메뉴 건너뛰기




Volumn 5, Issue 5, 2011, Pages 296-306

On security development Lifecycle: Conceptual description of vulnerabilities, risks, and threats

Author keywords

Conceptual model; Risks; Security development lifecycle; Threats; Vulnerabilities

Indexed keywords

CONCEPTUAL MODEL; DATA FLOW DIAGRAMS; DESIGN PHASIS; REQUIREMENTS PHASE; SDL; SECURITY AND PRIVACY; SECURITY DEVELOPMENT LIFECYCLE; SECURITY REQUIREMENTS; SECURITY RISK ASSESSMENTS; SOFTWARE ASSURANCE; SOFTWARE DEVELOPER; SOFTWARE PRODUCTION; THREAT MODELING; THREATS; VULNERABILITIES;

EID: 79958056378     PISSN: 19759339     EISSN: None     Source Type: Journal    
DOI: 10.4156/jdcta.vol5.issue5.32     Document Type: Article
Times cited : (13)

References (23)
  • 1
    • 33645766952 scopus 로고    scopus 로고
    • PITAC, The President's Information Technology Advisory Committee, February
    • PITAC, "Cyber Security: A Crisis of Prioritization", The President's Information Technology Advisory Committee, February 2005. http://www.nitrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdf
    • (2005) Cyber Security: A Crisis of Prioritization
  • 2
    • 79958059693 scopus 로고    scopus 로고
    • FORTIFY, Whitepaper, Fortify Solutions to Strengthen and Streamline a Microsoft Security Development Lifecycle Implementation
    • FORTIFY, "Optimizing the Microsoft SDL for Secure Development", Whitepaper, Fortify Solutions to Strengthen and Streamline a Microsoft Security Development Lifecycle Implementation, 2010. http://www.fortify.com/servlet/download/public/Optimizing_the_Microsoft_SDL_for_Secure_Development.pdf
    • (2010) Optimizing the Microsoft SDL for Secure Development
  • 3
    • 79952768902 scopus 로고    scopus 로고
    • Implementing case-based reasoning technique to software requirements specifications quality analysis
    • Hajar Mat Jani, Salama A. Mostafa, "Implementing Case-Based Reasoning Technique to Software Requirements Specifications Quality Analysis", IJACT: International Journal of Advancements in Computing Technology, vol. 3, no. 1, pp. 23-31, 2011.
    • (2011) IJACT: International Journal of Advancements in Computing Technology , vol.3 , Issue.1 , pp. 23-31
    • Jani, H.M.1    Mostafa, S.A.2
  • 6
    • 78649767601 scopus 로고    scopus 로고
    • Technical Report CMUISR-10-106, Carnegie Mellon Univ
    • M. Abi-Antoun, J. M. Barne, "STRIDE-based Security Model in Acme", Technical Report CMUISR-10-106, Carnegie Mellon Univ., 2010. http://reportsarchive.adm.cs.cmu.edu/anon/isr2010/CMU-ISR-10-106.pdf
    • (2010) STRIDE-based Security Model in Acme
    • Abi-Antoun, M.1    Barne, J.M.2
  • 8
    • 33845953194 scopus 로고    scopus 로고
    • Some aspects of personal information theory
    • United States Military Academy, West Point, NY
    • Sabah Al-Fedaghi, "Some Aspects of Personal Information Theory", 7th Annual IEEE Information Assurance Workshop (IEEE-IAW 2006), United States Military Academy, West Point, NY, pp 155-162, 2006. http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=01652066
    • (2006) 7th Annual IEEE Information Assurance Workshop (IEEE-IAW 2006) , pp. 155-162
    • Al-Fedaghi, S.1
  • 9
    • 77952249802 scopus 로고    scopus 로고
    • States and conceptualization of software systems
