메뉴 건너뛰기




Volumn 52, Issue 5, 2010, Pages 517-536

Analysis of Secure Mobile Grid Systems: A systematic approach

Author keywords

Requirements Analysis; Reusable use cases; Secure mobile Grid development; Security

Indexed keywords

DEVELOPMENT METHODOLOGY; DEVELOPMENT PROCESS; MOBILE GRID; MOBILE USERS; NON-FUNCTIONAL REQUIREMENTS; REQUIREMENTS ANALYSIS; SECURITY REQUIREMENTS; SOFTWARE DEVELOPMENT; SYSTEMATIC PROCESS; TECHNOLOGICAL ENVIRONMENT;

EID: 77949490964     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infsof.2010.01.002     Document Type: Article
Times cited : (23)

References (65)
  • 2
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: A UML-based modeling language for model-driven security
    • 5th International Conference on the Unified Modeling Language
    • D. Basin, J. Doser, SecureUML: a UML-based modeling language for model-driven security, in: 5th International Conference on the Unified Modeling Language, Lecture Notes in Computer Science 2460, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2460
    • Basin, D.1    Doser, J.2
  • 4
    • 77949490048 scopus 로고    scopus 로고
    • Security and survivability reasoning frameworks and architectural design tactics
    • Bass L., Bachmann F., Ellison R.J., Moore A.P., and Klein M. Security and survivability reasoning frameworks and architectural design tactics. SEI (2004)
    • (2004) SEI
    • Bass, L.1    Bachmann, F.2    Ellison, R.J.3    Moore, A.P.4    Klein, M.5
  • 6
    • 85056980116 scopus 로고    scopus 로고
    • P.G. Bradford, B.M. Grizzell, G.T. Jay, J.T. Jenkins, Cap. 4. Pragmatic Security for Constrained Wireless Networks, in Security in Distributed, Grid, Mobile, and Pervasive Computing, A. Publications, Editor, The University of Alabama, Tuscaloosa, USA, 2007, p. 440.
    • P.G. Bradford, B.M. Grizzell, G.T. Jay, J.T. Jenkins, Cap. 4. Pragmatic Security for Constrained Wireless Networks, in Security in Distributed, Grid, Mobile, and Pervasive Computing, A. Publications, Editor, The University of Alabama, Tuscaloosa, USA, 2007, p. 440.
  • 12
    • 37149000358 scopus 로고    scopus 로고
    • A UML profile for modeling mobile information systems
    • Distributed Applications and Interoperable Systems, DAIS'07
    • V. Dehlen, J.Ø. Aagedal, A UML profile for modeling mobile information systems, in: Distributed Applications and Interoperable Systems - DAIS'07 (LNCS 4531), 2007.
    • (2007) LNCS , vol.4531
    • Dehlen, V.1    Aagedal, J.Ø.2
  • 16
    • 10644240285 scopus 로고    scopus 로고
    • The physiology of the grid: An open grid services architecture for distributed systems integration, Open Grid Service Infrastructure WG
    • I. Foster, C. Kesselman, J.M. Nick, S. Tuecke, The physiology of the grid: an open grid services architecture for distributed systems integration, Open Grid Service Infrastructure WG, Global Grid Forum, 2002.
    • (2002) Global Grid Forum
    • Foster, I.1    Kesselman, C.2    Nick, J.M.3    Tuecke, S.4
  • 20
    • 77949491147 scopus 로고    scopus 로고
    • Globus Project
    • Globus Project. .
  • 21
    • 77949490981 scopus 로고    scopus 로고
    • Introduction to the CLASP Process
    • D. Graham, Introduction to the CLASP Process, 2006.
    • (2006)
    • Graham, D.1
  • 22
    • 35048852119 scopus 로고    scopus 로고
    • A UML profile to model mobile systems
    • UML
    • V. Grassi, R. Mirandola, A. Sabetta, A UML profile to model mobile systems, in: UML 2004, LNCS 3273, 2004, p. 128-142.
    • (2004) LNCS , vol.3273 , pp. 128-142
    • Grassi, V.1    Mirandola, R.2    Sabetta, A.3
  • 23
    • 77949486757 scopus 로고    scopus 로고
    • GREDIA project
    • GREDIA project. .
  • 28
    • 77949489965 scopus 로고    scopus 로고
    • Quality model
    • ISO/IEC 25010, ISO/IEC 9126-1
    • ISO/IEC 25010, Quality model (ISO/IEC 9126-1), 2009.
    • (2009)
  • 29
    • 0004020195 scopus 로고    scopus 로고
    • Information technology - guidelines for the management of IT security - Part 1: Concepts and models for IT Security,
    • ISO/IEC
    • ISO/IEC, Information technology - guidelines for the management of IT security - Part 1: concepts and models for IT Security, 1996.
    • (1996)
  • 30
    • 77949486183 scopus 로고    scopus 로고
    • ITU, ITU_T Recommendation X.800. Security Architecture for Open Systems Interconnection for CCITT Applications, 1991.
    • ITU, ITU_T Recommendation X.800. Security Architecture for Open Systems Interconnection for CCITT Applications, 1991.
  • 32
    • 33646765853 scopus 로고    scopus 로고
    • Mobile-to-grid middleware: bridging the gap between mobile and grid environments
    • Springer, Amsterdam, The Netherlands
