메뉴 건너뛰기




Volumn 2006-May, Issue , 2006, Pages 35-41

A framework for security requirements engineering

Author keywords

Requirements Engineering; Security Requirements

Indexed keywords

REQUIREMENTS ENGINEERING;

EID: 70350130621     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1137627.1137634     Document Type: Conference Paper
Times cited : (75)

References (29)
  • 4
    • 4243980729 scopus 로고    scopus 로고
    • Strategies for developing policies and requirements for secure e-commerce systems
    • A. K. Ghosh, Ed.: Kluwer Academic Publishers, Jan 15
    • Antón, A.I., Earp, J.B.: Strategies for Developing Policies and Requirements for Secure E-Commerce Systems. In ECommerce Security and Privacy, vol. 2, Advances In Information Security, A. K. Ghosh, Ed.: Kluwer Academic Publishers, Jan 15 2001, pp. 29-46.
    • (2001) ECommerce Security and Privacy, Vol. 2, Advances in Information Security , pp. 29-46
    • Antón, A.I.1    Earp, J.B.2
  • 6
    • 22144449985 scopus 로고    scopus 로고
    • Applying security design analysis to a service-based system
    • Chivers, H., Fletcher, M.: Applying Security Design Analysis to a service-based system. Software: Practice and Experience, 35(9) (2005), 873-897.
    • (2005) Software: Practice and Experience , vol.35 , Issue.9 , pp. 873-897
    • Chivers, H.1    Fletcher, M.2
  • 7
    • 84970947585 scopus 로고    scopus 로고
    • Software engineering for security: A roadmap
    • A. Finkelstein, Ed.: ACM Press
    • Devanbu, P., Stubblebine, S.: Software Engineering for Security: A Roadmap. In The Future of Software Engineering, A. Finkelstein, Ed.: ACM Press, 2000.
    • (2000) The Future of Software Engineering
    • Devanbu, P.1    Stubblebine, S.2
  • 8
    • 2942753973 scopus 로고    scopus 로고
    • Specifying reusable security requirements
    • Jan-Feb
    • Firesmith, D.: Specifying Reusable Security Requirements. Journal of Object Technology, 3(1) (Jan-Feb 2004), 61-75.
    • (2004) Journal of Object Technology , vol.3 , Issue.1 , pp. 61-75
    • Firesmith, D.1
  • 13
    • 84953425434 scopus 로고    scopus 로고
    • ISO/IEC: Information Technology-Security Techniques-Evaluation Criteria for IT Security-Part 1: Introduction and General Model. International Standard 15408-1, ISO/IEC, Geneva Switzerland, 1 Dec 1999
    • ISO/IEC: Information Technology-Security Techniques-Evaluation Criteria for IT Security-Part 1: Introduction and General Model. International Standard 15408-1, ISO/IEC, Geneva Switzerland, 1 Dec 1999.
  • 14
    • 84953425435 scopus 로고    scopus 로고
    • ISO/IEC: Information Technology-Security Techniques-Evaluation Criteria for IT Security-Part 2: Security Functional Requirements. International Standard 15408-2, ISO/IEC, Geneva Switzerland, 1 Dec 1999
    • ISO/IEC: Information Technology-Security Techniques-Evaluation Criteria for IT Security-Part 2: Security Functional Requirements. International Standard 15408-2, ISO/IEC, Geneva Switzerland, 1 Dec 1999.
  • 15
    • 84953425436 scopus 로고    scopus 로고
    • ISO/IEC: Information Technology-Security Techniques-Evaluation Criteria for IT Security-Part 3: Security Assurance Requirements. International Standard 15408-3, ISO/IEC, Geneva Switzerland, 1 Dec 1999
    • ISO/IEC: Information Technology-Security Techniques-Evaluation Criteria for IT Security-Part 3: Security Assurance Requirements. International Standard 15408-3, ISO/IEC, Geneva Switzerland, 1 Dec 1999.
  • 19
    • 0036305007 scopus 로고    scopus 로고
    • Integrating software lifecycle process standards with security engineering
    • Lee, Y., Lee, J., Lee, Z.: Integrating Software Lifecycle Process Standards with Security Engineering. Computers and Security, 21(4) (2002), 345-355.
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 345-355
    • Lee, Y.1    Lee, J.2    Lee, Z.3
  • 23
    • 84953425437 scopus 로고    scopus 로고
    • NIST: An Introduction to Computer Security: The NIST Handbook. Special Pub SP 800-12, National Institute of Standards and Technology (NIST), Oct 1995
    • NIST: An Introduction to Computer Security: The NIST Handbook. Special Pub SP 800-12, National Institute of Standards and Technology (NIST), Oct 1995.
  • 24
    • 85008523798 scopus 로고    scopus 로고
    • Weaving together requirements and architectures
    • Mar
    • Nuseibeh, B.: Weaving Together Requirements and Architectures. Computer (IEEE), 34(3) (Mar 2001), 115-117.
    • (2001) Computer (IEEE) , vol.34 , Issue.3 , pp. 115-117
    • Nuseibeh, B.1
  • 29
    • 0030706923 scopus 로고    scopus 로고
    • Information security embedded in the design of telematics systems
    • Tettero, O., Out, D.J., Franken, H.M., Schot, J.: Information security embedded in the design of telematics systems. Computers and Security, 16(2) (1997), 145-164.
    • (1997) Computers and Security , vol.16 , Issue.2 , pp. 145-164
    • Tettero, O.1    Out, D.J.2    Franken, H.M.3    Schot, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.