메뉴 건너뛰기




Volumn 5, Issue 2, 2007, Pages 187-198

A survey of modelling and analysis approaches for architecting secure software systems

Author keywords

Aspectoriented; Formal methods; Security; Software architecture; Unified modelling language

Indexed keywords

ASPECT-ORIENTED; AUTOMATED ANALYSIS; COMPARISON CRITERION; DEVELOPMENT COSTS; DEVELOPMENT TIME; MODELLING AND ANALYSIS; POTENTIAL BENEFITS; ROLE-BASED ACCESS CONTROL; SECURE SOFTWARE; SECURE SYSTEM; SECURITY; SECURITY FLAWS; SECURITY PROPERTIES; SOFTWARE ARCHITECTURE DESIGN; SOFTWARE DEVELOPMENT LIFE CYCLE;

EID: 57049186171     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (8)

References (31)
  • 1
    • 0036469431 scopus 로고    scopus 로고
    • Security: Technical, social, and legal challenges
    • Feb
    • B. Arbaugh, "Security: Technical, social, and legal challenges," Computer, vol. 35, issue 2, pp. 109-111, Feb. 2002.
    • (2002) Computer , vol.35 , Issue.2 , pp. 109-111
    • Arbaugh, B.1
  • 7
    • 84874790499 scopus 로고    scopus 로고
    • Computer Emergency Readiness Team Coordination Center (CERT/CC) 2004 E-Crime Watch, available at
    • Computer Emergency Readiness Team Coordination Center (CERT/CC) 2004 E-Crime Watch, available at http://www.cert.org/about/ecrime.html
  • 14
    • 0002008223 scopus 로고
    • An introduction to soft-ware architecture: advances in software engineering and knowledge engineering
    • D. Garlan and M. Shaw, "An introduction to soft-ware architecture: advances in software engineering and knowledge engineering," World Scientific Pub-lishing, vol. 1, pp 1-40, 1993.
    • (1993) World Scientific Pub-lishing , vol.1 , pp. 1-40
    • Garlan, D.1    Shaw, M.2
  • 17
    • 1242320326 scopus 로고    scopus 로고
    • For-mally analyzing software architectural specifications using SAM
    • X. He, H. Yu, T. Shi, J. Ding, and Y. Deng, "For-mally analyzing software architectural specifications using SAM," Journal of Systems and Software, vol. 71, no. 1-2, pp. 11-29, 2004.
    • (2004) Journal of Systems and Software , vol.71 , Issue.1-2 , pp. 11-29
    • He, X.1    Yu, H.2    Shi, T.3    Ding, J.4    Deng, Y.5
  • 18
    • 0032182029 scopus 로고    scopus 로고
    • How to formalize It? Formalization principles for informa-tion system development methods
    • A. H. M. Hofstede, and H. A. Proper, "How to formalize It? Formalization principles for informa-tion system development methods," Information and Software Technology, vol. 40, no. 10, pp. 519-540, 1998.
    • (1998) Information and Software Technology , vol.40 , Issue.10 , pp. 519-540
    • Hofstede, A.H.M.1    Proper, H.A.2
  • 24
    • 0003757663 scopus 로고
    • Domain Names -Concepts and Facilities
    • November
    • P. V. Mockapetris, Domain Names -Concepts and Facilities, IETF STD0013, November, 1987.
    • (1987) IETF STD0013
    • Mockapetris, P.V.1
  • 25
    • 17644404813 scopus 로고    scopus 로고
    • Security check: a formal yet practical framework for secure software architecture
    • A. Ray, "Security check: a formal yet practical framework for secure software architecture," in Pro-ceedings of the 2003 Workshop on New Security Paradigms, pp. 59-65, 2003.
    • (2003) in Pro-ceedings of the 2003 Workshop on New Security Paradigms , pp. 59-65
    • Ray, A.1
  • 27
    • 0016555241 scopus 로고
    • The protection of infor-mation in computer systems
    • J. Saltzer andM. Schroeder, "The protection of infor-mation in computer systems," Proceedings of IEEE, vol. 63, no. 9, pp. 1278-1308, 1975.
    • (1975) Proceedings of IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 29
    • 84874803444 scopus 로고    scopus 로고
    • Software Design Group, the Alloy Analyzer, archived at
    • Software Design Group, the Alloy Analyzer, archived at http://alloy.mit.edu, 2002-2005.
    • (2002)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.