메뉴 건너뛰기




Volumn 25, Issue 8, 2010, Pages 813-840

From goal-driven security requirements engineering to secure design

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATED TOOLS; ELECTRONIC PURSE; FORMAL VERIFICATIONS; FUNCTIONAL REQUIREMENT; INTELLIGENT SOFTWARE SYSTEMS; MODEL-BASED; SECURITY ENGINEERING; SECURITY ISSUES; SECURITY REQUIREMENTS; SECURITY REQUIREMENTS ENGINEERING; SOCIAL CHALLENGES; SOFTWARE ENGINEERS; STRUCTURED PROCESS; TECHNICAL LEVELS; TWO-DIMENSIONAL PROBLEM; VISA INTERNATIONALS;

EID: 77954504239     PISSN: 08848173     EISSN: 1098111X     Source Type: Journal    
DOI: 10.1002/int.20432     Document Type: Article
Times cited : (56)

References (43)
  • 6
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer J, Schroeder M. The protection of information in computer systems. Proc IEEE. 1975; 63(9): 1278-1308.
    • (1975) Proc IEEE. , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 11
    • 85045573601 scopus 로고    scopus 로고
    • Using abuse care models for security requirements analysis
    • December
    • McDermott J, Fox C. Using abuse care models for security requirements analysis. In: Proc 15th Annu Comput Sec Appl Conf, December 1999. pp 55-67.
    • (1999) Proc 15th Annu Comput Sec Appl Conf , pp. 55-67
    • McDermott, J.1    Fox, C.2
  • 12
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre G, Opdahl AL. Eliciting security requirements with misuse cases. Requirements Eng 2005; 10(1): 34-44.
    • (2005) Requirements Eng , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 15
    • 84899324292 scopus 로고    scopus 로고
    • Identifying security requirements using the security quality requirements engineering (SQUARE) method
    • Hershey PA: Idea Publishing Group
    • Mead NR. Identifying security requirements using the security quality requirements engineering (SQUARE) method. In: Integrating security and software engineering. Hershey, PA: Idea Publishing Group; 2006. pp 44-69.
    • (2006) Integrating Security and Software Engineering , pp. 44-69
    • Mead, N.R.1
  • 16
    • 23944475544 scopus 로고    scopus 로고
    • When security meets software engineering: A case of modeling secure information systems
    • Mouratidis H, Giorgini P, Manson G. When security meets software engineering: a case of modeling secure information systems. Inf Syst 2005; 30(8): 609-629.
    • (2005) Inf Syst , vol.30 , Issue.8 , pp. 609-629
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.3
  • 18
    • 33244457785 scopus 로고    scopus 로고
    • Sound methods and effective tools for model-based security engineering with UML
    • ACM
    • Jan Jü rjens. Sound methods and effective tools for model-based security engineering with UML. ICSE 2005, ACM, 2005. pp 322-331.
    • (2005) ICSE 2005 , pp. 322-331
    • Jürjens, J.1
  • 19
    • 34547455692 scopus 로고    scopus 로고
    • Security analysis of Crypto-based Java programs using automated theorem provers
    • Jan Jürjens. Security analysis of Crypto-based Java programs using automated theorem provers. ASE 2006, IEEE Comput Sec 2006. pp 167-176.
    • (2006) ASE 2006, IEEE Comput Sec , pp. 167-176
    • Jürjens, J.1
  • 20
    • 0027543460 scopus 로고
    • An object-oriented framework for model management and DSS development
    • Muhanna W, W. An object-oriented framework for model management and DSS development. Decision Support Syst 1993; 9(2): 217-229.
    • (1993) Decision Support Syst , vol.9 , Issue.2 , pp. 217-229
    • Muhanna, W.W.1
  • 21
    • 77954475364 scopus 로고    scopus 로고
    • Secrets & lies: Digital security in a networked world
    • Schneier B. Secrets & lies: digital security in a networked world. New York: Wiley; 2000.
    • (2000) New York: Wiley
    • Schneier, B.1
  • 22
    • 77954504775 scopus 로고    scopus 로고
    • Business Requirements ver. 7, Functional Requirements ver. 6.3, Technical Specification ver. 2.2. 2000. Available online at
    • CEPSCO. Common Electronic Purse Specifications. Business Requirements ver. 7, Functional Requirements ver. 6.3, Technical Specification ver. 2.2. 2000. Available online at http://www.cepsco.com.
    • Common Electronic Purse Specifications
  • 23
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations
    • March 1
