 29
    • 0034291619 scopus 로고    scopus 로고
    • Handling Obstacles in Goal-oriented Requirements Engineering
    • van Lamsweerde, A., Letier, E.: Handling Obstacles in Goal-oriented Requirements Engineering. Transactions on Software Engineering 26(10), 978-1005 (2000)
    • (2000) Transactions on Software Engineering , vol.26 , Issue.10 , pp. 978-1005
    • van Lamsweerde, A.1    Letier, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.