메뉴 건너뛰기




Volumn 20, Issue 4, 2011, Pages

Discovering multidimensional correlations among regulatory requirements to understand risk

Author keywords

Certification and accreditation; Knowledge engineering; Ontology based domain modeling; Requirements visualization; Risk; Software requirements engineering

Indexed keywords

ACCREDITATION PROCESS; CASCADING EFFECTS; CAUSAL CHAINS; CERTIFICATION AND ACCREDITATION; COMPUTATIONAL MODEL; DEPARTMENT OF DEFENSE; EMPIRICAL INVESTIGATION; MULTIPLE DIMENSIONS; NATURAL LANGUAGES; ONTOLOGY-BASED DOMAIN MODELING; PROBLEM DOMAIN; REGULATORY REQUIREMENTS; REQUIREMENTS VISUALIZATION; RISK-BASED; SECURE SYSTEM; SECURITY BREACHES; SECURITY CERTIFICATION; SECURITY CONSTRAINT; SOCIOTECHNICAL; SYSTEM OPERATION; VISUAL METAPHOR;

EID: 80053500161     PISSN: 1049331X     EISSN: 15577392     Source Type: Journal    
DOI: 10.1145/2000799.2000802     Document Type: Article
Times cited : (11)

References (78)
  • 2
    • 33947420972 scopus 로고    scopus 로고
    • Software Engineering Institute, Carnegie Mellon University
    • ALBERTS, C. AND DOROFEE, A. 2001a. OCTAVE Criteria v2.0. Software Engineering Institute, Carnegie Mellon University.
    • (2001) OCTAVE Criteria v2.0
    • Alberts, C.1    Dorofee, A.2
  • 3
    • 33746338083 scopus 로고    scopus 로고
    • Operationally critical threat, asset, and vulnerability evaluation (OCTAVESM)
    • Software Engineering Institute, Carnegie Mellon University
    • ALBERTS, C. AND DOROFEE, A. 2001b. Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVESM) Method Implementation Guide, v2.0. Software Engineering Institute, Carnegie Mellon University. http://www.cert.org/ octave/octavemethod.html.
    • (2001) Method Implementation Guide v2.0
    • Alberts, C.1    Dorofee, A.2
  • 4
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases: Use cases with hostile intent
    • ALEXANDER, I. 2003. Misuse cases: Use cases with hostile intent. IEEE Softw. 20, 1, 58-66.
    • (2003) IEEE Softw. , vol.20 , Issue.1 , pp. 58-66
    • Alexander, I.1
  • 9
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • BASKERVILLE, R. 1993. Information systems security design methods: Implications for information systems development. ACM Comput. Surv. 25, 4, 375-414.
    • (1993) ACM Comput. Surv. , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 16
    • 80053513661 scopus 로고    scopus 로고
    • Common criteria for information technology security evaluation: Part 1
    • COMMON CRITERIA
    • COMMON CRITERIA. 2006. Common criteria for information technology security evaluation: Part 1 Introduction and General Model, v3.1-rev 1.
    • (2006) Introduction and General Model, v3.1-rev 1
  • 17
    • 3042581036 scopus 로고    scopus 로고
    • Nonfunctional requirements: From elicitation to conceptual models
    • CYSNEIROS, L. M. AND LEITE, J. C. S. P. 2004. Nonfunctional requirements: From elicitation to conceptual models. IEEE Trans. Softw. Engin. 30, 5.
    • (2004) IEEE Trans. Softw. Engin. , vol.30 , Issue.5
    • Cysneiros, L.M.1    Leite, J.C.S.P.2
  • 19
    • 80053550794 scopus 로고    scopus 로고
    • DOD 5200.28-STD. 1985. Department of Defense trusted computer system evaluation criteria
    • DOD 5200.28-STD. 1985. Department of Defense trusted computer system evaluation criteria.
  • 20
    • 80053463301 scopus 로고    scopus 로고
    • DOD 5200.40. 1997. Department of Defense information technology certification and accreditation (DITSCAP), 1997
    • DOD 5200.40. 1997. Department of Defense information technology certification and accreditation (DITSCAP), 1997.
  • 21
    • 80053477935 scopus 로고    scopus 로고
    • DOD 8510.01. 2007. Department of Defense information assurance certification and accreditation process (DIACAP) Instruction
    • DOD 8510.01. 2007. Department of Defense information assurance certification and accreditation process (DIACAP) Instruction.
  • 22
