메뉴 건너뛰기




Volumn 17, Issue 1, 2012, Pages 35-56

Enhancing security requirements engineering by organizational learning

Author keywords

Organizational learning; Requirements analysis; Requirements workflow modeling; Secure software engineering

Indexed keywords

BAYESIAN CLASSIFIER; DOMAIN SPECIFIC; ERROR PRONES; EUROPEAN TELECOMMUNICATIONS STANDARDS INSTITUTES; ORGANIZATIONAL LEARNING; ORGANIZATIONAL LEVELS; PROJECT REQUIREMENT; REQUIREMENTS ANALYSIS; REQUIREMENTS ENGINEERS; SECURE SOFTWARE ENGINEERING; SECURITY AWARENESS; SECURITY REQUIREMENTS; SECURITY REQUIREMENTS ENGINEERING; SECURITY VULNERABILITIES; SOCIOTECHNICAL; SOFTWARE PROJECT; STEP-BY-STEP; WORKFLOW MODELING;

EID: 84857362096     PISSN: 09473602     EISSN: 1432010X     Source Type: Journal    
DOI: 10.1007/s00766-011-0141-0     Document Type: Article
Times cited : (40)

References (57)
  • 2
    • 77950517326 scopus 로고    scopus 로고
    • The requirements engineering gap in the OEM-supplier relationship
    • Allmann C, Winkler L, Kölzow T (2006) The requirements engineering gap in the OEM-supplier relationship. J Univers Knowl Manag 1(2): 103-111.
    • (2006) J Univers Knowl Manag , vol.1 , Issue.2 , pp. 103-111
    • Allmann, C.1    Winkler, L.2    Kölzow, T.3
  • 4
    • 0001094070 scopus 로고
    • The use of the CCTA risk-analysis and management methodology [CRAMM] in health information systems
    • P. Degoulet, K. C. Lun, T. E. Piemme, and O. Rienhoff (Eds.), North-Holland: Elsevier
    • Barber B, Davey J (1992) The use of the CCTA risk-analysis and management methodology [CRAMM] in health information systems. In: Degoulet P, Lun KC, Piemme TE, Rienhoff O (eds) MEDINFO '92, Elsevier, North-Holland, pp 1589-1593.
    • (1992) MEDINFO '92 , pp. 1589-1593
    • Barber, B.1    Davey, J.2
  • 6
    • 84857357396 scopus 로고    scopus 로고
    • CEPSCO. Common electronic purse specification (ePurse),Accessed Apr 2007
    • CEPSCO. Common electronic purse specification (ePurse). http://web. archive. org/web/*/http://www. cepsco. com. Accessed Apr 2007.
  • 8
    • 84979855000 scopus 로고
    • Dealing with security requirements during the development of information systems
    • In: Rolland C, Bodart F, Cauvet C (eds), Springer
    • Chung L (1993) Dealing with security requirements during the development of information systems. In: Rolland C, Bodart F, Cauvet C (eds) CAiSE, vol 685 of lecture notes in computer science, pp 234-251. Springer.
    • (1993) CAiSE, vol 685 of lecture notes in computer science , pp. 234-251
    • Chung, L.1
  • 11
    • 33947368645 scopus 로고    scopus 로고
    • Model-based security analysis in seven steps-a guided tour to the CORAS method
    • den Braber F, Hogganvik I, Lund MS, Stølen K, Vraalsen F (2007) Model-based security analysis in seven steps-a guided tour to the CORAS method. BT Technol J 25(1): 101-117.
    • (2007) BT Technol J , vol.25 , Issue.1 , pp. 101-117
    • Den Braber, F.1    Hogganvik, I.2    Lund, M.S.3    Stølen, K.4    Vraalsen, F.5
  • 12
    • 0028448779 scopus 로고
    • Domain-oriented design environments
    • Fischer G (1994) Domain-oriented design environments. Autom Softw Eng 1: 177-203.
    • (1994) Autom Softw Eng , vol.1 , pp. 177-203
    • Fischer, G.1
  • 13
    • 0142156745 scopus 로고    scopus 로고
    • Requirement engineering meets security: a case study on modelling secure electronic transactions by VISA and mastercard
    • In: Song I-Y, Liddle SW, Ling TW, Scheuermann P (eds), Springer
    • Giorgini P, Massacci F, Mylopoulos J (2003) Requirement engineering meets security: a case study on modelling secure electronic transactions by VISA and mastercard. In: Song I-Y, Liddle SW, Ling TW, Scheuermann P (eds) ER, vol 2813 of lecture notes in computer science. Springer, pp 263-276.
    • (2003) ER, vol 2813 of lecture notes in computer science , pp. 263-276
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3
  • 15
    • 79952837960 scopus 로고    scopus 로고
    • GlobalPlatform, Accessed Aug 2010
