메뉴 건너뛰기




Volumn 42, Issue 9, 2009, Pages 64-72

Securing the skies: In requirements we trust

Author keywords

Airplanes; Context; Data mining; Radar; Security; Security requirements analysis; Security requirements engineering; Surveillance

Indexed keywords


EID: 70349464375     PISSN: 00189162     EISSN: None     Source Type: Trade Journal    
DOI: 10.1109/MC.2009.299     Document Type: Article
Times cited : (16)

References (17)
  • 3
    • 70349450888 scopus 로고    scopus 로고
    • A.I. Antón, ed., special issue on Requirements Engineering for Information Security, Requirements Eng., Dec. 2002, pp. 177-287.
    • A.I. Antón, ed., special issue on "Requirements Engineering for Information Security," Requirements Eng., Dec. 2002, pp. 177-287.
  • 4
    • 40449096402 scopus 로고    scopus 로고
    • Security Requirements Engineering: A Framework for Representation and Analysis
    • Jan
    • C.B. Haley et al., "Security Requirements Engineering: A Framework for Representation and Analysis," IEEE Trans. Software Eng., Jan. 2008, pp. 133-153.
    • (2008) IEEE Trans. Software Eng , pp. 133-153
    • Haley, C.B.1
  • 9
    • 85008523798 scopus 로고    scopus 로고
    • Weaving Together Requirements and Architectures
    • Mar
    • B. Nuseibeh, "Weaving Together Requirements and Architectures," Computer, Mar. 2001, pp. 115-117.
    • (2001) Computer , pp. 115-117
    • Nuseibeh, B.1
  • 10
    • 70349444650 scopus 로고    scopus 로고
    • CRISTAL UK, Final Project Report, report no. EN-CRISTAL-UK/WP0/FPR/D1.1, 19 Oct, Eurocontrol;
    • C. Foster and M. Watson, "CRISTAL UK - Final Project Report," report no. EN-CRISTAL-UK/WP0/FPR/D1.1, 19 Oct. 2007, Eurocontrol; www.eurocontrol.int/cascade/public/site_preferences/ display_library_list_public.html.
    • (2007)
    • Foster, C.1    Watson, M.2
  • 12
    • 0343347262 scopus 로고    scopus 로고
    • A Model for a Causal Logic for Requirements Engineering
    • Mar
    • J. Moffett et al., "A Model for a Causal Logic for Requirements Engineering," Requirements Eng., Mar. 1996, pp. 27-46.
    • (1996) Requirements Eng , pp. 27-46
    • Moffett, J.1
  • 13
    • 84924180488 scopus 로고    scopus 로고
    • updated ed, Cambridge Univ. Press
    • S. Toulmin, The Uses of Argument, updated ed., Cambridge Univ. Press, 2003.
    • (2003) The Uses of Argument
    • Toulmin, S.1
  • 14
    • 70349445850 scopus 로고    scopus 로고
    • T.P. Kelly, Arguing Safety - A Systematic Approach to Safety Case Management, doctoral dissertation, University of York, 1999.
    • T.P. Kelly, "Arguing Safety - A Systematic Approach to Safety Case Management," doctoral dissertation, University of York, 1999.
  • 15
    • 4544255381 scopus 로고    scopus 로고
    • Elaborating Security Requirements by Construction of Intentional Anti-Models
    • IEEE CS Press
    • A. van Lamsweerde, "Elaborating Security Requirements by Construction of Intentional Anti-Models," Proc. 26th Int'l Conf. Software Eng. (ICSE 04), IEEE CS Press, 2004, pp. 148-157.
    • (2004) Proc. 26th Int'l Conf. Software Eng. (ICSE 04) , pp. 148-157
    • van Lamsweerde, A.1
  • 16
    • 39449099894 scopus 로고    scopus 로고
    • Security Requirements for the Rest of Us: A Survey
    • Jan./Feb
    • I.A. Tøndel, M.G. Jaatun, and P.H. Meland, "Security Requirements for the Rest of Us: A Survey," IEEE Software, Jan./Feb. 2008, pp. 20-27.
    • (2008) IEEE Software , pp. 20-27
    • Tøndel, I.A.1    Jaatun, M.G.2    Meland, P.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.