메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1164-1171

Secure software design in practice

Author keywords

[No Author keywords available]

Indexed keywords

DESIGN PHASE; INTERNATIONAL CONFERENCES; LIFE-CYCLE; PRACTICAL TECHNIQUES; SECURE SOFTWARE; TARGET GROUP;

EID: 49049101701     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2008.48     Document Type: Conference Paper
Times cited : (30)

References (40)
  • 1
    • 2342581753 scopus 로고    scopus 로고
    • From the Ground Up: The DIMACS Software Security Workshop
    • G. McGraw, "From the Ground Up: The DIMACS Software Security Workshop" in IEEE Security & Privacy, vol. 1, 2003, pp. 59-66.
    • (2003) IEEE Security & Privacy , vol.1 , pp. 59-66
    • McGraw, G.1
  • 2
    • 0034269416 scopus 로고    scopus 로고
    • Attacking Malicious Code: A Report to the Infosec Research Council
    • G. McGraw and G. Morrisett, "Attacking Malicious Code: A Report to the Infosec Research Council," IEEE Software, vol. 17, pp. 33-41, 2000.
    • (2000) IEEE Software , vol.17 , pp. 33-41
    • McGraw, G.1    Morrisett, G.2
  • 4
    • 3042809894 scopus 로고    scopus 로고
    • Tangible ROI through Secure Software Engineering
    • K. Hoo, A. Saudbury, and A. Jaquith, "Tangible ROI through Secure Software Engineering," Secure Business Quarterly, vol. 1, pp. 1-3, 2001.
    • (2001) Secure Business Quarterly , vol.1 , pp. 1-3
    • Hoo, K.1    Saudbury, A.2    Jaquith, A.3
  • 5
    • 49049091235 scopus 로고    scopus 로고
    • A. Jaquith, The Security of Applications: Not All Are Created Equal, @Stake February 2002.
    • A. Jaquith, "The Security of Applications: Not All Are Created Equal," @Stake February 2002.
  • 8
    • 49049091047 scopus 로고    scopus 로고
    • K. M. Goertzel, T. Winograd, H. L. McKinley, P. Holley, and B. A. Hamilton, Security in the Software Lifecycle, Department of Homeland Security, Version 1.2 August 2006
    • K. M. Goertzel, T. Winograd, H. L. McKinley, P. Holley, and B. A. Hamilton, "Security in the Software Lifecycle," Department of Homeland Security, Version 1.2 August 2006.
  • 11
    • 3042694356 scopus 로고    scopus 로고
    • Processes for Producing Secure Software: Summary of US National Cybersecurity Summit Subgroup Report
    • N. Davis, S. T. Redwine, G. Zibulski, G. McGraw, and W. Humphrey, "Processes for Producing Secure Software: Summary of US National Cybersecurity Summit Subgroup Report," in IEEE Security & Privacy, vol. 2, 2004, pp. 18-25.
    • (2004) IEEE Security & Privacy , vol.2 , pp. 18-25
    • Davis, N.1    Redwine, S.T.2    Zibulski, G.3    McGraw, G.4    Humphrey, W.5
  • 12
    • 49049121125 scopus 로고    scopus 로고
    • Processes to produce Secure Software-Towards more Secure Software
    • National Cyber Security Task Force, March
    • National Cyber Security Task Force, "Processes to produce Secure Software-Towards more Secure Software," National Cyber Security Partnership March 2004.
    • (2004) National Cyber Security Partnership
  • 13
    • 49049092246 scopus 로고    scopus 로고
    • Software Engineering for Secure Software-State of the Art: A Survey
    • September 19th
    • K. R. Jayaram and A. P. Mathur, "Software Engineering for Secure Software-State of the Art: A Survey," CERIAS and SERC SERC-TR-279, September 19th 2005.
    • (2005) CERIAS and SERC SERC-TR-279
    • Jayaram, K.R.1    Mathur, A.P.2
  • 14
    • 19944367288 scopus 로고    scopus 로고
    • Secure information system development - a survey and comparison
