메뉴 건너뛰기




Volumn , Issue , 2008, Pages 121-130

Executable misuse cases for modeling security concerns

Author keywords

Early aspects; Misuse cases; Scenarios

Indexed keywords

ASPECT-ORIENTED MODELING; CORE SYSTEMS; EARLY ASPECTS; MISUSE CASES; MODELING LANGUAGES; MODELING TOOLS; POTENTIAL ATTACKS; REALISTIC SYSTEMS; SCENARIOS; SECURITY MECHANISMS; SECURITY REQUIREMENTS; USE CASE MODELS; ASPECT ORIENTED MODELING; MISUSE CASE; MODELING TOOL; POTENTIAL ATTACK; SECURITY MECHANISM; USE CASE MODEL;

EID: 57349132966     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1368088.1368106     Document Type: Conference Paper
Times cited : (52)

References (32)
  • 1
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases: Use cases with hostile intent
    • Jan./Feb
    • I. Alexander, "Misuse cases: use cases with hostile intent," IEEE Software, vol. 20, pp. 58-66, Jan./Feb. 2003.
    • (2003) IEEE Software , vol.20 , pp. 58-66
    • Alexander, I.1
  • 2
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Jan
    • G. Sindre and A. Opdahl, "Eliciting security requirements with misuse cases," Requirements Engineering, vol. 10, pp. 34-44, Jan. 2005.
    • (2005) Requirements Engineering , vol.10 , pp. 34-44
    • Sindre, G.1    Opdahl, A.2
  • 3
    • 84948950071 scopus 로고    scopus 로고
    • Initial Industrial Experience of Misuse Cases in Trade-off Analysis
    • Essen, Germany: IEEE Computer Society, pp
    • I. Alexander, "Initial Industrial Experience of Misuse Cases in Trade-off Analysis," in International Conference on Requirements Engineering Essen, Germany: IEEE Computer Society, pp. 61-70.
    • International Conference on Requirements Engineering , pp. 61-70
    • Alexander, I.1
  • 4
    • 33745644756 scopus 로고    scopus 로고
    • J. Whittle, Specifying Precise Use Cases with Use Case Charts, in Mo DELS Satellite Events (Revised Selected Papers). 3844, J.-M. Bruel, Ed. Montego Bay, Jamaica: Springer-Verlag, pp. 290-301.
    • J. Whittle, "Specifying Precise Use Cases with Use Case Charts," in Mo DELS Satellite Events (Revised Selected Papers). vol. 3844, J.-M. Bruel, Ed. Montego Bay, Jamaica: Springer-Verlag, pp. 290-301.
  • 5
    • 37249051467 scopus 로고    scopus 로고
    • Precise Specification of Use Case Scenarios
    • Braga, Portugal: Springer
    • J. Whittle, "Precise Specification of Use Case Scenarios," in Fundamental Approaches to Software Engineering (FASE07). vol. LNCS 4422 Braga, Portugal: Springer, 2007, pp. 170-184.
    • (2007) Fundamental Approaches to Software Engineering (FASE07) , vol.LNCS 4422 , pp. 170-184
    • Whittle, J.1
  • 13
    • 57349173250 scopus 로고    scopus 로고
    • OMG, Unified Modeling Language 2.1.1 Specification (05-07-04), http://www.omg.org, Specification 2007.
    • OMG, "Unified Modeling Language 2.1.1 Specification (05-07-04)," http://www.omg.org, Specification 2007.
  • 18
    • 57349196057 scopus 로고    scopus 로고
    • Information Assurance Technical Framework IATF, Release 3.1, Information Assurance Solutions, US National Security Agency, Fort Meade, MD Sep. 2002
    • "Information Assurance Technical Framework (IATF), Release 3.1," Information Assurance Solutions, US National Security Agency, Fort Meade, MD Sep. 2002.
  • 30
    • 57349167744 scopus 로고    scopus 로고
    • B. Schneier, Modeling Security Threats, in Dr. Dobb's Journal, 1999.
    • B. Schneier, "Modeling Security Threats," in Dr. Dobb's Journal, 1999.
  • 31
    • 34247543966 scopus 로고    scopus 로고
    • D. K. Kim, A Pattern-Based Technique for Developing UML Models of Access Control Systems, in 30th Annual International Computer Software and Applications Conference (COMPSAC) Chicago, IL, 2006, pp. 317-324
    • D. K. Kim, "A Pattern-Based Technique for Developing UML Models of Access Control Systems," in 30th Annual International Computer Software and Applications Conference (COMPSAC) Chicago, IL, 2006, pp. 317-324.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.