    • GlobalPlatform. Global platform specification (GPS). http://www. globalplatform. org. Accessed Aug 2010.
    • Global platform specification (GPS)
  • 16
    • 57349158625 scopus 로고    scopus 로고
    • Rubacon: automated support for model-based compliance engineering
    • In: Robby (ed), ACM
    • Höhn S, Jürjens J (2008) Rubacon: automated support for model-based compliance engineering. In: Robby (ed) ICSE, pp 875-878. ACM.
    • (2008) ICSE , pp. 875-878
    • Höhn, S.1    Jürjens, J.2
  • 17
    • 77950516884 scopus 로고    scopus 로고
    • Eliciting security requirements and tracing them to design: an integration of common criteria, heuristics, and UMLsec
    • Houmb SH, Islam S, Knauss E, Jürjens J, Schneider K (2010) Eliciting security requirements and tracing them to design: an integration of common criteria, heuristics, and UMLsec. Requir Eng J 15(1): 63-93.
    • (2010) Requir Eng J , vol.15 , Issue.1 , pp. 63-93
    • Houmb, S.H.1    Islam, S.2    Knauss, E.3    Jürjens, J.4    Schneider, K.5
  • 18
    • 70349710756 scopus 로고    scopus 로고
    • International Standardization Organization, version 3. 1, revision 2, CCMB-2007-09-001, CCMB-2007-09-002 and CCMB-2007-09-003, Sept 2007
    • International Standardization Organization (2007) ISO 15408: 2007 common criteria for information technology security evaluation, version 3. 1, revision 2, CCMB-2007-09-001, CCMB-2007-09-002 and CCMB-2007-09-003, Sept 2007.
    • (2007) ISO 15408: 2007 common criteria for information technology security evaluation
  • 20
    • 84890729922 scopus 로고    scopus 로고
    • SecTro: a CASE tool for modelling security in requirements engineering using secure tropos
    • London. CEUR-WS
    • Islam S, Pavlidis M (2011) SecTro: a CASE tool for modelling security in requirements engineering using secure tropos. In: CAiSE '11: Proceedings of the CAiSE forum 2011, pp 89-96, London. CEUR-WS, vol-734.
    • (2011) CAiSE '11: Proceedings of the CAiSE forum 2011 , vol.734 , pp. 89-96
    • Islam, S.1    Pavlidis, M.2
  • 25
    • 0034367281 scopus 로고    scopus 로고
    • Knowledge work as organizational behavior
    • Kelloway KE, Barling J (2000) Knowledge work as organizational behavior. Int J Manag Rev 2: 287-304.
    • (2000) Int J Manag Rev , vol.2 , pp. 287-304
    • Kelloway, K.E.1    Barling, J.2
  • 27
    • 50949131690 scopus 로고    scopus 로고
    • Requirements for tools for ambiguity identification and measurement in natural language requirements specifications
    • Kiyavitskaya N, Zeni N, Mich L, Berry DM (2008) Requirements for tools for ambiguity identification and measurement in natural language requirements specifications. Requir Eng J 13(3): 207-239.
    • (2008) Requir Eng J , vol.13 , Issue.3 , pp. 207-239
    • Kiyavitskaya, N.1    Zeni, N.2    Mich, L.3    Berry, D.M.4
  • 29
    • 77950519990 scopus 로고    scopus 로고
    • Managing requirement engineering processes by adapted quality gateways and critique-based RE-Tools
    • Palma de Mallorca, Spain, November. in conjunction with the IWSM-Mensura conference
    • Knauss E, Flohr T (2007) Managing requirement engineering processes by adapted quality gateways and critique-based RE-Tools. In: Proceedings of workshop on measuring requirements for project and product success, Palma de Mallorca, Spain, November. in conjunction with the IWSM-Mensura conference.
    • (2007) Proceedings of workshop on measuring requirements for project and product success
    • Knauss, E.1    Flohr, T.2
  • 35
    • 33845292826 scopus 로고    scopus 로고
    • Building decision support problem domain ontology from natural language requirements for software assurance
    • Lee SK, Muthurajan D, Gandhi RA, Yavagal DS, Ahn G-J (2006) Building decision support problem domain ontology from natural language requirements for software assurance. Int J Softw Eng Knowl Eng 16(6): 851-884.
    • (2006) Int J Softw Eng Knowl Eng , vol.16 , Issue.6 , pp. 851-884
    • Lee, S.K.1    Muthurajan, D.2    Gandhi, R.A.3    Yavagal, D.S.4    Ahn, G.-J.5
  • 36
    • 45849134150 scopus 로고    scopus 로고
