메뉴 건너뛰기




Volumn , Issue , 2006, Pages 425-430

Security risk analysis in web services systems

Author keywords

Security engineering; Security risk analysis and management; Software security development process; Web services security

Indexed keywords

BEST PRACTICE; COMMON CRITERIA; DEVELOPMENT PROCESS; DISTRIBUTED SOFTWARE; ISO 15408; PUBLIC ADMINISTRATION; RISK ANALYSIS AND MANAGEMENT METHODOLOGY; SECURITY ENGINEERING; SECURITY REQUIREMENTS; SECURITY RISK ANALYSIS; SECURITY RISK ASSESSMENTS; WEB SERVICES SECURITY;

EID: 68249154018     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (18)
  • 1
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases: Use cases with hostile intent
    • Alexander, I. (2003). "Misuse Cases: Use Cases with Hostile Intent." IEEE Computer Software 20(1): 58-66.
    • (2003) IEEE Computer Software , vol.20 , Issue.1 , pp. 58-66
    • Alexander, I.1
  • 6
    • 2942757657 scopus 로고    scopus 로고
    • Engineering security requirements
    • Firesmith, D. G. (2003). "Engineering Security Requirements." Journal of Object Technology 2(1): 53-68.
    • (2003) Journal of Object Technology , vol.2 , Issue.1 , pp. 53-68
    • Firesmith, D.G.1
  • 10
    • 77954341505 scopus 로고    scopus 로고
    • Web services enterprise security architecture: A case study
    • Fairfax, Virginia, USA, ACM Press
    • Gutiérrez, C., E. Fernández-Medina, et al. (2005). Web Services Enterprise Security Architecture: a Case Study. ACM Workshop on Security on Web Services, Fairfax, Virginia, USA, ACM Press.
    • (2005) ACM Workshop on Security on Web Services
    • Gutiérrez, C.1    Fernández-Medina, E.2
  • 14
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • Schneier, B. (1999). "Attack Trees: Modeling Security Threats." Dr. Dobb's Journal.
    • (1999) Dr. Dobb's Journal
    • Schneier, B.1
  • 15
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre, G. and A. L. Opdahl (2005). "Eliciting Security Requirements with Misuse Cases." Requirements Engineering Journal 10(1): 34-44.
    • (2005) Requirements Engineering Journal , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 16
    • 17844409254 scopus 로고    scopus 로고
    • Requirements reuse for improving information systems security: A practitioner's approach
    • Toval, A., J. Nicolás, et al. (2001). "Requirements Reuse for Improving Information Systems Security: A Practitioner's Approach." Requirements Engineering Journal 6(4): 205-219.
    • (2001) Requirements Engineering Journal , vol.6 , Issue.4 , pp. 205-219
    • Toval, A.1    Nicolás, J.2
  • 17


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.