    • Sabah Al-Fedaghi, "States and Conceptualization of Software Systems", International Review on Computers and Software (IRECOS), Vo. 4, No. 6, pp. 718-727, 2009. http://www.praiseworthyprize.com/IRECOS_latest.html#States_and_Conceptual_Modeling_of_Software_Systems
    • (2009) International Review on Computers and Software (IRECOS) , vol.4 , Issue.6 , pp. 718-727
    • Al-Fedaghi, S.1
  • 10
    • 79958024428 scopus 로고    scopus 로고
    • Conceptualization of business processes
    • Biopolis, Singapore, (hardcopy proceedings), December
    • Sabah Al-Fedaghi, "Conceptualization of Business Processes", IEEE Asia-Pacific Services Computing Conference (IEEE APSCC 2009), Biopolis, Singapore, pp. 75-79 (hardcopy proceedings), December 2009.
    • (2009) IEEE Asia-Pacific Services Computing Conference (IEEE APSCC 2009) , pp. 75-79
    • Al-Fedaghi, S.1
  • 11
    • 79952412137 scopus 로고    scopus 로고
    • Evolution of data into an information hierarchy
    • Sabah Al-Fedaghi, F. Al-Azmi, "Evolution of Data into an Information Hierarchy", Journal of Convergence Information Technology (JCIT), vol. 6, no. 2, pp. 9-21, 2011. http://www.aicit.org/JCIT/ppl/02-FASTJCIT4-965174.pdf
    • (2011) Journal of Convergence Information Technology (JCIT) , vol.6 , Issue.2 , pp. 9-21
    • Al-Fedaghi, S.1    Al-Azmi, F.2
  • 13
    • 77955348878 scopus 로고    scopus 로고
    • Addison-Wesley, Professional
    • Keith Brown, "The NET Developer's Guide to Windows Security", Addison-Wesley, Professional, 2004. http://alt.pluralsight.com/wiki/default.aspx/Keith.GuideBook/HomePage.html
    • (2004) The net developer's guide to windows security
    • Brown, K.1
  • 14
    • 79958043011 scopus 로고    scopus 로고
    • Evaluating vulnerabilities quantitatively based on the rank of web services confidentiality
    • Duan Youxiang, Gao Yang, "Evaluating Vulnerabilities Quantitatively Based On the Rank of Web Services Confidentiality", Journal of Next Generation Information Technology (JNIT), vol. 2, no. 1, pp. 81-87, 2011.
    • (2011) Journal of Next Generation Information Technology (JNIT) , vol.2 , Issue.1 , pp. 81-87
    • Youxiang, D.1    Yang, G.2
  • 15
  • 16
    • 79958046773 scopus 로고    scopus 로고
    • Qualys, "Severities KnowledgeBase", 2010. http://browsercheck.qualys.com/research/rnd/knowledge/severity/
    • (2010) Severities KnowledgeBase
    • Qualys1
  • 17
    • 79958034466 scopus 로고    scopus 로고
    • CORAS
    • CORAS, http://coras.sourceforge.net, 2006.
    • (2006)
  • 22
    • 79957556153 scopus 로고    scopus 로고
    • Developing secure systems with umlsec-from business processes to implementation
    • In A. Pfitzmann, D. Fox, M. Kohntopp (eds.), Kiel, Germany. Vieweg Verlag
    • Jan Jurjens, "Developing Secure Systems with UMLsec-From Business Processes to Implementation", In A. Pfitzmann, D. Fox, M. Kohntopp (eds.), Proc. Verl assliche IT-Systeme 2001-Sicherheit in komplexen IT-Infrastrukturen, Kiel, Germany. Vieweg Verlag, 2001.
    • (2001) Proc. Verl Assliche IT-Systeme 2001Sicherheit in komplexen it-infrastrukturen
    • Jurjens, J.1
  • 23
    • 79958073863 scopus 로고    scopus 로고
    • The Open Web Application Security Project (OWASP), 4 May
    • The Open Web Application Security Project (OWASP), "Application Threat Modeling", 4 May 2009. http://www.owasp.org/index.php?title=Application_Threat_Modeling&setlang=en
    • (2009) Application Threat Modeling


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.