메뉴 건너뛰기




Volumn , Issue , 2007, Pages 231-240

Discovering and understanding multi-dimensional correlations among certification requirements with application to risk assessment

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE; CORRELATION METHODS; REQUIREMENTS ENGINEERING; RISK MANAGEMENT;

EID: 47949111490     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RE.2007.21     Document Type: Conference Paper
Times cited : (13)

References (51)
  • 2
    • 0037240812 scopus 로고    scopus 로고
    • Misuse Cases: Use Cases with Hostile Intent
    • Jan/Feb
    • Alexander, I. "Misuse Cases: Use Cases with Hostile Intent." IEEE Software, 20(1), Jan/Feb 2003, pp: 58-66.
    • (2003) IEEE Software , vol.20 , Issue.1 , pp. 58-66
    • Alexander, I.1
  • 3
    • 0024031604 scopus 로고
    • The TAME project: Towards improvement-oriented software environments
    • Basili V.R., Rombach H.D., "The TAME project: Towards improvement-oriented software environments," IEEE Transactions on Software Engineering, 14(6), 1988, pp: 758-773.
    • (1988) IEEE Transactions on Software Engineering , vol.14 , Issue.6 , pp. 758-773
    • Basili, V.R.1    Rombach, H.D.2
  • 4
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • Baskerville, R., "Information systems security design methods: implications for information systems development," ACM Computing Surveys, 25(4), 1993, pp: 375-414.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 5
    • 0030125127 scopus 로고    scopus 로고
    • On the Relative Expressiveness of Description Logics and Predicate Logics
    • AI, 821-2
    • Borgida, A. "On the Relative Expressiveness of Description Logics and Predicate Logics," AI, 82(1-2), 1996, pp: 353-367.
    • (1996) , pp. 353-367
    • Borgida, A.1
  • 8
    • 47949117628 scopus 로고    scopus 로고
    • Common Criteria, v2.1. ISO/IEC 15408-1, 1999.
    • Common Criteria, v2.1. ISO/IEC 15408-1, 1999.
  • 10
    • 47949087899 scopus 로고    scopus 로고
    • DoD 8510.1-M: DITSCAP Application Manual. 2000.
    • DoD 8510.1-M: DITSCAP Application Manual. 2000.
  • 11
    • 47949093812 scopus 로고    scopus 로고
    • DoD Instruction 5200.40: DITSCAP, 1997.
    • DoD Instruction 5200.40: DITSCAP, 1997.
  • 12
    • 47949092277 scopus 로고    scopus 로고
    • DoDI 8500.2. IA Implementation. Feb 2003.
    • DoDI 8500.2. IA Implementation. Feb 2003.
  • 13
    • 31044434638 scopus 로고    scopus 로고
    • A practical framework for eliciting and modeling system dependability requirements
    • Donzelli, P. Basili, V., "A practical framework for eliciting and modeling system dependability requirements," Journal of Systems and Software, 79(1), 2006, pp:107-119.
    • (2006) Journal of Systems and Software , vol.79 , Issue.1 , pp. 107-119
    • Donzelli, P.1    Basili, V.2
  • 14
    • 0003078938 scopus 로고
    • Contextual implications between attributes and some representational properties for finite lattices
    • B.I. Wissenschaftsverlag
    • Duquenne, V. "Contextual implications between attributes and some representational properties for finite lattices" Beitrage zur Begrisanalyse, B.I. Wissenschaftsverlag, 1987, pp: 213-239
    • (1987) Beitrage zur Begrisanalyse , pp. 213-239
    • Duquenne, V.1
  • 15
    • 84954120530 scopus 로고
    • Domain modelling with hierarchies of alternative viewpoints
    • Easterbrook, S., "Domain modelling with hierarchies of alternative viewpoints", In Proc. Int'l Sym. on RE., 1993, pp: 65-72.
