메뉴 건너뛰기




Volumn E90-D, Issue 9, 2007, Pages 1374-1387

Web services-based security requirement elicitation

Author keywords

Application information security; Design methodology; Software engineering; Software process

Indexed keywords

APPLICATION PROGRAMS; COMPUTER SOFTWARE; SECURITY OF DATA; SOFTWARE DESIGN; SOFTWARE ENGINEERING; SPECIFICATIONS; WEB CRAWLER; WEBSITES;

EID: 68249141690     PISSN: 09168532     EISSN: 17451361     Source Type: Journal    
DOI: 10.1093/ietisy/e90-d.9.1374     Document Type: Article
Times cited : (5)

References (41)
  • 7
    • 17844409254 scopus 로고    scopus 로고
    • Requirements reuse for improving information systems security: A practitioner's approach
    • A. Toval, J. Nicolás, B. Moros, and F. García, "Requirements reuse for improving information systems security: A practitioner's approach," Requirements Engineering Journal, vol. 6, pp. 205-219, 2001.
    • (2001) Requirements Engineering Journal , vol.6 , pp. 205-219
    • Toval, A.1    Nicolás, J.2    Moros, B.3    García, F.4
  • 9
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • B. Schneier, "Attack trees: Modeling security threats," Dr. Dobb's Journal, vol. 24, no. 12, pp. 21-29, 1999.
    • (1999) Dr. Dobb's Journal , vol.24 , Issue.12 , pp. 21-29
    • Schneier, B.1
  • 10
    • 85027130455 scopus 로고    scopus 로고
    • WS-I, Security challenges, threats and countermeasures versión 1.0, 2005: WS-I, 2005
    • WS-I, "Security challenges, threats and countermeasures versión 1.0," vol. 2005: WS-I, 2005.
  • 11
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sydney, Australia
    • G. Sindre and A. L. Opdahl, "Eliciting security requirements with misuse cases," TOOLS-37'00, pp. 34-44, Sydney, Australia, 2000.
    • (2000) TOOLS-37'00 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 12
    • 0037240812 scopus 로고    scopus 로고
    • I. Alexander, Misuse cases: Use cases with hostile intent, IEEE Computer Software, 20, pp. 58-66, 2003
    • I. Alexander, "Misuse cases: Use cases with hostile intent," IEEE Computer Software, vol. 20, pp. 58-66, 2003.
  • 17
    • 2942757657 scopus 로고    scopus 로고
    • Engineering security requirements
    • D. G. Firesmith, "Engineering security requirements," Journal of Object Technology, vol. 2, pp. 53-68, 2003.
    • (2003) Journal of Object Technology , vol.2 , pp. 53-68
    • Firesmith, D.G.1
  • 19
    • 2942753973 scopus 로고    scopus 로고
    • Specifying reusable security requirements
    • D. G. Firesmith, "Specifying reusable security requirements," Journal of Object Technology, vol. 3, pp. 61-75, 2004.
    • (2004) Journal of Object Technology , vol.3 , pp. 61-75
    • Firesmith, D.G.1
  • 20
    • 2942563935 scopus 로고    scopus 로고
    • A process framework for characterising security properties of component-based software systems
    • K. M. Khan and J. Han, "A process framework for characterising security properties of component-based software systems," Australian Software Engineering Conference (ASWEC'04), pp. 358-367, 2004.
    • (2004) Australian Software Engineering Conference (ASWEC'04) , pp. 358-367
    • Khan, K.M.1    Han, J.2
  • 21
    • 35248878476 scopus 로고    scopus 로고
    • Designing secure integration architectures
    • G. Jonsdottir, L. Davis, and R. Gamble, "Designing secure integration architectures," ICCBSS 2003, pp. 112-122, 2003.
    • (2003) ICCBSS 2003 , pp. 112-122
    • Jonsdottir, G.1    Davis, L.2    Gamble, R.3
  • 23
    • 32044433021 scopus 로고    scopus 로고
    • Core security requirements artefacts
    • Open University, Department of Computing, 24
    • J. D. Moffett, C. B. Haley, and B. Nuseibeh, "Core security requirements artefacts," Open University, Department of Computing 2004/24, 2004.
    • (2004)
    • Moffett, J.D.1    Haley, C.B.2    Nuseibeh, B.3
