메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Integrating formal analysis and design to preserve security properties

Author keywords

[No Author keywords available]

Indexed keywords

FORMAL ANALYSIS; NETWORK SYSTEMS; SECURE SYSTEMS; SECURITY DESIGNS; SECURITY PROPERTIES; SECURITY REQUIREMENTS; SECURITY VULNERABILITIES;

EID: 78650760435     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2009.267     Document Type: Conference Paper
Times cited : (8)

References (16)
  • 3
    • 84869272915 scopus 로고    scopus 로고
    • CERT
    • CERT, http://www.cert.org/stats/cert-stats.html.
  • 4
    • 0034291619 scopus 로고    scopus 로고
    • Handling Obstacles in Goal-Oriented Requirements Engineering
    • Oct
    • A. van Lamsweerde and E. Letier, "Handling Obstacles in Goal-Oriented Requirements Engineering", IEEE Transactions on Software Engineering, Special Issue on Exception Handling, Vol. 26 No. 10, Oct. 2000, 978-1005.
    • (2000) IEEE Transactions on Software Engineering , vol.26 , Issue.10 , pp. 978-1005
    • van Lamsweerde, A.1    Letier, E.2
  • 5
    • 50849153948 scopus 로고
    • On understanding Laws, evolution and conversation in the large program lifecycle
    • Lehman M. M. "On understanding Laws, evolution and conversation in the large program lifecycle.", Journal of Software & Systems, vol. 1, pp. 213 - 221, 1980.
    • (1980) Journal of Software & Systems , vol.1 , pp. 213-221
    • Lehman, M.M.1
  • 8
    • 63349091841 scopus 로고    scopus 로고
    • Goal-Oriented, B-Based, Formal Derivation of Security Design Specifications from Security Requirements
    • Barcelona, Spain
    • Abdel-Moneim, Riham, et. al., "Goal-Oriented, B-Based, Formal Derivation of Security Design Specifications from Security Requirements", Symposium on Requirements Engineering for Information Security, Barcelona, Spain, 2008.
    • (2008) Symposium on Requirements Engineering for Information Security
    • Abdel-Moneim, R.1    et., al.2
  • 10
    • 17744386721 scopus 로고    scopus 로고
    • Using a Security Requirements Engineering Methodology in Practice: The Compliance with The Italian Data Protection Legislation
    • Massacci, Fabio, et. al., "Using a Security Requirements Engineering Methodology in Practice: The Compliance with The Italian Data Protection Legislation", Computer Standards & Interfaces, issue 27, pg. 445-455, 2005.
    • (2005) Computer Standards & Interfaces , Issue.27 , pp. 445-455
    • Massacci, F.1    et., al.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.