메뉴 건너뛰기




Volumn 6606 LNCS, Issue , 2011, Pages 4-18

Supporting requirements engineers in recognising security issues

Author keywords

empirical study; natural language processing; requirements analysis; secure software engineering

Indexed keywords

BAYESIAN CLASSIFIER; DOMAIN SPECIFIC; EMPIRICAL STUDIES; ERROR PRONES; LABOUR-INTENSIVE; NATURAL LANGUAGE PROCESSING; REQUIREMENTS ANALYSIS; REQUIREMENTS ENGINEERS; SECURE SOFTWARE ENGINEERING; SECURITY AWARENESS; SECURITY EXPERTS; SECURITY ISSUES; SECURITY PROBLEMS; SECURITY REQUIREMENTS; SOFTWARE DEVELOPMENT PROCESS; SOFTWARE PROJECT;

EID: 79953098501     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19858-8_2     Document Type: Conference Paper
Times cited : (46)

References (29)
  • 1
    • 79953067803 scopus 로고    scopus 로고
    • International Standardization Organization Revision 2, CCMB-2007-09-001, CCMB- 2007-09-002 and CCMB-2007-09-003 September
    • International Standardization Organization. ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2, CCMB-2007-09-001, CCMB- 2007-09-002 and CCMB-2007-09-003 (September 2007)
    • (2007) ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1
  • 2
    • 77950516884 scopus 로고    scopus 로고
    • Eliciting security requirements and tracing them to design: An integration of common criteria, heuristics, and UMLsec
    • Houmb, S.H., Islam, S., Knauss, E., Jürens, J., Schneider, K.: Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec. Requirements Engineering Journal 15(1), 63-93 (2010)
    • (2010) Requirements Engineering Journal , vol.15 , Issue.1 , pp. 63-93
    • Houmb, S.H.1    Islam, S.2    Knauss, E.3    Jürens, J.4    Schneider, K.5
  • 6
    • 33947368645 scopus 로고    scopus 로고
    • Model-based security analysis in seven steps - A guided tour to the CORAS method
    • DOI 10.1007/s10550-007-0013-9
    • den Braber, F., Hogganvik, I., Lund, M., Stølen, K., Vraalsen, F.: Model-based security analysis in seven steps - a guided tour to the CORAS method. BT Technology Journal 25(1), 101-117 (2007) (Pubitemid 46455705)
    • (2007) BT Technology Journal , vol.25 , Issue.1 , pp. 101-117
    • Den Braber, F.1    Hogganvik, I.2    Lund, M.S.3    Stolen, K.4    Vraalsen, F.5
  • 7
    • 0001094070 scopus 로고
    • The use of the CCTA risk-analysis and management methodology [CRAMM] in health information systems
    • Degoulet, P., Lun, K., Piemme, T., Rienhoff, O. (eds.) Elsevier, North-Holland
    • Barber, B., Davey, J.: The use of the CCTA risk-analysis and management methodology [CRAMM] in health information systems. In: Degoulet, P., Lun, K., Piemme, T., Rienhoff, O. (eds.) MEDINFO 1992, pp. 1589-1593. Elsevier, North-Holland (1992)
    • (1992) MEDINFO 1992 , pp. 1589-1593
    • Barber, B.1    Davey, J.2
  • 9
    • 41149177720 scopus 로고    scopus 로고
    • Identifying nocuous ambiguities in natural language requirements
    • DOI 10.1109/RE.2006.31, 1704049, Proceedings - 14th IEEE International Requirements Engineering Conference, RE'06
    • Chantree, F., Nuseibeh, B., de Roeck, A., Willis, A.: Identifying Nocuous Ambiguities in Natural Language Requirements. In: Proceedings of the 14th IEEE International Requirements Engineering Conference, Minneapolis, USA, pp. 56-65. IEEE Computer Society, Los Alamitos (2006) (Pubitemid 351424200)
    • (2006) Proceedings of the IEEE International Conference on Requirements Engineering , pp. 56-65
    • Chantree, F.1    Nuseibeh, B.2    De Roeck, A.3    Willis, A.4
  • 10
    • 50949131690 scopus 로고    scopus 로고
    • Requirements for tools for ambiguity identification and measurement in natural language requirements specifications
    • Kiyavitskaya, N., Zeni, N., Mich, L., Berry, D.M.: Requirements for tools for ambiguity identification and measurement in natural language requirements specifications. Requirements Engineering Journal 13(3), 207-239 (2008)
