메뉴 건너뛰기




Volumn , Issue , 2007, Pages

S2D-ProM: A strategy oriented process model for secure software development

Author keywords

Component secure software development; Strategic process model; Tactical guidance; Trategic guidance

Indexed keywords

PROCESS MONITORING; SOFTWARE DESIGN; SOFTWARE ENGINEERING; STRATEGIC PLANNING;

EID: 47849113405     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSEA.2007.59     Document Type: Conference Paper
Times cited : (19)

References (34)
  • 1
    • 47849118281 scopus 로고    scopus 로고
    • Common Criteria for Information Technology Security Evaluation ISO 15408, Part 3: Security assurance requirements, version 2.1D
    • "Common Criteria for Information Technology Security Evaluation (ISO 15408) - Part 3: Security assurance requirements - version 2.1D."
  • 2
    • 22944433043 scopus 로고    scopus 로고
    • Improving Security Across The Software Development Life Cycle
    • Task Force Report, April 1
    • "Improving Security Across The Software Development Life Cycle," Task Force Report, April 1, 2004.
    • (2004)
  • 5
    • 40249101754 scopus 로고    scopus 로고
    • The Security of Applications: Not AU Are Created Equal,
    • ©Stake, February 2002, pp
    • A. Jaquith, "The Security of Applications: Not AU Are Created Equal," Research Report, ©Stake, February 2002, pp. 1-12.
    • Research Report , pp. 1-12
    • Jaquith, A.1
  • 6
    • 1542292544 scopus 로고    scopus 로고
    • Why Software Is so Bad
    • July/August
    • C. Mann, "Why Software Is so Bad," Technology Review, July/August 2002.
    • (2002) Technology Review
    • Mann, C.1
  • 10
    • 3042647673 scopus 로고    scopus 로고
    • Misuse and Abuse Cases: Getting Past the Positive
    • published by The, May/June
    • G. McGraw, "Misuse and Abuse Cases: Getting Past the Positive," published by The IEEE Computer Society, IEEE Security & Privacy, May/June 2004.
    • (2004) IEEE Computer Society, IEEE Security & Privacy
    • McGraw, G.1
  • 12
    • 0032051310 scopus 로고    scopus 로고
    • Testing for Security During Development: Why We Should Scrap Penetrate-and-Patch
    • G., McGraw, "Testing for Security During Development: Why We Should Scrap Penetrate-and-Patch," IEEE Aerospace and Electronic Systems, vol. 13, no. 4, 1998, pp.13-15.
    • (1998) IEEE Aerospace and Electronic Systems , vol.13 , Issue.4 , pp. 13-15
    • McGraw, G.1
  • 13
    • 33748046212 scopus 로고    scopus 로고
    • Integrating a Security Requirement Language with UML
    • In the Proc. of the Seventh International Conference on UML Modeling Languages and Applications, Lisbon, Portugal, October
    • H. Abie, D. Aredo, T. Kristoffersen, S. Mazaher, T. Raguin, "Integrating a Security Requirement Language with UML," In the Proc. of the Seventh International Conference on UML Modeling Languages and Applications, LNCS 3273, Lisbon, Portugal, October 2004, pp. 350-364.
    • (2004) LNCS , vol.3273 , pp. 350-364
    • Abie, H.1    Aredo, D.2    Kristoffersen, T.3    Mazaher, S.4    Raguin, T.5
  • 15
    • 0038349200 scopus 로고    scopus 로고
    • MOPS: An Infrastructure for Examining Security Properties of Software
    • ACM, USA, November
    • H. Chen, D. Wagner, "MOPS: An Infrastructure for Examining Security Properties of Software," CCS'02, ACM, USA, November 2002.
    • (2002) CCS'02
    • Chen, H.1    Wagner, D.2
  • 28
    • 33746974440 scopus 로고    scopus 로고
    • The verified software challenge: A call for a holistic approach to reliability
    • October
    • T. Ball, "The verified software challenge: A call for a holistic approach to reliability," In Verified Software: Theories, Tools, Experiments, October 2005.
    • (2005) Verified Software: Theories, Tools, Experiments
    • Ball, T.1
  • 30
    • 47849083057 scopus 로고
    • Penetration Testing in Information Security Essays
    • M. D. Abrams, S. Jajodia and H. Podell, Editors
    • Weissman, C, "Penetration Testing in Information Security Essays", M. D. Abrams, S. Jajodia and H. Podell, Editors, IEEE Computer Society Press. 1994.
    • (1994) IEEE Computer Society Press
    • Weissman, C.1
  • 31
    • 17444368337 scopus 로고    scopus 로고
    • Barnum, S., McGraw, G., Knowledge for software security, Security & Privacy Magazine, IEEE, 3, Issue 2, pages 74-78, ISSN 1540-7993, March-April 2005.
    • Barnum, S., McGraw, G., "Knowledge for software security, Security & Privacy Magazine", IEEE, Volume 3, Issue 2, pages 74-78, ISSN 1540-7993, March-April 2005.
  • 32
    • 47849098100 scopus 로고    scopus 로고
    • Schneider, T., Secure Software Engineering Processes: Improving the Software Development Life Cycle to Combat Vulnerability, SQP 9, NO. 1, 2006, http://www.asq.org
    • Schneider, T., "Secure Software Engineering Processes: Improving the Software Development Life Cycle to Combat Vulnerability", SQP VOL. 9, NO. 1, 2006, http://www.asq.org
  • 33
    • 47849115981 scopus 로고    scopus 로고
    • M. Essafi, H. Ben Ghezala, Towards a Comprehensive View of Secure Software Engineering, submitted to the First International Workshop on Requirements, Intentions and Goals in Conceptual Modeling (RIGiM), Auckland, New Zealand, 5-7 November 2007, unpublished.
    • M. Essafi, H. Ben Ghezala, "Towards a Comprehensive View of Secure Software Engineering," submitted to the First International Workshop on Requirements, Intentions and Goals in Conceptual Modeling (RIGiM), Auckland, New Zealand, 5-7 November 2007, unpublished.
  • 34
    • 47849098378 scopus 로고    scopus 로고
    • G. McGraw, Software Security: Building Security In, Addison-Wesley, ISBN: 978-0-321-35670-3, 410 pages, 22/02/2006.
    • G. McGraw, Software Security: Building Security In, Addison-Wesley, ISBN: 978-0-321-35670-3, 410 pages, 22/02/2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.