  • 24
    • 85027141417 scopus 로고    scopus 로고
    • N. R. Mead, E. D. Hough, and T. R. S. II, Security quality requirements engineering (SQUARE) methodology, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA CMU/SEI-2005-TR-009, Nov. 2005.
    • N. R. Mead, E. D. Hough, and T. R. S. II, "Security quality requirements engineering (SQUARE) methodology," Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA CMU/SEI-2005-TR-009, Nov. 2005.
  • 25
    • 85027147560 scopus 로고    scopus 로고
    • G. Lami, QuARS: A tool for analyzing requirements, Carnegie Mellon University, Sofware Engineering Institute, Pittsburgh, Technical Report CMU/SEI-2005-TR-014, Sept. 2005.
    • G. Lami, "QuARS: A tool for analyzing requirements," Carnegie Mellon University, Sofware Engineering Institute, Pittsburgh, Technical Report CMU/SEI-2005-TR-014, Sept. 2005.
  • 26
    • 0022754942 scopus 로고
    • Advances in software inspections
    • M. E. Fagan, "Advances in software inspections," IEEE Trans. Softw. Eng., vol. 12, no. 7, pp. 744-751, 1986.
    • (1986) IEEE Trans. Softw. Eng , vol.12 , Issue.7 , pp. 744-751
    • Fagan, M.E.1
  • 27
    • 0010381933 scopus 로고    scopus 로고
    • Internet security glossary
    • RFC 2828, ́
    • R. Shirey, "Internet security glossary," (RFC 2828), 2000. ́
    • (2000)
    • Shirey, R.1
  • 28
    • 85027161799 scopus 로고    scopus 로고
    • F. L. Crespo, M. Á. A. Gómez, J. Candau, and J. A. Mañss, MAGERIT, Versión 2. Metodologías de Análisis y Gestión de Riesgos de los Sistemas de Información. III-Guía de Técnicas, Ministerio de Administraciones Públicas, Madrid NIPO-326-05-047-X, 16 de Junio de 2005, 2005
    • F. L. Crespo, M. Á. A. Gómez, J. Candau, and J. A. Mañss, "MAGERIT - Versión 2. Metodologías de Análisis y Gestión de Riesgos de los Sistemas de Información. III-Guía de Técnicas," Ministerio de Administraciones Públicas, Madrid NIPO-326-05-047-X, 16 de Junio de 2005, 2005.
  • 29
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • G. Sindre and A. L. Opdahl, "Eliciting security requirements with misuse cases," Requirements Engineering Journal, vol. 10, pp. 34-44, 2005.
    • (2005) Requirements Engineering Journal , vol.10 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 30
    • 0003791651 scopus 로고    scopus 로고
    • W3C Web Services Description Language (WSDL) 1.1 - W3C Note 15 March 2001
    • E. Christensen, F. Curbera, G. Meredith, and S. Weerawarana, "W3C Web Services Description Language (WSDL) 1.1 - W3C Note 15 March 2001," 2001.
    • (2001)
    • Christensen, E.1    Curbera, F.2    Meredith, G.3    Weerawarana, S.4
  • 32
    • 33644973176 scopus 로고    scopus 로고
    • Applying the Tropos methodology for analysing Web services requirements and reasoning about qualities of services
    • M. Aiello and P. Giorgini, "Applying the Tropos methodology for analysing Web services requirements and reasoning about qualities of services," UPGRADE, vol. 5, pp. 20-26, 2004.
    • (2004) UPGRADE , vol.5 , pp. 20-26
    • Aiello, M.1    Giorgini, P.2
  • 37
    • 29744447253 scopus 로고    scopus 로고
    • Business-driven application security: From modeling to managing secure applications
    • N. Nagaratnam, A. Nadalin, M. A. Hondo, M. McIntosh, and P. Austel, "Business-driven application security: From modeling to managing secure applications," IBM Syst. J., vol. 44, pp. 847-867, 2005.
    • (2005) IBM Syst. J , vol.44 , pp. 847-867
    • Nagaratnam, N.1    Nadalin, A.2    Hondo, M.A.3    McIntosh, M.4    Austel, P.5
  • 39
    • 17044391834 scopus 로고    scopus 로고
    • Trustworthy Web services: Actions for
    • J. Zhang, "Trustworthy Web services: Actions for now," IEEE IT Pro, vol. 7, pp. 32-36, 2005.
    • (2005) IEEE IT Pro , vol.7 , pp. 32-36
    • Zhang, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.