    • Adapting secure tropos for security risk management in the early phases of information systems development
    • In: Bellahsene Z, Léonard M (eds), Springer
    • Matulevicius R, Mayer N, Mouratidis H, Dubois E, Heymans P, Genon N (2008) Adapting secure tropos for security risk management in the early phases of information systems development. In: Bellahsene Z, Léonard M (eds) CAiSE, vol 5074 of lecture notes in computer science, pp 541-555. Springer.
    • (2008) CAiSE, vol 5074 of lecture notes in computer science , pp. 541-555
    • Matulevicius, R.1    Mayer, N.2    Mouratidis, H.3    Dubois, E.4    Heymans, P.5    Genon, N.6
  • 38
    • 73449140991 scopus 로고    scopus 로고
    • The "Physics" of notations: toward a scientific basis for constructing visual notations in software engineering
    • Moody DL (2009) The "Physics" of notations: toward a scientific basis for constructing visual notations in software engineering. IEEE Trans Softw Eng 35(6): 756-779.
    • (2009) IEEE Trans Softw Eng , vol.35 , Issue.6 , pp. 756-779
    • Moody, D.L.1
  • 39
    • 35048845022 scopus 로고    scopus 로고
    • Integrating security and systems engineering: towards the modelling of secure information systems
    • In: Eder J, Missikoff M (eds), Springer
    • Mouratidis H, Giorgini P, Manson GA (2003) Integrating security and systems engineering: towards the modelling of secure information systems. In: Eder J, Missikoff M (eds) CAiSE, vol 2681 of lecture notes in computer science, pp 63-78. Springer.
    • (2003) CAiSE, vol 2681 of lecture notes in computer science , pp. 63-78
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.A.3
  • 40
    • 77954827164 scopus 로고    scopus 로고
    • An agent-based system to support assurance of security requirements
    • IEEE Computer Society
    • Ouedraogo M, Mouratidis H, Khadraoui D, and Dubois E (2010) An agent-based system to support assurance of security requirements. In: SSIRI, pp 78-87. IEEE Computer Society.
    • (2010) SSIRI , pp. 78-87
    • Ouedraogo, M.1    Mouratidis, H.2    Khadraoui, D.3    Dubois, E.4
  • 49
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre G, Opdahl AL (2005) Eliciting security requirements with misuse cases. Requir Eng J 10(1): 34-44.
    • (2005) Requir Eng J , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 50
    • 35148889088 scopus 로고    scopus 로고
    • Improving an industrial reference process by information flow analysis: a case study
    • Riga, Latvia, 2007. Springer, Berlin
    • Stapel K, Schneider K, Lübke D, Flohr T (2007) Improving an industrial reference process by information flow analysis: a case study. In: Proceedings of PROFES 2007, vol 4589 of LNCS, pp 147-159, Riga, Latvia, 2007. Springer, Berlin.
    • (2007) Proceedings of PROFES 2007, vol 4589 of LNCS , pp. 147-159
    • Stapel, K.1    Schneider, K.2    Lübke, D.3    Flohr, T.4
  • 51
    • 82955200126 scopus 로고    scopus 로고
    • Lightweight process documentation: just enough structure in automotive pre-development
    • In: O'Connor RV, Baddoo N, Smolander K, Messnarz R (eds), Dublin, Ireland, 9 2008. Springer
    • Stapel K, Knauss E, Allmann C (2008) Lightweight process documentation: just enough structure in automotive pre-development. In: O'Connor RV, Baddoo N, Smolander K, Messnarz R (eds) Proceedings of the 15th european conference, EuroSPI, communications in computer and information science, pp 142-151, Dublin, Ireland, 9 2008. Springer.
    • (2008) Proceedings of the 15th european conference, EuroSPI, communications in computer and information science , pp. 142-151
    • Stapel, K.1    Knauss, E.2    Allmann, C.3
  • 56
    • 35348918836 scopus 로고    scopus 로고
    • Technical report, Department of Computer Science, University of Massachusetts
    • Wise A (2006) Little-JIL 1. 5 Language Report. Technical report, Department of Computer Science, University of Massachusetts.
    • (2006) Little-JIL 1.5 Language Report
    • Wise, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.