메뉴 건너뛰기




Volumn 5775 LNCS, Issue , 2009, Pages 311-325

A foundation for requirements analysis of dependable software

Author keywords

[No Author keywords available]

Indexed keywords

DEPENDABLE SOFTWARES; FUNCTIONAL REQUIREMENT; PATTERN SYSTEMS; RANDOM FAULTS; REQUIREMENTS ANALYSIS; SECURITY ENGINEERING;

EID: 70350452974     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04468-7_25     Document Type: Conference Paper
Times cited : (17)

References (17)
  • 1
    • 70350451654 scopus 로고    scopus 로고
    • Common Criteria for Information Technology Security Evaluation, Version 3.1 September 2006
    • Common Criteria for Information Technology Security Evaluation, Version 3.1 (September 2006), http://www.commoncriteriaportal.org/public/expert/
  • 6
    • 70350439335 scopus 로고    scopus 로고
    • Hatebur, D, Heisel, M, A foundation for requirements analysis of dependable software technical report, Technical report, Universität Duisburg-Essen
    • Hatebur, D., Heisel, M.: A foundation for requirements analysis of dependable software (technical report). Technical report, Universität Duisburg-Essen (2009), http://swe.uni-due.de/techrep/founddep.pdf
    • (2009)
  • 7
    • 33746660228 scopus 로고    scopus 로고
    • Security engineering using problem frames
    • Müller, G, ed, ETRICS 2006, Springer, Heidelberg
    • Hatebur, D., Heisel, M., Schmidt, H.: Security engineering using problem frames. In:Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 238-253. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3995 , pp. 238-253
    • Hatebur, D.1    Heisel, M.2    Schmidt, H.3
  • 10
    • 56649104987 scopus 로고    scopus 로고
    • A formal metamodel for problem frames
    • Czarnecki, K, Ober, I, Bruel, J.-M.,Uhl, A, Völter, M, eds, MODELS 2008, Springer, Heidelberg
    • Hatebur, D., Heisel, M., Schmidt, H.: A formal metamodel for problem frames. In: Czarnecki, K., Ober, I., Bruel, J.-M.,Uhl, A., Völter, M. (eds.) MODELS 2008. LNCS, vol. 5301, pp. 68-82. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5301 , pp. 68-82
    • Hatebur, D.1    Heisel, M.2    Schmidt, H.3
  • 13
    • 0029191909 scopus 로고
    • Deriving specifications from requirements: An example
    • Seattle, USA, pp, ACM Press, New York
    • Jackson, M., Zave, P.: Deriving specifications from requirements: an example. In: Proceedings 17th Int. Conf. on Software Engineering, Seattle, USA, pp. 15-24. ACM Press, New York (1995)
    • (1995) Proceedings 17th Int. Conf. on Software Engineering , pp. 15-24
    • Jackson, M.1    Zave, P.2
  • 14
    • 0022250464 scopus 로고    scopus 로고
    • Dependability computing and fault tolerance: Concepts and terminology
    • June 1995
    • Laprie, J.-C.: Dependability computing and fault tolerance: Concepts and terminology. Fault-Tolerant Computing - Highlights from Twenty-Five Years, 2-13 (June 1995), http://lion.ee.ntu.edu.tw/Class/FTDS 2008/ Laprie-Definitions.pdf
    • Fault-Tolerant Computing - Highlights from Twenty-Five Years , pp. 2-13
    • Laprie, J.-C.1
  • 15
    • 70350450488 scopus 로고    scopus 로고
    • Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. Technical report, TU Dresden and ULD Kiel, 5 (2006), http://dud.inf.tu-dresden. de/Anon-Terminology.shtml
    • Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. Technical report, TU Dresden and ULD Kiel, 5 (2006), http://dud.inf.tu-dresden. de/Anon-Terminology.shtml
  • 17
    • 33751016038 scopus 로고    scopus 로고
    • Stepwise development of secure systems
    • Górski, J, ed, SAFECOMP 2006, Springer, Heidelberg
    • Santen, T.: Stepwise development of secure systems. In: Górski, J. (ed.) SAFECOMP 2006. LNCS, vol. 4166, pp. 142-155. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4166 , pp. 142-155
    • Santen, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.