메뉴 건너뛰기




Volumn 10, Issue 3, 2011, Pages 369-394

A framework to support alignment of secure software engineering with legal regulations

Author keywords

Legal constraints; Modelling regulations; Non functional properties; Secure software engineering; Secure Tropos; Security requirements; UMLsec

Indexed keywords

LEGAL CONSTRAINT; MODELLING REGULATIONS; NON FUNCTIONAL PROPERTIES; SECURE SOFTWARE ENGINEERING; SECURE TROPOS; SECURITY REQUIREMENTS; UMLSEC;

EID: 79959729769     PISSN: 16191366     EISSN: 16191374     Source Type: Journal    
DOI: 10.1007/s10270-010-0154-z     Document Type: Article
Times cited : (39)

References (43)
  • 2
    • 38549168397 scopus 로고    scopus 로고
    • MOQARE: misuse-oriented quality requirements engineering
    • Herrmann, A., Paech B.: MOQARE: misuse-oriented quality requirements engineering. Requir. Eng. J. 13(1), 73-86 (2008).
    • (2008) Requir. Eng. J. , vol.13 , Issue.1 , pp. 73-86
    • Herrmann, A.1    Paech, B.2
  • 5
    • 79959686783 scopus 로고    scopus 로고
    • Bundesdatenschutzgesetz - Federal Data Protection Act (as of 15 November 2006)
    • Bundesdatenschutzgesetz - Federal Data Protection Act (as of 15 November 2006), http://www.bfdi.bund.de.
  • 7
    • 40449096402 scopus 로고    scopus 로고
    • Security requirements engineering: a framework for representation and analysis
    • Haley C. B., Laney R. C., Moffett J. D., Nuseibeh B.: Security requirements engineering: a framework for representation and analysis. IEEE Trans. Softw. Eng. 34(1), 133-153 (2008).
    • (2008) IEEE Trans. Softw. Eng. , vol.34 , Issue.1 , pp. 133-153
    • Haley, C.B.1    Laney, R.C.2    Moffett, J.D.3    Nuseibeh, B.4
  • 9
    • 2942757657 scopus 로고    scopus 로고
    • Engineering security requirements
    • Firesmith, D.: Engineering security requirements. J. Obj. Technol. 2(1) http://www.jot.fm/issues/issues_2003_01/column6 (2003).
    • (2003) J. Obj. Technol , vol.2 , Issue.1
    • Firesmith, D.1
  • 10
    • 33751416458 scopus 로고    scopus 로고
    • A common criterion based security requirements engineering process for the development of secure information system
    • Mellado D., Medina E., Piattini M.: A common criterion based security requirements engineering process for the development of secure information system. Comput. Stand. Interfaces 29, 244-253 (2007).
    • (2007) Comput. Stand. Interfaces , vol.29 , pp. 244-253
    • Mellado, D.1    Medina, E.2    Piattini, M.3
  • 12
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre G., Opdahl A. L.: Eliciting security requirements with misuse cases. Requir. Eng. 10(1), 34-44 (2005).
    • (2005) Requir. Eng. , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 15
    • 33746038490 scopus 로고    scopus 로고
    • Towards a comprehensive framework for secure systems development, CAiSE 2006
    • Springer, Berlin
    • Mouratidis, H., Jürjens, J., Fox, J.: Towards a comprehensive framework for secure systems development, CAiSE 2006. Lecture Notes in Computer Science, vol. 4001, pp. 48-62. Springer, Berlin (2006).
    • (2006) Lecture Notes In Computer Science , vol.4001 , pp. 48-62
    • Mouratidis, H.1    Jürjens, J.2    Fox, J.3
  • 16
    • 23944475544 scopus 로고    scopus 로고
    • When security meets software engineering: a case of modelling secure information systems
    • Mouratidis H., Giorgini P., Manson G.: When security meets software engineering: a case of modelling secure information systems. Inf. Syst. Elsevier 30(8), 609-629 (2005).
    • (2005) Inf. Syst. Elsevier , vol.30 , Issue.8 , pp. 609-629
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.3
  • 18
    • 34548508691 scopus 로고    scopus 로고
    • Security Attack Testing (SAT)-testing the security of information systems at design time
    • Mouratidis H., Giorgini P.: Security Attack Testing (SAT)-testing the security of information systems at design time. Inf. Syst. 32(8), 1166-1183 (2007).
    • (2007) Inf. Syst. , vol.32 , Issue.8 , pp. 1166-1183
    • Mouratidis, H.1    Giorgini, P.2
  • 20
