메뉴 건너뛰기




Volumn , Issue , 2008, Pages 328-333

Eliciting security requirements through misuse activities

Author keywords

[No Author keywords available]

Indexed keywords

ACTIVITY DIAGRAMS; ANALYSIS RESULTS; EXTENDED ANALYSES; SECURE SYSTEMS; SECURITY PATTERNS; SECURITY REQUIREMENTS; USE CASES;

EID: 57849125076     PISSN: 15294188     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DEXA.2008.101     Document Type: Conference Paper
Times cited : (56)

References (19)
  • 1
    • 0037240812 scopus 로고    scopus 로고
    • Misuse Cases: Use Cases with Hostile Intent
    • I. Alexander. Misuse Cases: Use Cases with Hostile Intent. IEEE Software, 20(1):58-66, 2003.
    • (2003) IEEE Software , vol.20 , Issue.1 , pp. 58-66
    • Alexander, I.1
  • 3
    • 57849144969 scopus 로고    scopus 로고
    • Full statistics, Jan
    • CERT Coordination Center. Carnegie Mellon University. Full statistics, Jan 2008. http://www.cert.org/stats/fullstats.html.
    • (2008)
  • 4
    • 77950876924 scopus 로고    scopus 로고
    • Insider Threat: Protecting The Enterprise From Sabotage, Spying, And Theft
    • 1 edition
    • E. Cole and S. Ring. Insider Threat: Protecting The Enterprise From Sabotage, Spying, And Theft. Syngress, 1 edition, 2005.
    • (2005) Syngress
    • Cole, E.1    Ring, S.2
  • 5
    • 57849114146 scopus 로고    scopus 로고
    • Microsoft Corporation. Microsoft Threat Analysis and Modeling Tool, Version 2.1, 2006
    • Microsoft Corporation. Microsoft Threat Analysis and Modeling Tool, Version 2.1, 2006.
  • 6
    • 33845264120 scopus 로고    scopus 로고
    • E. B. Fernandez, M. VanHilst, M. M. L. Petrie, and S. Huang. Defining security requirements through misuse actions. In S. F. Ochoa and G.-C. Roman, editors, Advanced Software Engineering: Expanding the Frontiers of Software Technology, 219 of IFIP International Federation for Information Processing, 123-137. Springer Boston, November 2006.
    • E. B. Fernandez, M. VanHilst, M. M. L. Petrie, and S. Huang. Defining security requirements through misuse actions. In S. F. Ochoa and G.-C. Roman, editors, Advanced Software Engineering: Expanding the Frontiers of Software Technology, volume 219 of IFIP International Federation for Information Processing, 123-137. Springer Boston, November 2006.
  • 7
    • 57849088936 scopus 로고    scopus 로고
    • K. M. Goertzel, T. Winograd, H. L. McKinley, and P. Holley. Security in The Software Life Cycle. Technical Report DRAFT Version 1.2, Department of Homeland Security, August 2006
    • K. M. Goertzel, T. Winograd, H. L. McKinley, and P. Holley. Security in The Software Life Cycle. Technical Report DRAFT Version 1.2, Department of Homeland Security, August 2006.
  • 8
    • 0004256091 scopus 로고    scopus 로고
    • John Wiley & Sons, Inc, New York, NY, USA, 2nd edition
    • D. Gollmann. Computer Security. John Wiley & Sons, Inc., New York, NY, USA, 2nd edition, 2006.
    • (2006) Computer Security
    • Gollmann, D.1
  • 9
    • 40449096402 scopus 로고    scopus 로고
    • Security requirements engineering: A framework for representation and analysis
    • C. Haley, R. Laney, J. Moffett, and B. Nuseibeh. Security requirements engineering: A framework for representation and analysis. IEEE Trans. Softw. Eng., 34(1):133-153, 2008.
    • (2008) IEEE Trans. Softw. Eng , vol.34 , Issue.1 , pp. 133-153
    • Haley, C.1    Laney, R.2    Moffett, J.3    Nuseibeh, B.4
  • 12
    • 23944475544 scopus 로고    scopus 로고
    • H. Mouratidis, P. Giorgini, G. Manson. When Security Meets Software Engineering: a Case of Modelling Secure Information Systems. Inf. Syst, Elsevier Science Ltd., Oxford, UK, v. 30, n. 8, p. 609-629, 2005.
    • H. Mouratidis, P. Giorgini, G. Manson. When Security Meets Software Engineering: a Case of Modelling Secure Information Systems. Inf. Syst, Elsevier Science Ltd., Oxford, UK, v. 30, n. 8, p. 609-629, 2005.
  • 13
    • 62949128148 scopus 로고    scopus 로고
    • Payment Card Industry (PCI) Data Security Standard
    • Payment Card Industry Security Standard Council, Technical Report 1.1
    • Payment Card Industry Security Standard Council. Payment Card Industry (PCI) Data Security Standard. Technical Report 1.1, 2006.
    • (2006)
  • 14
    • 57849093809 scopus 로고    scopus 로고
    • M. R. Randazzo, M. Keeney, E. Kowalski, D. Cappelli, and A. Moore. Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector. Technical Report CMU/SEI-2004-TR-021 / ESC-TR-2004-021, National Threat Assessment Center, United States Secret Service and CERT Coordination Center, Software Engineering Institute, 2004.
    • M. R. Randazzo, M. Keeney, E. Kowalski, D. Cappelli, and A. Moore. Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector. Technical Report CMU/SEI-2004-TR-021 / ESC-TR-2004-021, National Threat Assessment Center, United States Secret Service and CERT Coordination Center, Software Engineering Institute, 2004.
  • 15
    • 57849096430 scopus 로고    scopus 로고
    • S. T. Redwine Jr. Software Assurance: A Curriculum Guide to the Common Body of Knowledge to Produce, Acquire and Sustain Secure Software. Technical Report Version 1.2, US Departments of Homeland Security, October 2007.
    • S. T. Redwine Jr. Software Assurance: A Curriculum Guide to the Common Body of Knowledge to Produce, Acquire and Sustain Secure Software. Technical Report Version 1.2, US Departments of Homeland Security, October 2007.
  • 17
    • 38349130423 scopus 로고    scopus 로고
    • The Homeland Security Market Essential Dynamics and Trends
    • Technical report, Civitas Group LLC, December
    • M. Shaheen. The Homeland Security Market Essential Dynamics and Trends. Technical report, Civitas Group LLC, December 2006.
    • (2006)
    • Shaheen, M.1
  • 18
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • G. Sindre and L. Opdahl. Eliciting security requirements with misuse cases. Requir. Eng., 10(1):34-44, 2005.
    • (2005) Requir. Eng , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.