메뉴 건너뛰기




Volumn 7195 LNCS, Issue , 2012, Pages 132-139

Aligning mal-activity diagrams and security risk management for security requirements definitions

Author keywords

Information system security risk management; Mal activity diagrams; Requirement engineering; Risk management

Indexed keywords

CONCEPTUAL FRAMEWORKS; DESIGN STAGE; DOMAIN MODEL; INFORMATION SYSTEM SECURITY; INFORMATION SYSTEMS SECURITY; LANGUAGE CONSTRUCTS; MAL-ACTIVITY DIAGRAMS; MODEL SECURITY; MODELLING LANGUAGE; REQUIREMENT ENGINEERING; SECURITY ENGINEERING; SECURITY REQUIREMENTS; SYSTEM DEVELOPMENT; SYSTEM DEVELOPMENT PROCESS; SYSTEM REQUIREMENTS;

EID: 84858311224     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-28714-5_11     Document Type: Conference Paper
Times cited : (16)

References (6)
  • 2
    • 84892326872 scopus 로고    scopus 로고
    • A Systematic Approach to Define the Domain of Information System Security Risk Management
    • Nurcan, S., Salinesi, C., Souveyet, C., Ralytė, J. (eds.) Springer, Heidelberg
    • Dubois, E., Heymans, P., Mayer, N., Matulevičius, R.: A Systematic Approach to Define the Domain of Information System Security Risk Management. In: Nurcan, S., Salinesi, C., Souveyet, C., Ralytė, J. (eds.) International Perspectives on Information Systems Engineering, pp. 289-306. Springer, Heidelberg (2010)
    • (2010) International Perspectives on Information Systems Engineering , pp. 289-306
    • Dubois, E.1    Heymans, P.2    Mayer, N.3    Matulevičius, R.4
  • 4
    • 45849134150 scopus 로고    scopus 로고
    • Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development
    • Bellahsène, Z., Léonard, M. (eds.) CAiSE 2008. Springer, Heidelberg
    • Matulevičius, R., Mayer, N., Mouratidis, H., Dubois, E., Heymans, P., Genon, N.: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development. In: Bellahsène, Z., Léonard, M. (eds.) CAiSE 2008. LNCS, vol. 5074, pp. 541-555. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5074 , pp. 541-555
    • Matulevičius, R.1    Mayer, N.2    Mouratidis, H.3    Dubois, E.4    Heymans, P.5    Genon, N.6
  • 6
    • 38149121542 scopus 로고    scopus 로고
    • Mal-Activity Diagrams for Capturing Attacks on Business Processes
    • Sawyer, P., Paech, B., Heymans, P. (eds.) REFSQ 2007. Springer, Heidelberg
    • Sindre, G.: Mal-Activity Diagrams for Capturing Attacks on Business Processes. In: Sawyer, P., Paech, B., Heymans, P. (eds.) REFSQ 2007. LNCS, vol. 4542, pp. 355-366. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4542 , pp. 355-366
    • Sindre, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.