    • 80053483119 scopus 로고    scopus 로고
    • DODI 8500.2. 2003. IA implementation
    • DODI 8500.2. 2003. IA implementation.
  • 23
    • 31044434638 scopus 로고    scopus 로고
    • A practical framework for eliciting and modeling system dependability requirements: Experience from the NASA high dependability computing project
    • DOI 10.1016/j.jss.2005.03.011, PII S0164121205000208
    • DONZELLI, P. AND BASILI, V. 2006. A practical framework for eliciting and modeling system dependability requirements: Experience from the NASA high dependability computing project. J. Syst. Softw. 79, 1, 107-119. (Pubitemid 43121112)
    • (2006) Journal of Systems and Software , vol.79 , Issue.1 , pp. 107-119
    • Donzelli, P.1    Basili, V.2
  • 27
    • 7744242790 scopus 로고    scopus 로고
    • Quantitative risk-based requirements reasoning
    • DOI 10.1007/s00766-002-0160-y
    • FEATHER, M. S. AND CORNFORD, S. L. 2003. Quantitative risk-based requirements reasoning. Require. Engin. J. 8, 4, 248-265. (Pubitemid 37554177)
    • (2003) Require. Engin. , vol.8 , Issue.4 , pp. 248-265
    • Feather, M.S.1    Cornford, S.L.2
  • 29
    • 0347380853 scopus 로고    scopus 로고
    • Risk management is still where the money is
    • GEER, D. 2003. Risk management is still where the money is. IEEE Computer 36, 12, 129-131.
    • (2003) IEEE Computer , vol.36 , Issue.12 , pp. 129-131
    • Geer, D.1
  • 30
    • 48749148075 scopus 로고
    • Structure-mapping: A theoretical framework for analogy
    • GENTNER, D. 1983. Structure-mapping: A theoretical framework for analogy. Cogn. Sci. 7, 155-170.
    • (1983) Cogn. Sci. , vol.7 , pp. 155-170
    • Gentner, D.1
  • 33
    • 0035418268 scopus 로고    scopus 로고
    • Defining and applying measures of distance between specifications
    • DOI 10.1109/32.940565
    • JILANI, L. L., DESHARNAIS, J., AND MILI, A. 2001. Defining and applying measures of distance between specifications. IEEE Trans. Softw. Engin. 27, 8, 673-703. (Pubitemid 32829710)
    • (2001) IEEE Transactions on Software Engineering , vol.27 , Issue.8 , pp. 673-703
    • Jilani, L.L.1    Desharnais, J.2    Mili, A.3
  • 35
    • 9444279007 scopus 로고    scopus 로고
    • FCA in knowledge technologies: Experiences and opportunities
    • Concept Lattices
    • KALFOGLOU, Y., DASMAHAPATRA, S., AND CHEN-BURGER, J. 2004. FCA in knowledge technologies: Experiences and opportunities. In Proceedings of the 2nd International Conference on FCA. 252-260. (Pubitemid 38271480)
    • (2004) Lecture Notes in Computer Science , Issue.2961 , pp. 252-260
    • Kalfoglou, Y.1    Dasmahapatra, S.2    Chen-Burger, Y.-H.3
  • 36
    • 33846560895 scopus 로고    scopus 로고
    • Life cycle security and DITSCAP
    • KIMBELL, J. AND WALRATH, M. 2001. Life Cycle Security and DITSCAP. In IANewsletter 4, 2. http://iac.dtic.mil/iatac.
    • (2001) IANewsletter , vol.4 , pp. 2
    • Kimbell, J.1    Walrath, M.2
  • 37
    • 0029733929 scopus 로고    scopus 로고
    • Requirements engineering with viewpoints
    • KOTONYA, G. AND SOMMERVILLE, I. 1996. Requirements engineering with viewpoints. Softw. Engin. J. 11, 1, 5-18. (Pubitemid 126797083)
    • (1996) Software Engineering Journal , vol.11 , Issue.1 , pp. 5-18
    • Kotonya, G.1    Sommerville, I.2
  • 40
    • 33845297655 scopus 로고    scopus 로고
    • Requirements as enablers for software assurance
    • LEE S. W. AND GANDHI, R. A. 2006. Requirements as enablers for software assurance. CrossTalk J. Def. Softw. Engin. 19, 12, 20-24. (Pubitemid 44878659)
    • (2006) CrossTalk , vol.19 , Issue.12 , pp. 20-24
    • Lee, S.-W.1    Gandhi, R.A.2
  • 41
    • 24944496493 scopus 로고    scopus 로고
    • Missing requirements and relationship discovery through proxy viewpoints model
    • LEE S. W. AND RINE, D. C. 2004a. Missing requirements and relationship discovery through proxy viewpoints model. Int. J. Informatics 3, 3, 315-342.
    • (2004) Int. J. Informatics , vol.3 , Issue.3 , pp. 315-342