    • Jameel H., Kalim U., Sajjad A., Lee S., and Jeon T. Mobile-to-grid middleware: bridging the gap between mobile and grid environments. European Grid Conference EGC 2005 (2005), Springer, Amsterdam, The Netherlands
    • (2005) European Grid Conference EGC 2005
    • Jameel, H.1    Kalim, U.2    Sajjad, A.3    Lee, S.4    Jeon, T.5
  • 37
    • 0036037169 scopus 로고    scopus 로고
    • Using UMLsec and goal trees for secure systems development
    • Jurjens J. Using UMLsec and goal trees for secure systems development. Communications of the ACM 48 5 (2002) 1026-1030
    • (2002) Communications of the ACM , vol.48 , Issue.5 , pp. 1026-1030
    • Jurjens, J.1
  • 39
    • 77949489841 scopus 로고    scopus 로고
    • G. Kostopoulos, N. Sklavos, O. Koufopavlou, Cap. 10. State-of-the-Art Security in Grid Computing, in Security in Distributed, Grid, Mobile, and Pervasive Computing, A. Publications, Editor, The University of Alabama, Tuscaloosa, USA, 2007, p. 440.
    • G. Kostopoulos, N. Sklavos, O. Koufopavlou, Cap. 10. State-of-the-Art Security in Grid Computing, in Security in Distributed, Grid, Mobile, and Pervasive Computing, A. Publications, Editor, The University of Alabama, Tuscaloosa, USA, 2007, p. 440.
  • 44
    • 33751416458 scopus 로고    scopus 로고
    • A common criteria based security requirements engineering process for the development of secure information systems
    • Mellado D., Fernández-Medina E., and Piattini M. A common criteria based security requirements engineering process for the development of secure information systems. Computer Standards & Interfaces 29 2 (2007) 244-253
    • (2007) Computer Standards & Interfaces , vol.29 , Issue.2 , pp. 244-253
    • Mellado, D.1    Fernández-Medina, E.2    Piattini, M.3
  • 48
    • 77949485265 scopus 로고    scopus 로고
    • OMG, Software & Systems Process Engineering Meta-Model Specification (SPEM) 2.0, 2008.
    • OMG, Software & Systems Process Engineering Meta-Model Specification (SPEM) 2.0, 2008.
  • 49
    • 77949486748 scopus 로고    scopus 로고
    • Open Grid Forum, The open grid services architecture, Version 1.5, 2006
    • Open Grid Forum, The open grid services architecture, Version 1.5, 2006.
  • 51
    • 78650487448 scopus 로고    scopus 로고
    • Applying a UML Extension to build Use Cases diagrams in a secure mobile Grid application. in 5th International Workshop on Foundations and Practices of UML
    • conjunction with the 28th International Conference on Conceptual Modelling, ER, Gramado, Brasil
    • D.G. Rosado, E. Fernández-Medina, J. López. Applying a UML Extension to build Use Cases diagrams in a secure mobile Grid application. in 5th International Workshop on Foundations and Practices of UML, in: conjunction with the 28th International Conference on Conceptual Modelling, ER 2009, LNCS 5833, Gramado, Brasil, 2009.
    • (2009) LNCS , vol.5833
    • Rosado, D.G.1    Fernández-Medina, E.2    López, J.3
  • 57
    • 77954606675 scopus 로고    scopus 로고
    • L. Røstad, An extended misuse case notation: including vulnerabilities and the insider threat, in: XII Working Conference on Requirements Engineering: Foundation for Software Quality, Luxembourg
    • L. Røstad, An extended misuse case notation: including vulnerabilities and the insider threat, in: XII Working Conference on Requirements Engineering: Foundation for Software Quality, Luxembourg, 2006.
    • (2006)
  • 59
    • 77949490296 scopus 로고    scopus 로고
    • C. Steel, R. Nagappan, R. Lai, The alchemy of security design methodology, patterns, and reality checks, in: Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management. 2005, Prentice Hall PTR/Sun Micros, p. 1088. (Chapter 8).
    • C. Steel, R. Nagappan, R. Lai, The alchemy of security design methodology, patterns, and reality checks, in: Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management. 2005, Prentice Hall PTR/Sun Micros, p. 1088. (Chapter 8).
  • 60
    • 77955159768 scopus 로고    scopus 로고
    • Security issues in mobile computing
    • McGraw-Hill Professional (Chapter 18)
    • Talukder A., and Yavagal R. Security issues in mobile computing. Mobile Computing (2006), McGraw-Hill Professional (Chapter 18)
    • (2006) Mobile Computing
    • Talukder, A.1    Yavagal, R.2
  • 61
    • 17844409254 scopus 로고    scopus 로고
    • Requirements reuse for improving information systems security: a practitioner's approach
    • Toval A., Nicolás J., Moros B., and García F. Requirements reuse for improving information systems security: a practitioner's approach. Requirements Engineering Journal 6 (2002) 205-219
    • (2002) Requirements Engineering Journal , vol.6 , pp. 205-219
    • Toval, A.1    Nicolás, J.2    Moros, B.3    García, F.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.