메뉴 건너뛰기




Volumn , Issue , 2006, Pages 1-14

Integrating security and software engineering: An introduction

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77954507186     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-59904-147-6.ch001     Document Type: Chapter
Times cited : (48)

References (52)
  • 1
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases: Use cases with hostile intent
    • Alexander, I. (2003). Misuse cases: Use cases with hostile intent. IEEE Software, 20, 58-66.
    • (2003) IEEE Software , vol.20 , pp. 58-66
    • Alexander, I.1
  • 3
    • 17744389340 scopus 로고    scopus 로고
    • A requirements taxonomy for reducing Web site privacy vulnerabilities
    • Anton, A. I., & Earp, J. B. (2004). A requirements taxonomy for reducing Web site privacy vulnerabilities. Requirements Engineering, 9(3), 169-185.
    • (2004) Requirements Engineering , vol.9 , Issue.3 , pp. 169-185
    • Anton, A.I.1    Earp, J.B.2
  • 8
    • 24944495682 scopus 로고    scopus 로고
    • CERT Coordination Centre, Retrieved from
    • CERT Coordination Centre. (2003). Annual Report. Retrieved from http://www.cert.org
    • (2003) Annual Report
  • 10
    • 0141733117 scopus 로고    scopus 로고
    • Modelling access policies using roles in requirements engineering
    • Crook, R., Ince, D., & Nuseibeh, B. (2003). Modelling access policies using roles in requirements engineering. Information and Software Technology, 45(14), 979-991,
    • (2003) Information and Software Technology , vol.45 , Issue.14 , pp. 979-991
    • Crook, R.1    Ince, D.2    Nuseibeh, B.3
  • 12
    • 0003610530 scopus 로고    scopus 로고
    • DTI, Information Security Breaches Survey, Retrieved from
    • DTI, Information Security Breaches Survey. (2004). Technical Report. Retrieved from http://www.dti.gov.uk
    • (2004) Technical Report
  • 16
    • 0142156745 scopus 로고    scopus 로고
    • Requirements engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard
    • LNCS 2813, Springer-Verlag
    • Giorgini, P., Massacci, F., & Mylopoulos, J. (2003). Requirements engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard. Proceedings of the International Conference on Conceptual Modelling (ER) (pp. 263-276). LNCS 2813, Springer-Verlag.
    • (2003) Proceedings of the International Conference On Conceptual Modelling (ER) , pp. 263-276
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3
  • 20
    • 84899297132 scopus 로고    scopus 로고
    • Note
    • IEEE Standard Glossary of Software Engineering Terminology. (1990). IEEE Std 729.
  • 28
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: A UML-based modelling language for model-driven security
    • LNCS 2460. Springer-Verlag
    • Lodderstedt, T., Basin, D., & Doser, J. (2002). SecureUML: A UML-based modelling language for model-driven security. Proceedings of the UML'02 (pp. 426-441). LNCS 2460. Springer-Verlag.
    • (2002) Proceedings of the UML'02 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 34
    • 23944475544 scopus 로고    scopus 로고
    • When security meets software engineering: A case of modelling secure information systems
    • Mouratidis, H., Giorgini P., & Manson, G. (2005a). When security meets software engineering: A case of modelling secure information systems. Information Systems, 30(8), 609-629.
    • (2005) Information Systems , vol.30 , Issue.8 , pp. 609-629
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.3
  • 36
    • 33646184981 scopus 로고    scopus 로고
    • Security patterns meet agent oriented software engineering: A complementary solution for developing security information systems
    • Lecture Notes in Computer Science 3716. Springer-Verlag
    • Mouratidis, H., Weiss, M., & Giorgini, P. (2005c). Security patterns meet agent oriented software engineering: A complementary solution for developing security information systems. Proceedings of the 24th International Conference on Conceptual Modelling (ER) (pp. 225-240). Lecture Notes in Computer Science 3716. Springer-Verlag.
    • (2005) Proceedings of the 24th International Conference On Conceptual Modelling (ER) , pp. 225-240
    • Mouratidis, H.1    Weiss, M.2    Giorgini, P.3
  • 38
    • 84899228823 scopus 로고    scopus 로고
    • Note
    • OMG. (2003). UML 2.0 Specification.
  • 40
    • 0022044193 scopus 로고
    • A taxonomy of current issues in requirements engineering
    • April
    • Roman, G. C. (1985, April). A taxonomy of current issues in requirements engineering. IEEE Computer, 18(4), 14-23.
    • (1985) IEEE Computer , vol.18 , Issue.4 , pp. 14-23
    • Roman, G.C.1
  • 42
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • Saltzer, J., & Schroeder, M. D. (1975, September). The protection of information in computer systems. Proceedings of the IEEE, 63(9), 1278-1308.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.D.2
  • 45
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre, G., & Opdahl, A. L. (2005). Eliciting security requirements with misuse cases. Requirements Engineering, 10(1), 34-44.
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 48
    • 8344261752 scopus 로고    scopus 로고
    • Modelling computer attacks: A target-centric ontology for intrusion-detection
    • Retrieved from
    • Undercoffer, J., & Pinkston, J. (2002). Modelling computer attacks: A target-centric ontology for intrusion-detection. Proceedings of the CADIP research symposium. Retrieved from http://www.cs.umbc.edu/cadip/2002Symposium
    • (2002) Proceedings of the CADIP Research Symposium
    • Undercoffer, J.1    Pinkston, J.2
  • 49
    • 0034291619 scopus 로고    scopus 로고
    • Handling obstacles in goal-oriented requirements engineering
    • Van Lamsweerde, A., & Letier, E. (2000). Handling obstacles in goal-oriented requirements engineering. Transactions of Software Engineering, 26(10), 978-1005.
    • (2000) Transactions of Software Engineering , vol.26 , Issue.10 , pp. 978-1005
    • van Lamsweerde, A.1    Letier, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.