    • 34249004734 scopus 로고    scopus 로고
    • Secure tropos: a security-oriented extension of the tropos methodology
    • Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. (IJSEKE) 17(2), 285-309 (2007).
    • (2007) Int. J. Softw. Eng. Knowl. Eng. (IJSEKE) , vol.17 , Issue.2 , pp. 285-309
    • Mouratidis, H.1    Giorgini, P.2
  • 21
    • 79959722918 scopus 로고    scopus 로고
    • Information society, Summary of legislation, European Commission
    • Information society, Summary of legislation, European Commission, http://europa.eu/legislation_summaries/information_society/index_en.htm.
  • 22
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer, J., Schroeder, M.: The protection of information in computer systems. Proc. IEEE 63(9), 1278-1308 (1975).
    • (1975) Proc. IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 28
    • 79959717835 scopus 로고    scopus 로고
    • Medical Privacy-National Standards to Protect the Privacy of Personal Health Information. Office for Civil Rights, US Department of Health and Human Services
    • Medical Privacy-National Standards to Protect the Privacy of Personal Health Information. Office for Civil Rights, US Department of Health and Human Services. http://www.hhs.gov/ocr/hipaa/finalreg.html (2000).
    • (2000)
  • 29
    • 84899324292 scopus 로고    scopus 로고
    • Identifying security requirements using the security quality requirements engineering (SQUARE) method
    • Idea Publishing Group, Miami
    • Mead, N. R.: Identifying security requirements using the security quality requirements engineering (SQUARE) method. In: Integrating Security and Software Engineering, pp. 44-69. Idea Publishing Group, Miami (2006).
    • (2006) Integrating Security and Software Engineering , pp. 44-69
    • Mead, N.R.1
  • 30
    • 79959750883 scopus 로고    scopus 로고
    • Online news of November 15, 2004
    • Online news of November 15, 2004, http://digital.dmreview.com/dmreview.
  • 35
    • 79959724230 scopus 로고    scopus 로고
    • Privacy Guidelines for Developing Software Products and Services, Version 3. 1, September, 2008
    • Privacy Guidelines for Developing Software Products and Services, Version 3. 1, September, 2008, http://download.microsoft.com.
  • 37
    • 79959760833 scopus 로고    scopus 로고
    • Security requirements addressing security risks for improving software quality
    • Technical Report TUM-I0811, Technische Universität München, 2008, Munich, Germany
    • Islam, S., Dong, W.: Security requirements addressing security risks for improving software quality. In: Workshop-Band Software-Qualitätsmodellierung und -bewertung (SQMB '08), Technical Report TUM-I0811, Technische Universität München, 2008, Munich, Germany (2008).
    • (2008) Workshop-Band Software-Qualitätsmodellierung Und -bewertung (SQMB '08)
    • Islam, S.1    Dong, W.2
  • 38
    • 79959717366 scopus 로고    scopus 로고
    • Incorporating security requirements from legal regulations into UMLsec model, Modelling Security Workshop (MODSEC08)
    • France, September
    • Islam, S., Jürjens, J.: Incorporating security requirements from legal regulations into UMLsec model, Modelling Security Workshop (MODSEC08). In: Association with MODELS '08, Toulouse, France, September (2008).
    • (2008) Association With MODELS '08, Toulouse
    • Islam, S.1    Jürjens, J.2
  • 41
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing regulator rules for privacy and security requirements
    • Breaux, T. D, Antón, A. I.: Analyzing regulator rules for privacy and security requirements. IEEE Trans. Softw. Eng. 34(1), 5-20 (2008).
    • (2008) IEEE Trans. Softw. Eng. , vol.34 , Issue.1 , pp. 5-20
    • Breaux, T.D.1    Antón, A.I.2
  • 43
    • 0002953848 scopus 로고
    • Fundamental legal conceptions as applied in judicial reasoning
    • Hohfeld, W. N.: Fundamental legal conceptions as applied in judicial reasoning. Yale Law J. 23(1) (1913).
    • (1913) Yale Law J , vol.23 , Issue.1
    • Hohfeld, W.N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.