메뉴 건너뛰기




Volumn 32, Issue 4, 2010, Pages 153-165

A systematic review of security requirements engineering

Author keywords

Requirements engineering; Secure development; Security; Security engineering; Security requirements; Security requirements engineering; Systematic review

Indexed keywords

RESEARCH ACTIVITIES; SECURE SOFTWARE; SECURITY ENGINEERING; SECURITY REQUIREMENTS; SECURITY REQUIREMENTS ENGINEERING; SOFTWARE DEVELOPMENT PROCESS; SYSTEMATIC REVIEW;

EID: 77950516969     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2010.01.006     Document Type: Review
Times cited : (164)

References (75)
  • 2
    • 36849025796 scopus 로고    scopus 로고
    • Future directions in technology-enabled crime: 2007-09
    • Australian_Government, Editor, Australian Institute of Criminology
    • Choo, K.-K.R., R.G. Smith, and R. McCusker, Future directions in technology-enabled crime: 2007-09, in Research and Public Policy Series, Australian_Government, Editor. 2007, Australian Institute of Criminology
    • (2007) Research and Public Policy Series
    • Choo, K.-K.R.1    Smith, R.G.2    McCusker, R.3
  • 3
    • 33845206869 scopus 로고    scopus 로고
    • Software security engineering: toward unifying software engineering and security engineering
    • Warkentin M., and Vaughn R.B. (Eds), Idea Group Publishing
    • Zulkernine M., and Ahamed S.I. Software security engineering: toward unifying software engineering and security engineering. In: Warkentin M., and Vaughn R.B. (Eds). Enterprise Information Systems Assurance and System Security (2006), Idea Group Publishing
    • (2006) Enterprise Information Systems Assurance and System Security
    • Zulkernine, M.1    Ahamed, S.I.2
  • 7
    • 33646801990 scopus 로고    scopus 로고
    • Goal and scenario bases domain requirements analysis environment
    • Kim J., Kim M., and Park S. Goal and scenario bases domain requirements analysis environment. The Journal of Systems and Software (2005) 926-938
    • (2005) The Journal of Systems and Software , pp. 926-938
    • Kim, J.1    Kim, M.2    Park, S.3
  • 8
    • 0003499649 scopus 로고    scopus 로고
    • Requirements engineering process and techniques
    • John Willey & Sons, UK
    • Kotonya G., and Sommerville I. Requirements engineering process and techniques. Hardcover ed. 294 (1998), John Willey & Sons, UK
    • (1998) Hardcover ed. , vol.294
    • Kotonya, G.1    Sommerville, I.2
  • 10
    • 84898245139 scopus 로고    scopus 로고
    • Security engineering: it is all about control and assurance objectives
    • Warkentin M., and Vaughn R.B. (Eds), Idea Group Publishing
    • Henning R.R., and Corporation H. Security engineering: it is all about control and assurance objectives. In: Warkentin M., and Vaughn R.B. (Eds). Enterprise Information Systems Assurance and System Security (2006), Idea Group Publishing
    • (2006) Enterprise Information Systems Assurance and System Security
    • Henning, R.R.1    Corporation, H.2
  • 13
    • 12344314483 scopus 로고    scopus 로고
    • A framework for security requirements engineering
    • Department of Computer Science, University of York
    • Moffett J.D., and Nuseibeh B.A. A framework for security requirements engineering. Report YCS (2003), Department of Computer Science, University of York 368
    • (2003) Report YCS , pp. 368
    • Moffett, J.D.1    Nuseibeh, B.A.2
  • 15
    • 33847286844 scopus 로고    scopus 로고
    • Lessons from applying the systematic literature review process within the software engineering domain
    • Brereton P., Kitchenham B., Budgen D., Turner M., and Khalil M. Lessons from applying the systematic literature review process within the software engineering domain. J. Syst. Software 80 4 (2007) 571-583
    • (2007) J. Syst. Software , vol.80 , Issue.4 , pp. 571-583
    • Brereton, P.1    Kitchenham, B.2    Budgen, D.3    Turner, M.4    Khalil, M.5
  • 16
    • 44649122227 scopus 로고    scopus 로고
    • Guideline for performing Systematic Literature Reviews in Software Engineering. Version 2.3
    • University of Keele (Software Engineering Group, School of Computer Science and Mathematics) and Durham Department of Computer Science