    • (1993) Proc. Int'l Sym. on RE , pp. 65-72
    • Easterbrook, S.1
  • 16
    • 47949105259 scopus 로고    scopus 로고
    • th annual Global Information Security Survey, Netherland, 2005.
    • th annual Global Information Security Survey, Netherland, 2005.
  • 17
    • 7744242790 scopus 로고    scopus 로고
    • Quantitative risk-based requirements reasoning
    • Feather, M. S., Cornford, S.L., "Quantitative risk-based requirements reasoning," RE Journal, Vol. 8(4), 2003, pp: 248-265.
    • (2003) RE Journal , vol.8 , Issue.4 , pp. 248-265
    • Feather, M.S.1    Cornford, S.L.2
  • 20
    • 0035418268 scopus 로고    scopus 로고
    • Defining and applying measures of distance between specifications
    • Jilani, L.L., et al., "Defining and applying measures of distance between specifications," IEEE TSE, 27(8), 2001, pp.673-703.
    • (2001) IEEE TSE , vol.27 , Issue.8 , pp. 673-703
    • Jilani, L.L.1
  • 21
    • 47949114956 scopus 로고    scopus 로고
    • Johansson E, Johnson P. Assessment of Enterprise Information Security - Estimating the Credibility of the Results, In Proc. Sym. on RE for Info. Security (SREIS 05) at RE 05, 2005.
    • Johansson E, Johnson P. "Assessment of Enterprise Information Security - Estimating the Credibility of the Results," In Proc. Sym. on RE for Info. Security (SREIS 05) at RE 05, 2005.
  • 23
  • 24
    • 47949102913 scopus 로고    scopus 로고
    • Lee, S.W., Gandhi, R.A. et al, Security Requirements Driven Risk Assessment for Critical Infrastructure Information Systems, In Proc. Sym. on RE for Info. Security (SREIS 05) at RE 05, 2005.
    • Lee, S.W., Gandhi, R.A. et al, "Security Requirements Driven Risk Assessment for Critical Infrastructure Information Systems", In Proc. Sym. on RE for Info. Security (SREIS 05) at RE 05, 2005.
  • 28
    • 34247487097 scopus 로고    scopus 로고
    • Certification Process Artifacts Defined as Measurable Units for Software Assurance
    • Lee, S.W., Gandhi, R.A., Ahn, G.J., "Certification Process Artifacts Defined as Measurable Units for Software Assurance" Soft. Process: Improvement and Practice, Vol. 12(2), 2007, pp. 165-189.
    • (2007) Soft. Process: Improvement and Practice , vol.12 , Issue.2 , pp. 165-189
    • Lee, S.W.1    Gandhi, R.A.2    Ahn, G.J.3
  • 29
    • 33845292826 scopus 로고    scopus 로고
    • Building decision support problem domain ontology from natural language requirements for software assurance
    • Dec
    • Lee, S.W., Muthurajan, D., Gandhi, R.A., et al., "Building decision support problem domain ontology from natural language requirements for software assurance," Int'l Journal on Software Engg. and Knowledge Engg., 16(6), Dec. 2006, pp: 851-884.
    • (2006) Int'l Journal on Software Engg. and Knowledge Engg , vol.16 , Issue.6 , pp. 851-884
    • Lee, S.W.1    Muthurajan, D.2    Gandhi, R.A.3
  • 30
    • 24944496493 scopus 로고    scopus 로고
    • Missing Requirements and Relationship Discovery through Proxy Viewpoints Model
    • Lee, S.W., Rine, D.C. "Missing Requirements and Relationship Discovery through Proxy Viewpoints Model," Studia Informatica Universalis: Int'l Journal on Informatics, 3(3), 2004 pp. 315-342.
    • (2004) Studia Informatica Universalis: Int'l Journal on Informatics , vol.3 , Issue.3 , pp. 315-342
    • Lee, S.W.1    Rine, D.C.2
  • 34
    • 47949125459 scopus 로고    scopus 로고
    • Mead, N. R., Hough, E., Stehney, T., Security Quality Requirements Engineering (SQUARE) Methodology, Technical Report (CMU/SEI-2005-TR-009), SEI, CMU, Pittsburgh, PA 2005