    • (2008) Requirements Engineering Journal , vol.13 , Issue.3 , pp. 207-239
    • Kiyavitskaya, N.1    Zeni, N.2    Mich, L.3    Berry, D.M.4
  • 11
    • 3242783893 scopus 로고    scopus 로고
    • Web (January 2011)
    • Graham, P.: A Plan for Spam (2002) Web (January 2011), http://www.paulgraham.com/spam.html
    • (2002) A Plan for Spam
    • Graham, P.1
  • 18
    • 79953109717 scopus 로고    scopus 로고
    • TISPAN, ETSI: Telecommunications and internet converged services and protocols for advanced networking (TISPAN); services requirements and capabilities for customer networks connected to TISPAN NGN
    • TISPAN, ETSI: Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Services requirements and capabilities for customer networks connected to TISPAN NGN. Technical report, European Telecommunications Standards Institute
    • Technical Report, European Telecommunications Standards Institute
  • 21
    • 84979855000 scopus 로고
    • Dealing with security requirements during the development of information systems
    • Rolland, C., Cauvet, C., Bodart, F. (eds.) LNCS Springer, Heidelberg
    • Chung, L.: Dealing with Security Requirements During the Development of Information Systems. In: Rolland, C., Cauvet, C., Bodart, F. (eds.) CAiSE 1993. LNCS, vol. 685, pp. 234-251. Springer, Heidelberg (1993)
    • (1993) CAiSE 1993 , vol.685 , pp. 234-251
    • Chung, L.1
  • 22
    • 0007423745 scopus 로고    scopus 로고
    • A framework for dealing with and specifying security requirements in information systems
    • Katsikas, S.K., Gritzalis, D. (eds.) Chapman & Hall, Boca Raton
    • Dubois, E., Wu, S.: A framework for dealing with and specifying security requirements in information systems. In: Katsikas, S.K., Gritzalis, D. (eds.) SEC. IFIP Conference Proceedings, vol. 54, pp. 88-99. Chapman & Hall, Boca Raton (1996)
    • (1996) SEC. IFIP Conference Proceedings , vol.54 , pp. 88-99
    • Dubois, E.1    Wu, S.2
  • 23
    • 84942929509 scopus 로고    scopus 로고
    • Introducing abuse frames for analysing security requirements
    • IEEE Computer Society, Los Alamitos
    • Lin, L., Nuseibeh, B., Ince, D.C., Jackson, M., Moffett, J.D.: Introducing Abuse Frames for Analysing Security Requirements. In: RE, pp. 371-372. IEEE Computer Society, Los Alamitos (2003)
    • (2003) RE , pp. 371-372
    • Lin, L.1    Nuseibeh, B.2    Ince, D.C.3    Jackson, M.4    Moffett, J.D.5
  • 24
    • 0142156745 scopus 로고    scopus 로고
    • Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and mastercard
    • Song, I.-Y., Liddle, S.W., Ling, T.-W., Scheuermann, P. (eds.) LNCS Springer, Heidelberg
    • Giorgini, P., Massacci, F., Mylopoulos, J.: Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and mastercard. In: Song, I.-Y., Liddle, S.W., Ling, T.-W., Scheuermann, P. (eds.) ER 2003. LNCS, vol. 2813, pp. 263-276. Springer, Heidelberg (2003)
    • (2003) ER 2003 , vol.2813 , pp. 263-276
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3
  • 29
    • 57049148008 scopus 로고    scopus 로고
    • Automating the extraction of rights and obligations for regulatory compliance
    • Li, Q., Spaccapietra, S., Yu, E., Olivé, A. (eds.) LNCS Springer, Heidelberg
    • Kiyavitskaya, N., Zeni, N., Breaux, T.D., Antón, A.I., Cordy, J.R., Mich, L., Mylopoulos, J.: Automating the extraction of rights and obligations for regulatory compliance. In: Li, Q., Spaccapietra, S., Yu, E., Olivé, A. (eds.) ER 2008. LNCS, vol. 5231, pp. 154-168. Springer, Heidelberg (2008)
    • (2008) ER 2008 , vol.5231 , pp. 154-168
    • Kiyavitskaya, N.1    Zeni, N.2    Breaux, T.D.3    Antón, A.I.4    Cordy, J.R.5    Mich, L.6    Mylopoulos, J.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.