메뉴 건너뛰기




Volumn 1, Issue 2, 2007, Pages 129-156

Properties for security measures of software products

Author keywords

Quality attributes; Quality engineering; Requirements engineering; Security metrics; Software metrics; Software security

Indexed keywords


EID: 79957863416     PISSN: 19350090     EISSN: 23250399     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (10)

References (23)
  • 1
    • 0002398308 scopus 로고    scopus 로고
    • Property-based software engineering measurement
    • L. C. Briand, S. Morasca, V. R. Basili, Property-based software engineering measurement, IEEE TSE, 22(1996), 68-86.
    • (1996) IEEE TSE , vol.22 , pp. 68-86
    • Briand, L.C.1    Morasca, S.2    Basili, V.R.3
  • 2
    • 2642519111 scopus 로고
    • Privilege graph: an extension to the typed access matrix model
    • M. Dacier, Y. Deswarte, Privilege graph: an extension to the typed access matrix model, Lecture Notes in Computer Science, 875(1994), 319-334.
    • (1994) Lecture Notes in Computer Science , vol.875 , pp. 319-334
    • Dacier, M.1    Deswarte, Y.2
  • 3
    • 0020846316 scopus 로고
    • Selection process for security packages
    • J. H. P. Eloff, Selection process for security packages, Computers & Security, 2(1983), 159-167.
    • (1983) Computers & Security , vol.2 , pp. 159-167
    • Eloff, J.H.P.1
  • 5
    • 0028393055 scopus 로고
    • Software measurement: a necessary scientific basis
    • N. Fenton, Software measurement: a necessary scientific basis, IEEE TSE, 20(1994), 199-206.
    • (1994) IEEE TSE , vol.20 , pp. 199-206
    • Fenton, N.1
  • 7
    • 33749049980 scopus 로고    scopus 로고
    • Agencies Seek Security Measures
    • D. Frank, Agencies Seek Security Measures, CIO Magazine: http://www.cio.com, 2000.
    • (2000) CIO Magazine
    • Frank, D.1
  • 8
    • 84937653154 scopus 로고
    • Towards a framework for software measurement validation
    • B. Kitchenham, S. L. Pfleeger, N. Fenton, Towards a framework for software measurement validation, IEEE TSE, 21(1995), 929-943.
    • (1995) IEEE TSE , vol.21 , pp. 929-943
    • Kitchenham, B.1    Pfleeger, S.L.2    Fenton, N.3
  • 9
    • 0005261096 scopus 로고    scopus 로고
    • Reply to: Comments on towards a framework for software measurement validation
    • B. Kitchenham, S. L. Pfleege, N. Fenton, Reply to: Comments on towards a framework for software measurement validation, IEEE TSE, 23(1997), 187-189.
    • (1997) IEEE TSE , vol.23 , pp. 187-189
    • Kitchenham, B.1    Pfleege, S.L.2    Fenton, N.3
  • 14
  • 15
    • 12344275676 scopus 로고    scopus 로고
    • Model-based evaluation: from dependability to security
    • D. M. Nicol, W. H. Sanders, K. S. Trivedi, Model-based evaluation: from dependability to security, IEEE TDSC, 1(2004), 48-65.
    • (2004) IEEE TDSC , vol.1 , pp. 48-65
    • Nicol, D.M.1    Sanders, W.H.2    Trivedi, K.S.3
  • 16
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • J. Saltzer, M. Schroeder, The protection of information in computer systems, Proc. of the IEEE, 63(1975), 1278-1308.
    • (1975) Proc. of the IEEE , vol.63 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 18
    • 84897012888 scopus 로고
    • User definable domains as a mechanism for implementing the least privilege principle
    • T. A. Smith, User definable domains as a mechanism for implementing the least privilege principle, Proceedings of 9th National Computer Security Conference, (1986), 143-148.
    • (1986) Proceedings of 9th National Computer Security Conference , pp. 143-148
    • Smith, T.A.1
  • 20
    • 0026822963 scopus 로고
    • A formal program complexity model and its applications
    • J. Tian, M. V. Zelkowitz, A formal program complexity model and its applications, J. Syst. Soft., 17(1992), 253-266.
    • (1992) J. Syst. Soft. , vol.17 , pp. 253-266
    • Tian, J.1    Zelkowitz, M.V.2
  • 22
    • 0346052082 scopus 로고    scopus 로고
    • Towards a framework of security measuremen
    • Baltimore, Maryland
    • C. Wang, W. A. Wulf, Towards a framework of security measuremen, 20th NISSC Proceedings, Baltimore, Maryland, (1997), 522-533.
    • (1997) 20th NISSC Proceedings , pp. 522-533
    • Wang, C.1    Wulf, W.A.2
  • 23
    • 0024071092 scopus 로고
    • Evaluating software complexity measures
    • E. J. Weyuker, Evaluating software complexity measures, IEEE TSE, 14(1988), 1357-1365.
    • (1988) IEEE TSE , vol.14 , pp. 1357-1365
    • Weyuker, E.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.