    • Mead, N. R., Hough, E., Stehney, T., "Security Quality Requirements Engineering (SQUARE) Methodology," Technical Report (CMU/SEI-2005-TR-009), SEI, CMU, Pittsburgh, PA 2005
  • 35
    • 47949119764 scopus 로고    scopus 로고
    • Moffett, J.D., Haley, C.B., Nuseibeh, B.A, Core Security Requirements Artefacts, TR 2004/23, Open University, June 2004.
    • Moffett, J.D., Haley, C.B., Nuseibeh, B.A, "Core Security Requirements Artefacts," TR 2004/23, Open University, June 2004.
  • 36
    • 47949128365 scopus 로고    scopus 로고
    • OCTAVE™ Criteria v2.0, CMU/SEI-2001-TR-016, 2001.
    • OCTAVE™ Criteria v2.0, CMU/SEI-2001-TR-016, 2001.
  • 37
    • 4444245089 scopus 로고    scopus 로고
    • The Common Criteria Evaluation Process
    • James Madison Univ
    • Prieto-Diaz, R., "The Common Criteria Evaluation Process," CISC-TR-2002-003, James Madison Univ., 2002.
    • (2002) CISC-TR-2002-003
    • Prieto-Diaz, R.1
  • 41
    • 0034497420 scopus 로고    scopus 로고
    • Sindre, G., Opdahl, A., Eliciting Security Requirements by Misuse Cases, In Proc. of TOOLS Pacific, 2000, pp: 120-130.
    • Sindre, G., Opdahl, A., "Eliciting Security Requirements by Misuse Cases," In Proc. of TOOLS Pacific, 2000, pp: 120-130.
  • 44
    • 47949123914 scopus 로고    scopus 로고
    • Agencies Need to Implement Consistent Processes in Authorizing Systems for Operation,
    • 04-376, 2004
    • US GAO Report, "Agencies Need to Implement Consistent Processes in Authorizing Systems for Operation," 04-376, 2004.
    • US GAO Report
  • 45
    • 47949133307 scopus 로고    scopus 로고
    • Department of Homeland Security Needs to Fully Implement its Security Program, 05-700
    • US GAO Report, "Department of Homeland Security Needs to Fully Implement its Security Program," 05-700, 2005.
    • (2005) US GAO Report
  • 46
    • 4544255381 scopus 로고    scopus 로고
    • Elaborating Security Requirements by Construction of Intentional Anti-Models
    • van Lamsweerde, A., "Elaborating Security Requirements by Construction of Intentional Anti-Models," In Proc. 26th Int'l Conf. on Software Engg., 2004, pp: 148-157.
    • (2004) Proc. 26th Int'l Conf. on Software Engg , pp. 148-157
    • van Lamsweerde, A.1
  • 48
    • 0032639499 scopus 로고    scopus 로고
    • Certifying software for high-assurance environments
    • Jul/Aug
    • Voas, J., "Certifying software for high-assurance environments," IEEE Software, 16(4), Jul/Aug 1999, pp: 48-54.
    • (1999) IEEE Software , vol.16 , Issue.4 , pp. 48-54
    • Voas, J.1
  • 49
    • 34748829296 scopus 로고    scopus 로고
    • A Case Study in Systematic Improvement of Language for Requirements
    • th Int'l RE Conf., 2006, pp: 6-15.
    • (2006) th Int'l RE Conf , pp. 6-15
    • Wasson, K.S.1
  • 50
    • 84860994379 scopus 로고    scopus 로고
    • Conceptual Graphs and Formal Concept Analysis
    • Wille, R., "Conceptual Graphs and Formal Concept Analysis," Int'l Conf. on Conceptual Structures, 1997, pp: 290-303.
    • (1997) Int'l Conf. on Conceptual Structures , pp. 290-303
    • Wille, R.1
  • 51
    • 47949084729 scopus 로고    scopus 로고
    • Risk Modelling and Reasoning in Goal Models
    • Univ. of Trento
    • Yudistira, A., Giorgini, P., Mylopoulos, J., "Risk Modelling and Reasoning in Goal Models," DIT-06-008, Univ. of Trento, 2006.
    • (2006) DIT-06-008
    • Yudistira, A.1    Giorgini, P.2    Mylopoulos, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.