    • R. Villarroel, E. Fernández-Medina, and M. Piattini, "Secure information system development - a survey and comparison," Computers & Security, vol. 24, pp. 308-321, 2005.
    • (2005) Computers & Security , vol.24 , pp. 308-321
    • Villarroel, R.1    Fernández-Medina, E.2    Piattini, M.3
  • 18
    • 49049097771 scopus 로고    scopus 로고
    • A UML profile for the identification and analysis of security risks during structured brainstorming
    • May
    • M. S. Lund, F. d. Braber, K. Stølen, and F. Vraalsen, "A UML profile for the identification and analysis of security risks during structured brainstorming," SINTEF ICT STF40 A03067, May 2004,
    • (2004) SINTEF ICT
    • Lund, M.S.1    Braber, F.D.2    Stølen, K.3    Vraalsen, F.4
  • 20
    • 24344438696 scopus 로고    scopus 로고
    • Secure Software Development by Example
    • A. Apvrille and M. Pourzandi, "Secure Software Development by Example," in IEEE Security & Privacy, vol. 3, 2005, pp. 10-17.
    • (2005) IEEE Security & Privacy , vol.3 , pp. 10-17
    • Apvrille, A.1    Pourzandi, M.2
  • 21
    • 49049093094 scopus 로고    scopus 로고
    • Developing Secure Software
    • N. Davis, "Developing Secure Software," The DoD Software Tech News, vol. 8, pp. 3-7, 2005.
    • (2005) The DoD Software Tech News , vol.8 , pp. 3-7
    • Davis, N.1
  • 23
    • 0346236349 scopus 로고    scopus 로고
    • Art and Science: Addison Wesley Professional
    • M. Bishop., Computer Security: Art and Science: Addison Wesley Professional, 2003.
    • (2003) Computer Security
    • Bishop, M.1
  • 26
    • 49049089840 scopus 로고    scopus 로고
    • D. M. Kienzle, M. C. Elder, D. Tyree, and J. Edwards-Hewitt, Security Patterns Repository Version 1.0, 2002
    • D. M. Kienzle, M. C. Elder, D. Tyree, and J. Edwards-Hewitt, "Security Patterns Repository Version 1.0," 2002.
  • 29
    • 49049086154 scopus 로고    scopus 로고
    • B. Blakley, C. Heath, and TheOpenGroup, Security Design Patterns (SDP) technical guide, accessed 1.10.2007, [Online], Ed.: http://www.opengroup.org/security, 2004.
    • B. Blakley, C. Heath, and TheOpenGroup, "Security Design Patterns (SDP) technical guide," vol. accessed 1.10.2007, [Online], Ed.: http://www.opengroup.org/security, 2004.
  • 30
    • 35048840247 scopus 로고    scopus 로고
    • Information Security Antipatterns in Software Requirements Engineering
    • presented at the
    • M. Kis, "Information Security Antipatterns in Software Requirements Engineering," presented at the 9th Conference on Pattern Language of Programs 2002 (PLoP2 2002), 2002.
    • (2002) 9th Conference on Pattern Language of Programs 2002 (PLoP2
    • Kis, M.1
  • 32
    • 0002670359 scopus 로고    scopus 로고
    • Attack Trees - Modeling security threats
    • B. Schneier, "Attack Trees - Modeling security threats," Dr. Dobb's Journal, 2001.
    • (2001) Dr. Dobb's Journal
    • Schneier, B.1
  • 34
    • 49049114810 scopus 로고    scopus 로고
    • B. K. Jayaswal and P. C. Pattern, Design for Trustworthy Software: Tools, Techniques, and Methodology of Developing Robust Software: Prentice Hall 2006.
    • B. K. Jayaswal and P. C. Pattern, Design for Trustworthy Software: Tools, Techniques, and Methodology of Developing Robust Software: Prentice Hall 2006.
  • 38
  • 39
    • 49049090641 scopus 로고    scopus 로고
    • The Science of Software Development
    • S. Campbell, "The Science of Software Development," in The Code Project, 2004.
    • (2004) The Code Project
    • Campbell, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.