메뉴 건너뛰기




Volumn 14, Issue 3, 2011, Pages 294-304

An architectural systems engineering methodology for addressing cyber security

Author keywords

cybersecurity; security architecture; security metrics; systems security

Indexed keywords

ARCHITECTURAL APPROACH; ARCHITECTURAL FRAMEWORKS; ARCHITECTURAL SOLUTIONS; ARCHITECTURAL SYSTEMS; CRITICAL SOLUTION; CYBER SECURITY; DESIGN TRADEOFF; ENGINEERING METHODOLOGY; PERIMETER SECURITY; SECURITY ARCHITECTURE; SECURITY DESIGN; SECURITY METRICS; SYSTEM SECURITY; SYSTEMS SECURITY;

EID: 79953660412     PISSN: 10981241     EISSN: 15206858     Source Type: Journal    
DOI: 10.1002/sys.20182     Document Type: Article
Times cited : (27)

References (37)
  • 4
    • 34848837946 scopus 로고    scopus 로고
    • Pattern-driven architectural partitioning, balancing functional and non-functional requirements
    • P. Avgeriou, and, N. Harrison, Pattern-driven architectural partitioning, balancing functional and non-functional requirements, Second Int Conf Digital Telecommun, IEEE, 2007.
    • (2007) Second Int Conf Digital Telecommun, IEEE
    • Avgeriou, P.1    Harrison, N.2
  • 5
    • 79960193626 scopus 로고    scopus 로고
    • Systems security engineering: A critical discipline of systems engineering
    • K. Baldwin, Systems security engineering: A critical discipline of systems engineering, INCOSE INSIGHT 12 (2009), 11-13.
    • (2009) INCOSE INSIGHT , vol.12 , pp. 11-13
    • Baldwin, K.1
  • 11
    • 34249853372 scopus 로고    scopus 로고
    • Applying pattern concepts to systems (enterprise) architecture
    • R. Cloutier, and, D. Verma, Applying pattern concepts to systems (enterprise) architecture, J Enterprise Architects 2 (2) (2006), 138-154.
    • (2006) J Enterprise Architects , vol.2 , Issue.2 , pp. 138-154
    • Cloutier, R.1    Verma, D.2
  • 12
    • 62649134605 scopus 로고    scopus 로고
    • Defense Science Board, Department of Defense, Washington, DC
    • Defense Science Board, High performance microchip supply, Department of Defense, Washington, DC, 2005.
    • (2005) High Performance Microchip Supply
  • 16
    • 79960170480 scopus 로고    scopus 로고
    • On discovery and display of agile security patterns
    • Stevens Institute of Technology, Hoboken, NJ
    • R. Dove, and, L. Shirey, On discovery and display of agile security patterns, Conf Syst Eng Res, Stevens Institute of Technology, Hoboken, NJ, 2010.
    • (2010) Conf Syst Eng Res
    • Dove, R.1    Shirey, L.2
  • 17
  • 18
    • 0010729284 scopus 로고    scopus 로고
    • 2nd edition, Microsoft Press, Seattle, WA
    • M. Howard, Writing secure code, 2nd edition, Microsoft Press, Seattle, WA, 2002.
    • (2002) Writing Secure Code
    • Howard, M.1
  • 21
    • 79960153227 scopus 로고    scopus 로고
    • ISO/IEC (International Organization for Standardization/International Electrotechnical Commission), Information technologyCsystems security engineeringCcapability maturity model, sse-cmm, ISO/IEC 28127, Geneva, Switzerland, 2002
    • ISO/IEC (International Organization for Standardization/International Electrotechnical Commission), Information technologyCsystems security engineeringCcapability maturity model, sse-cmm, ISO/IEC 28127, Geneva, Switzerland, 2002.
  • 22
    • 79960186978 scopus 로고    scopus 로고
    • ISO/IEC (International Organization for Standardization/International Electrotechnical Commission), Information technologyCsecurity techniquesCinformation security management systemsCrequirements, ISO/IEC 27001, International Standards Organization, Geneva, Switzerland, 2005a
    • ISO/IEC (International Organization for Standardization/International Electrotechnical Commission), Information technologyCsecurity techniquesCinformation security management systemsCrequirements, ISO/IEC 27001, International Standards Organization, Geneva, Switzerland, 2005a.
  • 23
    • 79960183140 scopus 로고    scopus 로고
    • ISO/IEC (International Organization for Standardization/International Electrotechnical Commission), Information technologyCsecurity techniquesCcode of practice for information security management, ISO/IEC 27002, Geneva, Switzerland, 2005b
    • ISO/IEC (International Organization for Standardization/International Electrotechnical Commission), Information technologyCsecurity techniquesCcode of practice for information security management, ISO/IEC 27002, Geneva, Switzerland, 2005b.
  • 24
    • 79960164955 scopus 로고    scopus 로고
    • ISO/IEC (International Organization for Standardization/International Electrotechnical Commission), Systems and software engineeringCsystems and software assuranceCpart 2: Assurance case, ISO/IEC 15026, Geneva, Switzerland, 2009
    • ISO/IEC (International Organization for Standardization/International Electrotechnical Commission), Systems and software engineeringCsystems and software assuranceCpart 2: Assurance case, ISO/IEC 15026, Geneva, Switzerland, 2009.
  • 27
    • 51849117996 scopus 로고    scopus 로고
    • FBI says the military had bogus computer gear
    • May 9, 2008
    • J. Markoff, FBI says the military had bogus computer gear, The New York Times, May 9, 2008.
    • The New York Times
    • Markoff, J.1
  • 29
    • 78449232020 scopus 로고    scopus 로고
    • Perseus Books Group, Jackson, TN
    • J. Menn, Fatal system error, Perseus Books Group, Jackson, TN, 2010.
    • (2010) Fatal System Error
    • Menn, J.1
  • 30
    • 79960163679 scopus 로고    scopus 로고
    • Using the U.S. Department of Defense architecture framework to build security into the lifecycle
    • W.P. Mulokey, Using the U.S. Department of Defense architecture framework to build security into the lifecycle, INCOSE Insight, 12 (2009), 27-29.
    • (2009) INCOSE Insight , vol.12 , pp. 27-29
    • Mulokey, W.P.1
  • 34
    • 79960168235 scopus 로고    scopus 로고
    • US Comptroller General, Report to Chairman, Committee on Government Operations, House of Representatives of the United States, Washington, DC, May 1981
    • US Comptroller General, Report to Chairman, Committee on Government Operations, House of Representatives of the United States, Washington, DC, May 1981.
  • 36
    • 79960154842 scopus 로고    scopus 로고
    • F.D. Kramer, S.H. Starr, and L. Wentz (Editors), Potomac Books, Dulles, VA Chap. 18
    • C. Wilson, ACybercrime,@ Cyberpower and national security, F.D. Kramer, S.H. Starr, and L. Wentz (Editors), Potomac Books, Dulles, VA, 2009, Chap. 18.
    • (2009) A Cybercrime,@ Cyberpower and National Security
    • Wilson, C.1
  • 37
    • 72449180476 scopus 로고    scopus 로고
    • Reflections on cyber security
    • W. Wulf, and, A. Jones, Reflections on cyber security, Sci Mag 326 (2009), 943-944.
    • (2009) Sci Mag , vol.326 , pp. 943-944
    • Wulf, W.1    Jones, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.