메뉴 건너뛰기




Volumn , Issue , 2006, Pages 33-43

An extended misuse case notation: Including vulnerabilities and the insider threat

Author keywords

[No Author keywords available]

Indexed keywords

REQUIREMENTS ENGINEERING; RISK ANALYSIS;

EID: 77954606675     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (45)

References (22)
  • 1
    • 84905870046 scopus 로고    scopus 로고
    • Unified modeling language: Superstructure. August
    • Unified modeling language: Superstructure. Technical report, Object Management Group (OMG), August 2005. http://www.omg.org.
    • (2005) Technical Report, Object Management Group (OMG)
  • 3
    • 84911351121 scopus 로고    scopus 로고
    • Modelling the interplay of conflicting goals with use and misuse cases
    • London, UK, CEUR Workshop Proceedings
    • I. Alexander. Modelling the interplay of conflicting goals with use and misuse cases. In Goal-Oriented Business-Process Modeling (GBMP) 2002, volume 109, London, UK, 2002. CEUR Workshop Proceedings.
    • (2002) Goal-Oriented Business-Process Modeling (GBMP) 2002 , vol.109
    • Alexander, I.1
  • 5
    • 0037299044 scopus 로고    scopus 로고
    • Misuse cases help to elicit non-functional requirements
    • I. Alexander. Misuse cases help to elicit non-functional requirements. Computing & Control Engineering Journal, 14(1):40-45, 2003.
    • (2003) Computing & Control Engineering Journal , vol.14 , Issue.1 , pp. 40-45
    • Alexander, I.1
  • 6
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases: Use cases with hostile intent
    • I. Alexander. Misuse cases: Use cases with hostile intent. IEEE Software, 20(1):58-66, 2003.
    • (2003) IEEE Software , vol.20 , Issue.1 , pp. 58-66
    • Alexander, I.1
  • 10
    • 3042647673 scopus 로고    scopus 로고
    • Misuse and abuse cases: Getting past the positive
    • May/June
    • P. Hope, G. McGraw, and A. I. Anton. Misuse and abuse cases: Getting past the positive. IEEE Security & Privacy, 2(3):90-92, May/June 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.3 , pp. 90-92
    • Hope, P.1    McGraw, G.2    Anton, A.I.3
  • 13
    • 33144456824 scopus 로고    scopus 로고
    • Addison-Wesley Software Security Series. Addison-Wesley (Pearson Education), Boston, 1 edition, ISBN: 0321356705
    • G. McGraw. Software Security-Building Security In. Addison-Wesley Software Security Series. Addison-Wesley (Pearson Education), Boston, 1 edition, 2006. ISBN: 0321356705.
    • (2006) Software Security-Building Security in
    • Mcgraw, G.1
  • 16
    • 58149107875 scopus 로고    scopus 로고
    • Capturing security requirements through misuse cases
    • Tromsø, Norway
    • G. Sindre and A. L. Opdahl. Capturing security requirements through misuse cases. In Norsk Informatikkonferanse (NIK), Tromsø, Norway, 2001.
    • (2001) Norsk Informatikkonferanse (NIK)
    • Sindre, G.1    Opdahl, A.L.2
  • 18
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirments with misuse cases
    • G. Sindre and A. L. Opdahl. Eliciting security requirments with misuse cases. Requirements Engineering, 10(1):34-44, 2005.
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 20
    • 10944258302 scopus 로고    scopus 로고
    • Microsoft Press U.S., ISBN: 0735619913
    • F. Swiderski. Threat Modeling. Microsoft Press U.S., 2004. ISBN: 0735619913.
    • (2004) Threat Modeling
    • Swiderski, F.1
  • 21
    • 4344569744 scopus 로고    scopus 로고
    • Risk analysis in software design
    • D. Verdon and G. McGraw. Risk analysis in software design. IEEE Security & Privacy, 2(4):79-84, 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.4 , pp. 79-84
    • Verdon, D.1    Mcgraw, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.