    • Kitchenham, B., Guideline for performing Systematic Literature Reviews in Software Engineering. Version 2.3. 2007, University of Keele (Software Engineering Group, School of Computer Science and Mathematics) and Durham (Department of Computer Science).
    • (2007)
    • Kitchenham, B.1
  • 18
    • 2942757657 scopus 로고    scopus 로고
    • Engineering security requirements
    • Firesmith D.G. Engineering security requirements. Journal of Object Technology 2 1 (2003) 53-68
    • (2003) Journal of Object Technology , vol.2 , Issue.1 , pp. 53-68
    • Firesmith, D.G.1
  • 20
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: from UML models to access control infrastructures
    • Basin D., Doser J., and Lodderstedt T. Model driven security: from UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol. 15 1 (2006) 39-91
    • (2006) ACM Trans. Softw. Eng. Methodol. , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.1    Doser, J.2    Lodderstedt, T.3
  • 28
    • 58849148475 scopus 로고    scopus 로고
    • How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
    • Compagna L., Khoury P.E., Krausová A., Massacci F., and Zannone N. How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. Artif. Intell. Law 17 1 (2009) 1-30
    • (2009) Artif. Intell. Law , vol.17 , Issue.1 , pp. 1-30
    • Compagna, L.1    Khoury, P.E.2    Krausová, A.3    Massacci, F.4    Zannone, N.5
  • 30
    • 77950517764 scopus 로고    scopus 로고
    • Engineering safety and security related requirements for software intensive systems, in international conference on software engineering
    • Firesmith D.G. Engineering safety and security related requirements for software intensive systems, in international conference on software engineering. IEEE Computer Society (2007) 169
    • (2007) IEEE Computer Society , pp. 169
    • Firesmith, D.G.1
  • 31
    • 33847617890 scopus 로고    scopus 로고
    • Intrusion detection aware component-based systems: a specification-based framework
    • Hussein M., and Zulkernine M. Intrusion detection aware component-based systems: a specification-based framework. J. Syst. Softw. 80 5 (2007) 700-710
    • (2007) J. Syst. Softw. , vol.80 , Issue.5 , pp. 700-710
    • Hussein, M.1    Zulkernine, M.2
  • 37
    • 77950516100 scopus 로고    scopus 로고
    • Integrating privacy requirements into security requirements engineering
    • Abu-Nimeh S., Miyazaki S., and Mead N.R. Integrating privacy requirements into security requirements engineering. SEKE (2009) 542-547
    • (2009) SEKE , pp. 542-547
    • Abu-Nimeh, S.1    Miyazaki, S.2    Mead, N.R.3
  • 38
    • 33751416458 scopus 로고    scopus 로고
    • A common criteria based security requirements engineering process for the development of secure information systems
    • Mellado D., Fernández-Medina E., and Piattini M. A common criteria based security requirements engineering process for the development of secure information systems. Computer Standards and Interfaces (2007) 244-253
    • (2007) Computer Standards and Interfaces , pp. 244-253
    • Mellado, D.1    Fernández-Medina, E.2    Piattini, M.3
  • 39
    • 44949241673 scopus 로고    scopus 로고
    • Towards security requirements management for software product lines: a security domain requirements engineering process
    • Mellado D., Fernández-Medina E., and Piattini M. Towards security requirements management for software product lines: a security domain requirements engineering process. Computer Standards & Interfaces (2008) 361-371
    • (2008) Computer Standards & Interfaces , pp. 361-371
    • Mellado, D.1    Fernández-Medina, E.2    Piattini, M.3
  • 40
    • 40449096402 scopus 로고    scopus 로고
    • Security requirements engineering: a framework for representation and analysis
    • Haley C.B., Laney R., Moffet J.D., and Nuseibeh B. Security requirements engineering: a framework for representation and analysis. IEEE Trans. Software Eng. 34 1 (2008) 133-153
    • (2008) IEEE Trans. Software Eng. , vol.34 , Issue.1 , pp. 133-153
    • Haley, C.B.1    Laney, R.2    Moffet, J.D.3    Nuseibeh, B.4
  • 41
    • 33745886231 scopus 로고    scopus 로고
