메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1-8

Reusable security use cases for mobile grid environments

Author keywords

[No Author keywords available]

Indexed keywords

ANALYSIS MODELS; COMPLEX INFORMATION; CROSS-DOMAIN AUTHENTICATION; DESIGN PHASE; DEVELOPMENT METHODOLOGY; DEVELOPMENT PROCESS; GRID TECHNOLOGIES; MOBILE GRID; MULTIPLE SECURITIES; NON-FUNCTIONAL REQUIREMENTS; SECURITY REQUIREMENTS; SOFTWARE DEVELOPMENT; SYSTEMATIC PROCESS; TECHNICAL SOLUTIONS;

EID: 70349918315     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWSESS.2009.5068452     Document Type: Conference Paper
Times cited : (10)

References (38)
  • 1
    • 33644965870 scopus 로고    scopus 로고
    • Grid Interactive Service-oriented Programming Environment
    • presented at, Tsinghua, China, pp
    • R. Kolonay and M. Sobolewski, "Grid Interactive Service-oriented Programming Environment," presented at Concurrent Engineering: The Worldwide Engineering Grid, Tsinghua, China, pp. 97-102, 2004.
    • (2004) Concurrent Engineering: The Worldwide Engineering Grid , pp. 97-102
    • Kolonay, R.1    Sobolewski, M.2
  • 2
    • 70349895814 scopus 로고    scopus 로고
    • L. Bass, F. Bachmann, R. J. Ellison, A. P. Moore, and M. Klein, Security and survivability reasoning frameworks and architectural design tactics, SEI, 2004.
    • L. Bass, F. Bachmann, R. J. Ellison, A. P. Moore, and M. Klein, "Security and survivability reasoning frameworks and architectural design tactics," SEI, 2004.
  • 15
    • 24944473223 scopus 로고    scopus 로고
    • Mobile-To-Grid Middleware: Bridging the gap between mobile and Grid environments
    • presented at, Amsterdam, The Netherlands, pp
    • H. Jameel, U. Kalim, A. Sajjad, S. Lee, and T. Jeon, "Mobile-To-Grid Middleware: Bridging the gap between mobile and Grid environments," presented at European Grid Conference EGC 2005, Amsterdam, The Netherlands, pp. 932-941, 2005.
    • (2005) European Grid Conference EGC , pp. 932-941
    • Jameel, H.1    Kalim, U.2    Sajjad, A.3    Lee, S.4    Jeon, T.5
  • 19
    • 85056980116 scopus 로고    scopus 로고
    • P. G. Bradford, B. M. Grizzell, G. T. Jay, and J. T. Jenkins, Cap. 4. Pragmatic Security for Constrained Wireless Networks, in Security in Distributed, Grid, Mobile, and Pervasive Computing, A. Publications, Ed. The University of Alabama, Tuscaloosa, USA, pp. 440, 2007.
    • P. G. Bradford, B. M. Grizzell, G. T. Jay, and J. T. Jenkins, "Cap. 4. Pragmatic Security for Constrained Wireless Networks," in Security in Distributed, Grid, Mobile, and Pervasive Computing, A. Publications, Ed. The University of Alabama, Tuscaloosa, USA, pp. 440, 2007.
  • 21
    • 33344465743 scopus 로고    scopus 로고
    • Model-Driven Engineering
    • D. C. Schmidt, "Model-Driven Engineering," IEEE Computer, vol. 39 (2), 2006.
    • (2006) IEEE Computer , vol.39 , Issue.2
    • Schmidt, D.C.1
  • 24
    • 17644401409 scopus 로고    scopus 로고
    • Bringing Security Home: A process for developing secure and usable systems
    • presented at, Ascona, Switzerland
    • I. Flechais, M. A. Sasse, and S. M. V. Hailes, "Bringing Security Home: A process for developing secure and usable systems," presented at Nwe Security Paradigms Workshop (NSPW'03), Ascona, Switzerland, 2003.
    • (2003) Nwe Security Paradigms Workshop (NSPW'03)
    • Flechais, I.1    Sasse, M.A.2    Hailes, S.M.V.3
  • 36
    • 77949517037 scopus 로고    scopus 로고
    • Software & Systems Process Engineering Meta-Model Specification (SPEM) 2.0
    • OMG
    • OMG, "Software & Systems Process Engineering Meta-Model Specification (SPEM) 2.0," 2008.
    • (2008)
  • 38
    • 77954606675 scopus 로고    scopus 로고
    • L. Røstad, An extended misuse case notation: Including vulnerabilities and the insider threat, presented at XII Working Conference on Requirements Engineering: Foundation for Software Quality, Luxembourg
    • L. Røstad, "An extended misuse case notation: Including vulnerabilities and the insider threat," presented at XII Working Conference on Requirements Engineering: Foundation for Software Quality, Luxembourg, 2006.
    • (2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.