메뉴 건너뛰기




Volumn 2006-May, Issue , 2006, Pages 11-17

Extending xp practices to support security requirements engineering

Author keywords

Agile Software Development; Development methodology; EXtreme Programming; Requirements; Security Engineering

Indexed keywords

ITERATIVE METHODS; SOFTWARE DESIGN;

EID: 79960596773     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1137627.1137631     Document Type: Conference Paper
Times cited : (51)

References (32)
  • 1
    • 29244448120 scopus 로고    scopus 로고
    • Security engineering in an evolutionary acquisition environment
    • Charlottsville, VA
    • Abrams, M. D., Security Engineering in an Evolutionary Acquisition Environment, in Proceedings of New Security Paradigms Workshop, Charlottsville, VA, 1998, pp. 11-20.
    • (1998) Proceedings of New Security Paradigms Workshop , pp. 11-20
    • Abrams, M.D.1
  • 5
    • 29244456856 scopus 로고    scopus 로고
    • EXtreme security engineering: On employing xp practices to achieve "good enough security" without defining it
    • Fairfax, VA, USA, Oct. 31
    • Beznosov, K., eXtreme Security Engineering: On Employing XP Practices to Achieve "Good Enough Security" without Defining It, in Proc. of First ACM Workshop on Business Driven Security Engineering (BizSec), Fairfax, VA, USA, Oct. 31, 2003.
    • (2003) Proc. of First ACM Workshop on Business Driven Security Engineering (BizSec)
    • Beznosov, K.1
  • 9
    • 84953420396 scopus 로고    scopus 로고
    • CC, ISO 15408 Common Criteria for Information Technology Sec. Evaluation Version 2.1, August 1999
    • CC, ISO 15408 Common Criteria for Information Technology Sec. Evaluation Version 2.1, August 1999.
  • 11
    • 84953420398 scopus 로고    scopus 로고
    • accessed in Jan
    • CORAS, http://www2.nr.no/coras/, accessed in Jan. 2006
    • (2006)
  • 13
    • 0006705483 scopus 로고    scopus 로고
    • Accessed in January
    • Fowler M. and Foemmel M., Continuous Integration. URL:http://www.martinfowler.com/articles/continuousInte gration.html. Accessed in January 2006.
    • (2006) Continuous Integration
    • Fowler, M.1    Foemmel, M.2
  • 15
    • 2342576368 scopus 로고    scopus 로고
    • Does the Common Criteria paradigm have a future?
    • Hearn, J., Does the Common Criteria paradigm have a future?, IEEE Security and Privacy, Vol. 2, Issue 1, 2004
    • (2004) IEEE Security and Privacy , vol.2 , Issue.1
    • Hearn, J.1
  • 18
    • 84953420400 scopus 로고    scopus 로고
    • ISO/IEC, 4th WD 13335-2-Information Technology-Security Techniques-Management of information and communications technology security-Part 2: Techniques for information and communications technology security risk management
    • ISO/IEC, 4th WD 13335-2-Information Technology-Security Techniques-Management of information and communications technology security-Part 2: Techniques for information and communications technology security risk management.
  • 22
    • 84953420401 scopus 로고    scopus 로고
    • Presented at the Symposium on Requirements Engineering for Information Security
    • Peeters J. Agile Security Requirements Engineering. Presented at the Symposium on Requirements Engineering for Information Security, 2005.
    • (2005) Agile Security Requirements Engineering
    • Peeters, J.1
  • 23
    • 0346043242 scopus 로고    scopus 로고
    • Using xp for safety-critical software
    • Poppendieck M. and Morsicato R, Using XP for Safety-Critical Software, Cutter IT Journal, 15 (9), 2002, 12-16.
    • (2002) Cutter IT Journal , vol.15 , Issue.9 , pp. 12-16
    • Poppendieck, M.1    Morsicato, R.2
  • 25
    • 84953420402 scopus 로고    scopus 로고
    • SSE-CMM, Systems Security Engineering Capability Maturity Model, Model Description Document Version 3.0.. Accessed in January 2004
    • SSE-CMM, Systems Security Engineering Capability Maturity Model, Model Description Document Version 3.0. URL: www.sse-cmm.org/model/ssecmmv2final.pdf. Accessed in January 2004.
  • 26
    • 84953420403 scopus 로고    scopus 로고
    • Standish Group, The Chaos Report: Extreme Chaos, West Yarmouth, MA: The Standish Group, 2001
    • Standish Group, The Chaos Report: Extreme Chaos, West Yarmouth, MA: The Standish Group, 2001.
  • 27
    • 84953420404 scopus 로고    scopus 로고
    • ST-Lite V 1.1, July 2002 accessed 2006-02-01
    • ST-Lite V 1.1, July 2002 http://www.commoncriteriaportal.org/public/expert/in dex.php?menu=6 accessed 2006-02-01
  • 28
    • 84953420405 scopus 로고    scopus 로고
    • Fast Track, Fast Track Assessment Methodology, Information Assurance and Certification Services (IACS), CESG. Accessed August 25
    • Fast Track, Fast Track Assessment Methodology, Information Assurance and Certification Services (IACS), CESG. http://www.cesg.gov.uk/site/iacs/index.cfm?menuSelected =3&displayPage=31 Accessed August 25 2005
    • (2005)
  • 29
    • 0038348212 scopus 로고    scopus 로고
    • presented at Tenth ACM SIGSOFT Symposium on Foundations of Software Engineering, Charleston, South Carolina, USA
    • Vetterling M. and Wimmel G., Secure Systems Development Based on the PalME project, presented at Tenth ACM SIGSOFT Symposium on Foundations of Software Engineering, Charleston, South Carolina, USA, 2002.
    • (2002) Secure Systems Development Based on the PalME Project
    • Vetterling, M.1    Wimmel, G.2
  • 30
    • 4344569744 scopus 로고    scopus 로고
    • Risk analysis in software design
    • Verdon D, McGraw, G., Risk Analysis in Software Design. IEEE Security and Privacy, 2(4), 2004, pp.79-84.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.4 , pp. 79-84
    • Verdon, D.1    McGraw, G.2
  • 32
    • 84953420407 scopus 로고    scopus 로고
    • XP, Extreme Programming: A Gentle Introduction., Accessed in September
    • XP, Extreme Programming: A Gentle Introduction. URL: http://www.extremeprogramming.org, Accessed in September 2005
    • (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.