    • A security requirement management database based on ISO/IEC 15408
    • Morimoto S., Horie D., and Cheng J. A security requirement management database based on ISO/IEC 15408. ICCSA 2006 (LNCS 3982) 3 (2006) 1-10
    • (2006) ICCSA 2006 (LNCS 3982) , vol.3 , pp. 1-10
    • Morimoto, S.1    Horie, D.2    Cheng, J.3
  • 48
    • 33947608669 scopus 로고    scopus 로고
    • Software requirements and architecture modeling for evolving non-secure applications into secure applications
    • Shin M.E., and Gomaa H. Software requirements and architecture modeling for evolving non-secure applications into secure applications. Sci. Comput. Program. 66 1 (2007) 60-70
    • (2007) Sci. Comput. Program. , vol.66 , Issue.1 , pp. 60-70
    • Shin, M.E.1    Gomaa, H.2
  • 49
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre G., and Opdahl A.L. Eliciting security requirements with misuse cases. Requirements Eng. 10 1 (2005) 34-44
    • (2005) Requirements Eng. , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 51
    • 77950516828 scopus 로고    scopus 로고
    • Experimental comparison of attack trees and misuse cases for security threat identification. Information and Software Technology
    • Opdahl, A.L. and G. Sindre, Experimental comparison of attack trees and misuse cases for security threat identification. Information and Software Technology. In Press, Corrected Proof, 2008.
    • (2008) Press, Corrected Proof
    • Opdahl, A.L.1    Sindre, G.2
  • 53
    • 17844409254 scopus 로고    scopus 로고
    • Requirements reuse for improving information systems security: a practitioner's approach
    • Toval A., Nicolás J., Moros B., and García F. Requirements reuse for improving information systems security: a practitioner's approach. Requirements Engineering Journal (2001) 205-219
    • (2001) Requirements Engineering Journal , pp. 205-219
    • Toval, A.1    Nicolás, J.2    Moros, B.3    García, F.4
  • 62
    • 1242263785 scopus 로고    scopus 로고
    • Holistic security requirement engineering for electronic commerce
    • Zuccato A. Holistic security requirement engineering for electronic commerce. Computers and Security (2004) 63-76
    • (2004) Computers and Security , pp. 63-76
    • Zuccato, A.1
  • 63
    • 34248396442 scopus 로고    scopus 로고
    • Holistic security management framework applied in electronic commerce
    • Zuccato A. Holistic security management framework applied in electronic commerce. Computer & Security 26 3 (2007) 256-265
    • (2007) Computer & Security , vol.26 , Issue.3 , pp. 256-265
    • Zuccato, A.1
  • 65
    • 69549136179 scopus 로고    scopus 로고
    • Engineering requirements for system reliability and security, in software system reliability and security
    • Broy M., Grunbauer J., and Hoare C.A.R. (Eds), IOS Press
    • Lamsweerde V. Engineering requirements for system reliability and security, in software system reliability and security. In: Broy M., Grunbauer J., and Hoare C.A.R. (Eds). NATO security through science series-D: information and communication security (2007), IOS Press 196-238
    • (2007) NATO security through science series-D: information and communication security , pp. 196-238
    • Lamsweerde, V.1
  • 67
    • 34548787238 scopus 로고    scopus 로고
    • Model-based security engineering of distributed information systems using UMLSec
    • Best B., Jürjens J., and Nuseibeh B. Model-based security engineering of distributed information systems using UMLSec. ICSE (2007) 581-590
    • (2007) ICSE , pp. 581-590
    • Best, B.1    Jürjens, J.2    Nuseibeh, B.3
  • 75
    • 56649104987 scopus 로고    scopus 로고
    • A formal metamodel for problem frames
    • 11th international conference on Model Driven Engineering Languages and Systems (ARES'08)
    • Hatebur D., Heisel M., and Schmidt H. A formal metamodel for problem frames. 11th international conference on Model Driven Engineering Languages and Systems (ARES'08). Lecture Notes In Computer Science Vol. 5301 (2008) 68-82
    • (2008) Lecture Notes In Computer Science , vol.5301 , pp. 68-82
    • Hatebur, D.1    Heisel, M.2    Schmidt, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.