    • Lee, S.W.1    Rine, D.C.2
  • 44
    • 34247487097 scopus 로고    scopus 로고
    • Certification process artifacts defined as measurable units for software assurance
    • DOI 10.1002/spip.313
    • LEE S. W., GANDHI, R. A., AND AHN, G. J. 2007a. certification process artifacts defined as measurable units for software assurance. Soft. Process: Improv. Pract. 12, 2, 165-189. (Pubitemid 46659453)
    • (2007) Software Process Improvement and Practice , vol.12 , Issue.2 , pp. 165-189
    • Lee, S.-W.1    Gandhi, R.A.2    Ahn, G.-J.3
  • 52
    • 80053551877 scopus 로고    scopus 로고
    • Using DITSCAP regulations to address HIPAA
    • MITCHELL, R. N. 2005. Using DITSCAP regulations to address HIPAA. Advance for Health Information Executives. http://health-information.advanceweb.com/ Editorial/Content/Editorial.aspx?CC=57412.
    • (2005) Advance for Health Information Executives
    • Mitchell, R.N.1
  • 62
    • 0034497420 scopus 로고    scopus 로고
    • Eliciting security requirements by misuse cases
    • SINDRE, G. AND OPDAHL, A. 2000. Eliciting security requirements by misuse cases. In Proceedings of TOOLS Pacific. 120-130.
    • (2000) Proceedings of TOOLS Pacific , pp. 120-130
    • Sindre, G.1    Opdahl, A.2
  • 65
    • 0041848279 scopus 로고    scopus 로고
    • Using a concept lattice of decomposition slices for program understanding and impact analysis
    • TONELLA, P. 2003. Using a concept lattice of decomposition slices for program understanding and impact analysis. IEEE Trans. Softw. Engin. 29, 6.
    • (2003) IEEE Trans. Softw. Engin. , vol.29 , pp. 6
    • Tonella, P.1
  • 68
    • 80053471745 scopus 로고    scopus 로고
    • US GAO 05-700. 2005. Department of homeland security needs to fully implement its security program. Report from The US Government Accountability Office
    • US GAO 05-700. 2005. Department of homeland security needs to fully implement its security program. Report from The US Government Accountability Office.
  • 72
    • 4344569744 scopus 로고    scopus 로고
    • Risk analysis in software design
    • VERDON, D. AND MCGRAW, G. 2004. Risk analysis in software design. IEEE Secur. Priv. Mag. 2, 4, 79-84.
    • (2004) IEEE Secur. Priv. Mag. , vol.2 , Issue.4 , pp. 79-84
    • Verdon, D.1    McGraw, G.2
  • 73
    • 0032639499 scopus 로고    scopus 로고
    • Certifying software for high-assurance environments
    • VOAS, J. 1999. Certifying software for high-assurance environments. IEEE Software 16, 4, 48-54.
    • (1999) IEEE Software , vol.16 , Issue.4 , pp. 48-54
    • Voas, J.1
  • 74
    • 34748829296 scopus 로고    scopus 로고
    • A case study in systematic improvement of language for requirements
    • DOI 10.1109/RE.2006.5, 1704044, Proceedings - 14th IEEE International Requirements Engineering Conference, RE'06
    • WASSON, K. S. 2006. A case study in systematic improvement of language for requirements. In Proceedings of the 14th International Requirements Engineering Conference. 6-15. (Pubitemid 351424195)
    • (2006) Proceedings of the IEEE International Conference on Requirements Engineering , pp. 6-15
    • Wasson, K.S.1
  • 75
    • 84860994379 scopus 로고    scopus 로고
    • Conceptual graphs and formal concept analysis
    • Conceptual Structures: Fulfilling Peirce's Dream
    • WILLE, R. 1997. Conceptual graphs and formal concept analysis. In Proceedings of the International Conference on Conceptual Structures. 290-303. (Pubitemid 127103229)
    • (1997) Lecture Notes in Computer Science , Issue.1257 , pp. 290-303
    • Wille, R.1
  • 77
    • 0003673547 scopus 로고
    • 2nd Ed. Applied Social ResearchMethods Series, Sage Publications
    • YIN, R. K. 1994. Case Study Research: Design andMethods 2nd Ed. Applied Social ResearchMethods Series, 5, Sage Publications.
    • (1994) Case Study Research: Design AndMethods , vol.5
    • Yin, R.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.