메뉴 건너뛰기




Volumn 2, Issue , 2009, Pages 353-358

On selecting appropriate development processes and requirements engineering methods for secure software

Author keywords

Software security; secure software development process; software security requirements engineering

Indexed keywords

COMPARATIVE STUDIES; DEVELOPMENT PROCESS; ENGINEERING METHODS; IN-BUILDINGS; SECURE SOFTWARE; SECURE SOFTWARE DEVELOPMENT; SECURITY REQUIREMENTS; SECURITY REQUIREMENTS ENGINEERING; SECURITY VULNERABILITIES; SOFTWARE DEVELOPER; SOFTWARE SECURITY;

EID: 70449679234     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMPSAC.2009.206     Document Type: Conference Paper
Times cited : (27)

References (33)
  • 5
    • 70449637484 scopus 로고    scopus 로고
    • Last Accessed March 2009
    • OWASP CLASP Project, http://www.owasp.org/index.php/Category:OWASP-CLASP- Project. Last Accessed March 2009.
  • 6
    • 84931024051 scopus 로고    scopus 로고
    • Integrating security and usability into the requirements and design process
    • Inderscience Publishers, Geneva, Switzerland
    • I. Flechais, C. Mascolo, and M.A. Sasse, "Integrating Security and Usability into the Requirements and Design Process," International Journal of Electronic Security and Digital Forensics, Inderscience Publishers, Geneva, Switzerland, 2007, vol.1, no.1, pp. 12-26.
    • (2007) International Journal of Electronic Security and Digital Forensics , vol.1 , Issue.1 , pp. 12-26
    • Flechais, I.1    Mascolo, C.2    Sasse, M.A.3
  • 11
    • 34047214891 scopus 로고    scopus 로고
    • Software testing for security
    • ScienceDirect
    • S.d. Vries, "Software Testing for Security," Network Security, ScienceDirect, 2007, vol.3, pp. 11-15.
    • (2007) Network Security , vol.3 , pp. 11-15
    • Vries, S.D.1
  • 12
    • 24344438696 scopus 로고    scopus 로고
    • Secure software development by example
    • IEEE CS Press
    • A. Apvrille and M. Pourzandi, "Secure Software Development by Example," IEEE Security and Privacy, IEEE CS Press, 2005, vol. 3, no. 4, pp. 10-17.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.4 , pp. 10-17
    • Apvrille, A.1    Pourzandi, M.2
  • 14
  • 19
    • 0004229237 scopus 로고    scopus 로고
    • Doctoral Dissertation, Department of Computer Sciences, Purdue University, West Lafayette, IN, USA
    • I.V. Krsul, "Software Vulnerability Analysis," Doctoral Dissertation, Department of Computer Sciences, Purdue University, West Lafayette, IN, USA, 1998.
    • (1998) Software Vulnerability Analysis
    • Krsul, I.V.1
  • 23
    • 33847617890 scopus 로고    scopus 로고
    • Intrusion detection aware component-based system: A specification-based framework
    • Elsevier Science
    • M. Hussein and M. Zulkernine, "Intrusion Detection Aware Component-Based System: A Specification-Based Framework," Journal of System and Software, Elsevier Science, 2007, vol.80, no 5, pp. 700-710.
    • (2007) Journal of System and Software , vol.80 , Issue.5 , pp. 700-710
    • Hussein, M.1    Zulkernine, M.2
  • 25
    • 23944475544 scopus 로고    scopus 로고
    • When security meets software engineering: A case of modeling secure information systems
    • Elsevier Science
    • H. Mouratidis, P. Giorgini, and G. Manson, "When Security Meets Software Engineering: A Case of Modeling Secure Information Systems," Journal of Information Systems, Elsevier Science, 2005, vol.30, no.8, pp. 609-629.
    • (2005) Journal of Information Systems , vol.30 , Issue.8 , pp. 609-629
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.3
  • 26
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An Attack Language for State-Based Intrusion Detection
    • IOS Press, Amsterdam
    • S.T. Eckmann, G. Vigna, and R.A. Kemmerer, "STATL: An Attack Language for State-Based Intrusion Detection," Journal of Computer Security, IOS Press, Amsterdam, 2002, vol. 10, no. 1/2, pp. 71-104.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 71-104
    • Eckmann, S.T.1    Vigna, G.2    Kemmerer, R.A.3
  • 27
    • 70449635381 scopus 로고    scopus 로고
    • Last Accessed March 2009
    • Snort, www.snort.org. Last Accessed March 2009.
  • 28
    • 70449646465 scopus 로고    scopus 로고
    • Last Accessed March 2009
    • SecureUML Tool, http://www.foundstone.com/us/resources/proddesc /secureumltemplate.htm. Last Accessed March 2009.
    • SecureUML Tool
  • 29
    • 70449688110 scopus 로고    scopus 로고
    • Last Accessed March 2009
    • Si, http://sesa.dit.unitn.it/sistar-tool/home.php?7. Last Accessed March 2009.
  • 30
    • 70449639958 scopus 로고    scopus 로고
    • Last Accessed March 2009
    • Model-Driven Security with SecureUML, http://www.infsec.ethz.ch/people/ doserj/mds. Last Accessed March 2009.
    • Model-Driven Security with SecureUML
  • 33
    • 33751416458 scopus 로고    scopus 로고
    • A common criteria-based security requirements engineering process for the development of secure information systems
    • Elsevier Science
    • D. Mellado, E. Fernandez-Medina, and M. Piattni, "A Common Criteria-Based Security Requirements Engineering Process for the Development of Secure Information Systems," Computer Standards and Interfaces, Elsevier Science, 2007, vol.29, pp. 244-253.
    • (2007) Computer Standards and Interfaces , vol.29 , pp. 244-253
    • Mellado, D.1    Fernandez-Medina, E.2    Piattni, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.