메뉴 건너뛰기




Volumn 51, Issue 7, 2009, Pages 1152-1171

On the secure software development process: CLASP, SDL and Touchpoints compared

Author keywords

CLASP; SDL; Secure software; Software process; Touchpoints

Indexed keywords

CLASP; SDL; SECURE SOFTWARE; SOFTWARE PROCESS; TOUCHPOINTS;

EID: 67349139935     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infsof.2008.01.010     Document Type: Article
Times cited : (89)

References (22)
  • 5
    • 67349252121 scopus 로고    scopus 로고
    • Information technology security techniques evaluation criteria for it security, standard ISO/IEC 15408 (2005).
    • Information technology security techniques evaluation criteria for it security, standard ISO/IEC 15408 (2005).
  • 6
    • 85008523798 scopus 로고    scopus 로고
    • Weaving together requirements and architectures
    • Nuseibeh B. Weaving together requirements and architectures. IEEE Computer 34 3 (2001) 115-117. URL://citeseer.ist.psu.edu/nuseibeh01weaving.html
    • (2001) IEEE Computer , vol.34 , Issue.3 , pp. 115-117
    • Nuseibeh, B.1
  • 7
    • 67349241496 scopus 로고    scopus 로고
    • Microsoft threat modeling tool 2.1.2, http://www.microsoft.com/downloads/details.aspx?familyid=59888078-9daf- 4e96-b7d1-944703479451, 2007.
    • (2007) Microsoft threat modeling tool 2.1.2
  • 11
    • 67349110005 scopus 로고    scopus 로고
    • Systems security engineering capability maturity model (SSE-CMM), standard ISO/IEC 21827, 2006.
    • Systems security engineering capability maturity model (SSE-CMM), standard ISO/IEC 21827, 2006.
  • 13
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer J.H., and Schroeder M.D. The protection of information in computer systems. Proceedings of the IEEE 63 9 (1975) 1278-1308
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 16
    • 38549180044 scopus 로고    scopus 로고
    • Build security in, http://buildsecurityin.us-cert.gov/, 2007.
    • (2007) Build security in
  • 18
    • 0036149234 scopus 로고    scopus 로고
    • Correctness by construction: developing a commercial secure system
    • Hall A., and Chapman R. Correctness by construction: developing a commercial secure system. IEEE Software 19 1 (2002) 18-25. URL://citeseer.ist.psu.edu/hall02correctness.html
    • (2002) IEEE Software , vol.19 , Issue.1 , pp. 18-25
    • Hall, A.1    Chapman, R.2
  • 19
    • 49049107220 scopus 로고    scopus 로고
    • A state-of-art report (soar)
    • Software security assurance:, Tech. rep, Information Assurance Technology Analysis Center IATAC
    • K. Goertzel, T. Winograd, H. McKinley, L. Oh, M. Colon, T. McGibbon, E. Fedchak, R. Vienneau, Software security assurance: A state-of-art report (soar), Tech. rep., Information Assurance Technology Analysis Center (IATAC), 2007.
    • (2007)
    • Goertzel, K.1    Winograd, T.2    McKinley, H.3    Oh, L.4    Colon, M.5    McGibbon, T.6    Fedchak, E.7    Vienneau, R.8
  • 22
    • 67349179766 scopus 로고    scopus 로고
    • Similarities and differences between clasp, sdl, and touchpoints: The activity-matrix
    • Tech. rep, K.U. Leuven, Department of Computer Science October
    • K. Buyens, J. Gregoire, B.D. Win, R. Scandariato, W. Joosen, Similarities and differences between clasp, sdl, and touchpoints: the activity-matrix, Tech. rep., K.U. Leuven, Department of Computer Science (October 2007).
    • (2007)
    • Buyens, K.1    Gregoire, J.2    Win, B.D.3    Scandariato, R.4    Joosen, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.