메뉴 건너뛰기




Volumn , Issue , 2008, Pages 235-238

The security requirements behavior model for trustworthy software

Author keywords

[No Author keywords available]

Indexed keywords

BEHAVIOR MODELING; COMPUTER SECURITY; CYBER SPACES; FORMAL SECURITY; OPERATIONAL MODELING; SECURITY REQUIREMENTS; SERVICE PROVIDERS; SERVICE USERS; TEST-CASE GENERATION; TRUSTWORTHY WEB SERVICES; USE CASES; WEB APPLICATIONS; WEB SERVICES SECURITY;

EID: 50249179575     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MCETECH.2008.19     Document Type: Conference Paper
Times cited : (5)

References (6)
  • 1
    • 50249089382 scopus 로고    scopus 로고
    • Scenario Plus, Use Case Toolkit: Misuse Cases (available at scenarioplus.org.uk/misuse cases.html)
    • Scenario Plus, Use Case Toolkit: Misuse Cases (available at scenarioplus.org.uk/misuse cases.html)
  • 2
    • 2942713443 scopus 로고    scopus 로고
    • Security Use Cases
    • May-June
    • D. Firesmith, "Security Use Cases", Journal of Object Technology, Vol. 2, No. 3, May-June 2003, pp. 54, 57.
    • (2003) Journal of Object Technology , vol.2 , Issue.3
    • Firesmith, D.1
  • 5
    • 2942757657 scopus 로고    scopus 로고
    • Engineering Security Requirements
    • Jan-Feb
    • D. Firesmith, "Engineering Security Requirements", Journal of Object Technology, Vol. 2, No. 1, Jan-Feb 2003, pp. 53-68.
    • (2003) Journal of Object Technology , vol.2 , Issue.1 , pp. 53-68
    • Firesmith, D.1
  • 6
    • 0034497420 scopus 로고    scopus 로고
    • Eliciting security requirements by misuse cases
    • 20-23 November
    • G. Sindre and A. Opdahl, "Eliciting security requirements by misuse cases", Proc. TOOLS Pacific 2000, pp 120-131, 20-23 November 2000.
    • (2000) Proc. TOOLS Pacific 2000 , pp. 120-131
    • Sindre, G.1    Opdahl, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.