    • D. Elliott Bell and Leonard J. Lapadula: " Secure Computer Systems: Mathematical Foundations" MITRE Technical Report 2547, Vol I, March 1, 1973.
    • (1973) MITRE Technical Report 2547 , vol.1
    • Bell, D.E.1    Lapadula, L.J.2
  • 26
    • 0029191009 scopus 로고
    • Dealing with non-functional requirements: Three experimental studies of a process-oriented approach
    • Seattle WA
    • Chung L, Nixon B. Dealing with non-functional requirements: three experimental studies of a process-oriented approach. In: Proc 17th Int Conf on Softw Eng, Seattle, WA; 1995.
    • (1995) Proc 17th Int Conf on Softw Eng
    • Chung, L.1    Nixon, B.2
  • 28
    • 17744389340 scopus 로고    scopus 로고
    • A requirements taxonomy to reduce Web site privacy vulnerabilities
    • Antó n AI, Earp JB. A requirements taxonomy to reduce Web site privacy vulnerabilities. Requir Eng J 2004; 9(3): 169-185.
    • (2004) Requir Eng J , vol.9 , Issue.3 , pp. 169-185
    • Antón, A.I.1    Earp, J.B.2
  • 29
    • 0141733117 scopus 로고    scopus 로고
    • Modelling access policies using roles requirements engineering
    • Crook R, Ince D, Nuseibeh B. Modelling access policies using roles Requirements Engineering. Inf Softw Technol 2003; 45(14): 979-991.
    • (2003) Inf Softw Technol , vol.45 , Issue.14 , pp. 979-991
    • Crook, R.1    Ince, D.2    Nuseibeh, B.3
  • 33
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases: Use cases with hostile intent
    • Alexander I. Misuse cases: Use cases with hostile intent. IEEE Softw 2003; 20(1): 58-66.
    • (2003) IEEE Softw , vol.20 , Issue.1 , pp. 58-66
    • Alexander, I.1
  • 34
    • 0039372661 scopus 로고    scopus 로고
    • Viewing business-process security from different perspectives
    • Hermann G, Pernul G. Viewing business-process security from different perspectives. Int J Electron Commence 1999; 3: 89-103.
    • (1999) Int J Electron Commence , vol.3 , pp. 89-103
    • Hermann, G.1    Pernul, G.2
  • 35
    • 0034816038 scopus 로고    scopus 로고
    • A method for designing secure solutions
    • Whitmore J.J., A method for designing secure solutions, IBM Syst J 2001; 40(3): 747-768
    • (2001) IBM Syst J , vol.40 , Issue.3 , pp. 747-768
    • Whitmore, J.J.1
  • 36
    • 0034816038 scopus 로고    scopus 로고
    • Reading, MA: Addison-Wesley
    • Whitmore JJ. A method for designing secure solutions, IBM Syst J 2001; 40(3): 747-768. 36. Viega J, McGraw G. Building a secure software. Reading, MA: Addison-Wesley; 2002.
    • Building A Secure Software , pp. 2002
    • Viega, J.1    McGraw, G.2
  • 37
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: A UML-based modeling language for model-driven security
    • Proc 5th Int Conf on the unified Modelling Language
    • Lodderstedt T, Basin DA, Doser J, SecureUML: A UML-based modeling language for model-driven security. In: Proc 5th Int Conf on the unified Modelling Language. Lecture Notes in Computer Science, 2002. Vol 2460, pp 426-441.
    • (2002) Lecture Notes in Computer Science , vol.2460 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.A.2    Doser, J.3
  • 40
    • 35348977674 scopus 로고    scopus 로고
    • Model based development of access policies
    • Breu R, Popp G, Alam M. Model based development of access policies. STTT 9 2007; (5-6): 457-470.
    • (2007) STTT , vol.9 , Issue.5-6 , pp. 457-470
    • Breu, R.1    Popp, G.2    Alam, M.3
  • 42
    • 33745804721 scopus 로고    scopus 로고
    • Modelling secure systems using an agent-oriented approach and security patterns
    • Mouratidis H, Weiss M, Giorgini P. Modelling secure systems using an agent-oriented approach and security patterns. Int J Softw Eng Knowl Eng 2006; 16(3): 471-498.
    • (2006) Int J Softw Eng Knowl Eng , vol.16 , Issue.3 , pp. 471-498
    • Mouratidis, H.1    Weiss, M.2    Giorgini, P.3
  • 43
    • 33746038490 scopus 로고    scopus 로고
    • Towards a comprehensive framework for secure systems development
    • CAiSE 2006. Springer-Verlag
    • Mouratidis H, Jürjens J, Fox J. Towards a Comprehensive Framework for Secure Systems Development, CAiSE 2006, Lecture Notes in Computer Science 4001. Springer-Verlag; 2006, pp 48-62.
    • (2006) Lecture Notes in Computer Science , vol.4001 , pp. 48-62
    • Mouratidis, H.1    Jürjens, J.2    Fox, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.