메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1172-1179

Covering your assets in software engineering

Author keywords

[No Author keywords available]

Indexed keywords

ENGINEERING PROJECTS; INTERNATIONAL CONFERENCES; SECURITY REQUIREMENTS;

EID: 49049100941     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2008.8     Document Type: Conference Paper
Times cited : (21)

References (16)
  • 1
    • 39449099894 scopus 로고    scopus 로고
    • Security requirements for the rest of us: A survey
    • I. A. Tøndel, M. G. Jaatun, and P.H. Meland, "Security requirements for the rest of us: A survey," IEEE Software, vol. 25, no. 1, 2008.
    • (2008) IEEE Software , vol.25 , Issue.1
    • Tøndel, I.A.1    Jaatun, M.G.2    Meland, P.H.3
  • 2
    • 0002670359 scopus 로고    scopus 로고
    • Attack Trees - Modeling security threats
    • July 2001, Online, Available
    • B. Schneier, "Attack Trees - Modeling security threats," Dr. Dobb's Journal, July 2001. [Online]. Available: http://www.ddj.com/ 184411129
    • Dr. Dobb's Journal
    • Schneier, B.1
  • 3
    • 34547274967 scopus 로고    scopus 로고
    • Secure Software Inc, Secure Software Inc, Online, Available
    • Secure Software Inc. (2005) The CLASP Application Security Process. Secure Software Inc. [Online]. Available: http://www.securesoflware.com/ solulions/clasp.html
    • (2005) The CLASP Application Security Process
  • 4
    • 49049108776 scopus 로고    scopus 로고
    • S. Lipner and M. Howard. (2005) The Trustworthy Computing Security Development Lifecycle. Microsoft. [Online]. Available: http: //msdn2.microsoft.com/en-us/library/ms995349.aspx
    • S. Lipner and M. Howard. (2005) The Trustworthy Computing Security Development Lifecycle. Microsoft. [Online]. Available: http: //msdn2.microsoft.com/en-us/library/ms995349.aspx
  • 5
    • 49049118545 scopus 로고    scopus 로고
    • Security requirements engineering: A framework for representation and analysis, IEEE Transactions on Software Engineering, vol
    • to appear
    • C. B. Haley, R. Laney, J. D. Moffett, and B. Nuseibeh, "Security requirements engineering: A framework for representation and analysis," IEEE Transactions on Software Engineering, vol. (to appear), 2007.
    • (2007)
    • Haley, C.B.1    Laney, R.2    Moffett, J.D.3    Nuseibeh, B.4
  • 8
    • 84931024051 scopus 로고    scopus 로고
    • I. Flechais, C. Mascolo, and M. A. Sasse, Integrating security and usability into the requirements and design process, International Journal of Electronic Security and Digital Forensics, 1, no. 1, pp. 12-26, 2007. [Online]. Available: hllp://inderscience. metapress.com/link.asp? id=j32 v 167864556552
    • I. Flechais, C. Mascolo, and M. A. Sasse, "Integrating security and usability into the requirements and design process," International Journal of Electronic Security and Digital Forensics, vol. 1, no. 1, pp. 12-26, 2007. [Online]. Available: hllp://inderscience. metapress.com/link.asp? id=j32 v 167864556552
  • 9
    • 49049121317 scopus 로고    scopus 로고
    • R. A. Caralli, J. F. Stevens, L. R. Young, and W. R. Wilson, Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process, CMU/SEI, Tech. Rep. CMU/SEI-2007-TR-012, 2007. [Online]. Available: http://www.cert.org/archive/pdf/07tr012.pdf
    • R. A. Caralli, J. F. Stevens, L. R. Young, and W. R. Wilson, "Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process," CMU/SEI, Tech. Rep. CMU/SEI-2007-TR-012, 2007. [Online]. Available: http://www.cert.org/archive/pdf/07tr012.pdf
  • 10
    • 49049085741 scopus 로고    scopus 로고
    • R. A. Caralli, The Critical Success Factor Method: Establishing a Foundation for Enterprise Security Management, CMU/SEI, Tech. Rep. CMU/SEI-2004-TR-010, 2004. [Online]. Available: hllp://www.sei.cmu.edu/ publicalions/documents/04.reports/04tr010.html
    • R. A. Caralli, "The Critical Success Factor Method: Establishing a Foundation for Enterprise Security Management," CMU/SEI, Tech. Rep. CMU/SEI-2004-TR-010, 2004. [Online]. Available: hllp://www.sei.cmu.edu/ publicalions/documents/04.reports/04tr010.html
  • 12
    • 0030148760 scopus 로고    scopus 로고
    • A comparison of two electronic idea generation techniques
    • Online, Available
    • M. Aiken, M. Vanjani, and J. Paolillo, "A comparison of two electronic idea generation techniques," Information & Management, vol. 30, no. 2, pp. 91-99, 1996. [Online]. Available: http://www.sciencedirect.com/science/article/B6VD0-3VVVRD2-5/2/ e3a232f84f07347c8c8bd7ae65314dcf
    • (1996) Information & Management , vol.30 , Issue.2 , pp. 91-99
    • Aiken, M.1    Vanjani, M.2    Paolillo, J.3
  • 13
    • 33748713830 scopus 로고    scopus 로고
    • Brainstorming pitfalls and best practices
    • C. E. Wilson, "Brainstorming pitfalls and best practices," interactions, vol. 13, no. 5, pp. 50-63, 2006.
    • (2006) interactions , vol.13 , Issue.5 , pp. 50-63
    • Wilson, C.E.1
  • 15
    • 49049117634 scopus 로고    scopus 로고
    • SODA - a Security-Oriented Software Development Framework. SINTEF ICT. [Online]. Available: http://www.sintef.no/soda
    • (2007) SODA - a Security-Oriented Software Development Framework. SINTEF ICT. [Online]. Available: http://www.sintef.no/soda


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.