메뉴 건너뛰기




Volumn , Issue , 2008, Pages 461-465

Catalog of metrics for assessing security risks of software throughout the software development life cycle

Author keywords

Design for security; Security metrics; Software development lifecycle; Software security

Indexed keywords

INFORMATION SERVICES; OCCUPATIONAL RISKS; PROCESS ENGINEERING; PROJECT MANAGEMENT; RISK ASSESSMENT; SOFTWARE DESIGN; SOFTWARE ENGINEERING;

EID: 51349102117     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISA.2008.104     Document Type: Conference Paper
Times cited : (18)

References (16)
  • 5
    • 0346236349 scopus 로고    scopus 로고
    • Art and Science Addison-Wesley
    • M. Bishop, Computer Security: Art and Science (Addison-Wesley, 2002).
    • (2002) Computer Security
    • Bishop, M.1
  • 6
    • 51349101414 scopus 로고    scopus 로고
    • G. McGraw, Software Security: Building Security In (Addison-Wesley, 2006).
    • G. McGraw, Software Security: Building Security In (Addison-Wesley, 2006).
  • 8
    • 24944573251 scopus 로고    scopus 로고
    • Security Metrics Guide for Information Technology Systems
    • National Institute of Standards and Technology
    • M. Swanson, N. Bartol, J. Sabato, J. Hash, and L. Graffo, Security Metrics Guide for Information Technology Systems, NIST Special Publication 800-55, National Institute of Standards and Technology, 2003.
    • (2003) NIST Special Publication 800-55
    • Swanson, M.1    Bartol, N.2    Sabato, J.3    Hash, J.4    Graffo, L.5
  • 9
    • 85055233328 scopus 로고    scopus 로고
    • Software Engineering Measurement Auerbach Publications
    • J. C. Munson, Software Engineering Measurement (Auerbach Publications, 2003).
    • (2003)
    • Munson, J.C.1
  • 14
    • 0003219646 scopus 로고
    • Goal Question Metric Paradigm
    • J. J. Marciniak ed, New York: John Wiley & Sons
    • V. R. Basili, G. Caldiera and H. D. Rombach, Goal Question Metric Paradigm, In J. J. Marciniak (ed.), Encyclopedia of Software Engineering 1, New York: John Wiley & Sons, 1994, 528-532.
    • (1994) Encyclopedia of Software Engineering , vol.1 , pp. 528-532
    • Basili, V.R.1    Caldiera, G.2    Rombach, H.D.3
  • 16
    • 51349168805 scopus 로고    scopus 로고
    • C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole, Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade, In Proc. of the DARPA Information Survivability Conference and Exposition, 1999, 119-129.
    • C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole, Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade, In Proc. of the DARPA Information Survivability Conference and Exposition, 1999, 119-129.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.