메뉴 건너뛰기




Volumn 16, Issue 2, 2011, Pages 101-116

Goal-driven risk assessment in requirements engineering

Author keywords

Goal oriented requirement engineering; Requirement analysis; Risk assessment

Indexed keywords

CONCEPTUAL FRAMEWORKS; CRITICAL ACTIVITIES; FORMAL FRAMEWORK; GOAL MODELING; GOAL-ORIENTED APPROACH; GOAL-ORIENTED REQUIREMENT ENGINEERING; QUALITATIVE REASONING; REQUIREMENT ANALYSIS; REQUIREMENTS ANALYSIS; SOFTWARE SYSTEMS; STAKEHOLDER INTEREST; SYSTEM REQUIREMENTS; TECHNICAL ASPECTS;

EID: 79955934437     PISSN: 09473602     EISSN: 1432010X     Source Type: Journal    
DOI: 10.1007/s00766-010-0112-x     Document Type: Article
Times cited : (83)

References (44)
  • 9
    • 0025791156 scopus 로고
    • Software risk management: principles and practices
    • doi:10.1109/52.62930
    • Boehm BW (1991) Software risk management: principles and practices. IEEE Softw 8(1): 32-41. doi: 10. 1109/52. 62930.
    • (1991) IEEE Softw , vol.8 , Issue.1 , pp. 32-41
    • Boehm, B.W.1
  • 11
  • 13
    • 0036036577 scopus 로고    scopus 로고
    • Security attribute evaluation method: a cost-benefit approach
    • ACM Press, New York, NY, USA, doi: 10. 1145/581339. 581370
    • Butler SA (2002) Security attribute evaluation method: a cost-benefit approach. In: Proceedings of the 24th international conference on software engineering, ACM Press, New York, NY, USA, pp 232-240. doi: 10. 1145/581339. 581370.
    • (2002) Proceedings of the 24th international conference on software engineering , pp. 232-240
    • Butler, S.A.1
  • 18
    • 16244392439 scopus 로고    scopus 로고
    • Towards a unified approach to the representation of, and reasoning with, probabilistic risk information about software and its system interface
    • IEEE Computer Society Press, Silver Spring, MD
    • Feather MS (2004) Towards a unified approach to the representation of, and reasoning with, probabilistic risk information about software and its system interface. In: Proceedings of the 15th IEEE international symposium on software software reliability engineering, IEEE Computer Society Press, Silver Spring, MD, pp 391-402.
    • (2004) Proceedings of the 15th IEEE international symposium on software software reliability engineering , pp. 391-402
    • Feather, M.S.1
  • 20
    • 15944398393 scopus 로고    scopus 로고
    • A software fault tree approach to requirements analysis of an intrusion detection system
    • Helmer G, Wong J, Slagell M, Honavar V, Miller L, Lutz R (2002) A software fault tree approach to requirements analysis of an intrusion detection system. Requir Eng J 7(4): 207-220.
    • (2002) Requir Eng J , vol.7 , Issue.4 , pp. 207-220
    • Helmer, G.1    Wong, J.2    Slagell, M.3    Honavar, V.4    Miller, L.5    Lutz, R.6
  • 21
    • 11144304109 scopus 로고    scopus 로고
    • Defining risk
    • Holton GA (2004) Defining risk. Financ Anal J 60(6): 19-25.
    • (2004) Financ Anal J , vol.60 , Issue.6 , pp. 19-25
    • Holton, G.A.1
  • 24
    • 0039503784 scopus 로고    scopus 로고
    • HAZOP-past and future
    • Kletz TA (1997) HAZOP-past and future. Reliab Eng Syst Saf 55(3): 263-266.
    • (1997) Reliab Eng Syst Saf , vol.55 , Issue.3 , pp. 263-266
    • Kletz, T.A.1
  • 25
    • 0034291619 scopus 로고    scopus 로고
    • Handling obstacles in goal-oriented requirements engineering
    • doi:10.1109/32.879820
    • van Lamsweerde A, Letier E (2000) Handling obstacles in goal-oriented requirements engineering. IEEE Trans Softw Eng 26(10): 978-1005. doi: 10. 1109/32. 879820.
    • (2000) IEEE Trans Softw Eng , vol.26 , Issue.10 , pp. 978-1005
    • van Lamsweerde, A.1    Letier, E.2
  • 30
    • 0031499162 scopus 로고    scopus 로고
    • Requirements analysis using forward and backward search
    • Lutz RR, Woodhouse RM (1997) Requirements analysis using forward and backward search. Ann Softw Eng 3(1): 459-475.
    • (1997) Ann Softw Eng , vol.3 , Issue.1 , pp. 459-475
    • Lutz, R.R.1    Woodhouse, R.M.2
  • 33
    • 85045573601 scopus 로고    scopus 로고
    • Using abuse case models for security requirements analysis
    • Phoenix, AZ, USA, doi: 10. 1109/CSAC. 1999. 816013
    • McDermott J, Fox C (1999) Using abuse case models for security requirements analysis. In: Proceedings of 15th annual computer security applications conference, Phoenix, AZ, USA, pp 55-64. doi: 10. 1109/CSAC. 1999. 816013.
    • (1999) Proceedings of 15th annual computer security applications conference , pp. 55-64
    • McDermott, J.1    Fox, C.2
  • 36
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: modeling security threats
    • Schneier B (1999) Attack trees: modeling security threats. Dr Dobbï J 12(24): 21-29.
    • (1999) Dr Dobbï J , vol.12 , Issue.24 , pp. 21-29
    • Schneier, B.1
  • 37
  • 40
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • doi:10.1007/s00766-004-0194-4
    • Sindre G, Opdahl AL (2005) Eliciting security requirements with misuse cases. Requir Eng J 10(1): 34-44. doi: 10. 1007/s00766-004-0194-4.
    • (2005) Requir Eng J , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.