메뉴 건너뛰기




Volumn 1, Issue 1, 2007, Pages 27-41

Secure information systems engineering: a manifesto

Author keywords

information systems engineering; integration of security; secure information systems development; security engineering; security requirements

Indexed keywords


EID: 79251488715     PISSN: 1751911X     EISSN: 17519128     Source Type: Journal    
DOI: 10.1504/IJESDF.2007.013590     Document Type: Article
Times cited : (6)

References (43)
  • 1
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases: use cases with hostile intent
    • Alexander, I. (2003) ‘Misuse cases: use cases with hostile intent’, IEEE Software, Vol. 20, pp.58–66.
    • (2003) IEEE Software , vol.20 , pp. 58-66
    • Alexander, I.1
  • 3
    • 17744389340 scopus 로고    scopus 로고
    • A requirements taxonomy for reducing web site privacy vulnerabilities
    • Anton, A.I. and Earp, J.B. (2004) ‘A requirements taxonomy for reducing web site privacy vulnerabilities’, Requirements Engineering, Vol. 9, No. 3, pp.169–185.
    • (2004) Requirements Engineering , vol.9 , Issue.3 , pp. 169-185
    • Anton, A.I.1    Earp, J.B.2
  • 9
    • 0141733117 scopus 로고    scopus 로고
    • Modelling access policies using roles in requirements engineering
    • Crook, R., Ince, D. and Nuseibeh, B. (2003) ‘Modelling access policies using roles in requirements engineering’, Information and Software Technology, Vol. 45, No. 14, pp.979–991.
    • (2003) Information and Software Technology , vol.45 , Issue.14 , pp. 979-991
    • Crook, R.1    Ince, D.2    Nuseibeh, B.3
  • 14
    • 2942757657 scopus 로고    scopus 로고
    • Engineering security requirements
    • Firesmith, D.G. (2003) ‘Engineering security requirements’, Journal of Object Technology, Vol. 2, No. 1.
    • (2003) Journal of Object Technology , vol.2 , Issue.1
    • Firesmith, D.G.1
  • 15
    • 0142156745 scopus 로고    scopus 로고
    • Requirements engineering meets security: a case study on modelling secure electronic transactions by VISA and Mastercard
    • LNCS 2813 Springer-Verlag
    • Giorgini, P., Massacci, F. and Mylopoulos, J. (2003) ‘Requirements engineering meets security: a case study on modelling secure electronic transactions by VISA and Mastercard’, Proceedings of the International Conference on Conceptual Modelling (ER), LNCS 2813, pp.263–276, Springer-Verlag.
    • (2003) Proceedings of the International Conference on Conceptual Modelling (ER) , pp. 263-276
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3
  • 19
    • 79953329648 scopus 로고    scopus 로고
    • Modeling conversation policies using permissions and obligations, in developments in agent communication
    • F. Dignum, R. van Eijk and M-P. Huget (Eds) Springer-Verlag, LNCS
    • Kagal, L. and Finin, T. (2005) ‘Modeling conversation policies using permissions and obligations, in developments in agent communication’, F. Dignum, R. van Eijk and M-P. Huget (Eds). Post-Proceedings of the AAMAS Workshop on Agent Communication, Springer-Verlag, LNCS.
    • (2005) Post-Proceedings of the AAMAS Workshop on Agent Communication
    • Kagal, L.1    Finin, T.2
  • 23
  • 25
    • 79955143136 scopus 로고    scopus 로고
    • Secure UML: a UML-based modelling language for model-driven security
    • Springer-Verlag
    • Lodderstedt, T., Basin, D. and Doser, J. (2002) Secure UML: a UML-based modelling language for model-driven security’, Proceedings of the UML’02, LNCS 2460, Springer-Verlag, pp.426–441.
    • (2002) Proceedings of the UML’02, LNCS 2460 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 31
    • 23944475544 scopus 로고    scopus 로고
    • When security meets software engineering: a case of modelling secure information systems
    • Mouratidis, H., Giorgini, P. and Manson, G. (2005) ‘When security meets software engineering: a case of modelling secure information systems’, Information Systems, Vol. 30, No. 8, pp.609–629.
    • (2005) Information Systems , vol.30 , Issue.8 , pp. 609-629
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.3
  • 33
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer, J. and Schroeder, M.D. (1975) ‘The protection of information in computer systems’, Proceedings of the IEEE, Vol. 63, No. 9, pp.1278–1308.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.D.2
  • 36
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre, G. and Opdahl, A.L. (2005) ‘Eliciting security requirements with misuse cases’, Requirements Engineering, Vol. 10, No. 1, pp.34–44.
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 38
    • 8344261752 scopus 로고    scopus 로고
    • Modelling computer attacks: a target-centric ontology for intrusion-detection
    • Undercoffer, J. and Pinkston, J. (2002) ‘Modelling computer attacks: a target-centric ontology for intrusion-detection’, Proceedings of the CADIP Research Symposium, Available at: http://www.cs.umbc.edu/cadip/2002Symposium/.
    • (2002) Proceedings of the CADIP Research Symposium
    • Undercoffer, J.1    Pinkston, J.2
  • 40
    • 0034291619 scopus 로고    scopus 로고
    • Handling obstacles in goal-oriented requirements engineering
    • Van Lamsweerde, A. and Letier, E. (2000) ‘Handling obstacles in goal-oriented requirements engineering’, Transactions of Software Engineering, Vol. 26, No. 10, pp.978–1005.
    • (2000) Transactions of Software Engineering , vol.26 , Issue.10 , pp. 978-1005
    • Van Lamsweerde, A.1    Letier, E.2
  • 43
    • 84949689154 scopus 로고    scopus 로고
    • An extensive presentation and discussion of these models are out of the scope of this chapter and this book
    • An extensive presentation and discussion of these models are out of the scope of this chapter and this book.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.