메뉴 건너뛰기




Volumn 54, Issue 9, 2012, Pages 1029-1043

Evaluation of the Pattern-based method for Secure Development (PbSD): A controlled experiment

Author keywords

Authorization; Controlled experiment; Database design; Model driven development; Secure software development; Security patterns

Indexed keywords

AUTHORIZATION; CONTROLLED EXPERIMENT; DATABASE DESIGN; MODEL DRIVEN DEVELOPMENT; SECURE SOFTWARE DEVELOPMENT; SECURITY PATTERNS;

EID: 84861955129     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infsof.2012.04.001     Document Type: Article
Times cited : (10)

References (48)
  • 1
    • 84961578672 scopus 로고    scopus 로고
    • Tool support for enforcing security policies on databases
    • J. Abramov, O. Anson, A. Sturm, and P. Shoval Tool support for enforcing security policies on databases CAiSE Forum 2011 2011 41 48
    • (2011) CAiSE Forum , vol.2011 , pp. 41-48
    • Abramov, J.1    Anson, O.2    Sturm, A.3    Shoval, P.4
  • 3
    • 33847668436 scopus 로고    scopus 로고
    • Evaluation of object-oriented design patterns in game development
    • A. Ampatzoglou, and A. Chatzigeorgiou Evaluation of object-oriented design patterns in game development Information and Software Technology 49 5 2007 445 454
    • (2007) Information and Software Technology , vol.49 , Issue.5 , pp. 445-454
    • Ampatzoglou, A.1    Chatzigeorgiou, A.2
  • 6
    • 79951813796 scopus 로고    scopus 로고
    • A systematic review of evaluation of variability management approaches in software product lines
    • L. Chen, and M.A. Babar A systematic review of evaluation of variability management approaches in software product lines Information and Software Technology 53 2011 344 362
    • (2011) Information and Software Technology , vol.53 , pp. 344-362
    • Chen, L.1    Babar, M.A.2
  • 7
    • 58849148475 scopus 로고    scopus 로고
    • How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
    • L. Compagna, P.E. Khoury, A. Krausová, F. Massacci, and N. Zannone How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns Artificial Intelligence and Law 17 1 2009 1 30
    • (2009) Artificial Intelligence and Law , vol.17 , Issue.1 , pp. 1-30
    • Compagna, L.1    Khoury, P.E.2    Krausová, A.3    Massacci, F.4    Zannone, N.5
  • 10
    • 56749124990 scopus 로고    scopus 로고
    • Secure activity resource coordination: Empirical evidence of enhanced security awareness in designing secure business processes
    • F. D'aubeterre, R. Singh, and L. Iyer Secure activity resource coordination: empirical evidence of enhanced security awareness in designing secure business processes European Journal of Information Systems 17 5 2008 528 542
    • (2008) European Journal of Information Systems , vol.17 , Issue.5 , pp. 528-542
    • D'Aubeterre, F.1    Singh, R.2    Iyer, L.3
  • 17
    • 55049118116 scopus 로고    scopus 로고
    • Model-based security analysis of the German health card architecture
    • J. Jürjens, and R. Rumm Model-based security analysis of the German health card architecture Methods of Information in Medicine 47 5 2008 409 416
    • (2008) Methods of Information in Medicine , vol.47 , Issue.5 , pp. 409-416
    • Jürjens, J.1    Rumm, R.2
  • 18
    • 37849187634 scopus 로고    scopus 로고
    • UML specification of access control policies and their formal verification
    • M. Koch, and F. Parisi-Presicce UML specification of access control policies and their formal verification Software and System Modeling 5 4 2006 429 447
    • (2006) Software and System Modeling , vol.5 , Issue.4 , pp. 429-447
    • Koch, M.1    Parisi-Presicce, F.2
  • 20
    • 0242592090 scopus 로고
    • Why a diagram is (sometimes) worth ten thousand words
    • J.H. Larkin, and H.A. Simon Why a diagram is (sometimes) worth ten thousand words Cognitive Science 11 1 1987 65 100
    • (1987) Cognitive Science , vol.11 , Issue.1 , pp. 65-100
    • Larkin, J.H.1    Simon, H.A.2
  • 21
    • 77949773912 scopus 로고    scopus 로고
    • Special issue on software engineering for secure systems
    • S.W. Lee, and M. Monga Special issue on software engineering for secure systems Computers & Security 29 2010 299 301
    • (2010) Computers & Security , vol.29 , pp. 299-301
    • Lee, S.W.1    Monga, M.2
  • 24
    • 33746078483 scopus 로고    scopus 로고
    • Detecting conflicts between functional and security requirements with secure Tropos: John Rusnak and the Allied Irish Bank
    • P. Giorgini, N.A.M. Maiden, J. Mylopoulos, E. Yu, MIT Press Cambridge, MA
    • F. Massacci, and N. Zannone Detecting conflicts between functional and security requirements with secure Tropos: John Rusnak and the Allied Irish Bank P. Giorgini, N.A.M. Maiden, J. Mylopoulos, E. Yu, Social Modeling for Requirements Engineering 2006 MIT Press Cambridge, MA
    • (2006) Social Modeling for Requirements Engineering
    • Massacci, F.1    Zannone, N.2
  • 26
    • 84888990373 scopus 로고    scopus 로고
    • What makes a good diagram? Improving the cognitive effectiveness of diagrams in IS development
    • W. Wojtkowski, W.G. Wojtkowski, J. Zupancic, G. Magyar, G. Knapp, Springer US
    • D. Moody What makes a good diagram? Improving the cognitive effectiveness of diagrams in IS development W. Wojtkowski, W.G. Wojtkowski, J. Zupancic, G. Magyar, G. Knapp, Advances in Information Systems Development 2007 Springer US 481 492
    • (2007) Advances in Information Systems Development , pp. 481-492
    • Moody, D.1
  • 28
  • 29
    • 69849091259 scopus 로고    scopus 로고
    • Secure information systems engineering: Experiences and lessons learned from two health care projects
    • P. Van Eck, J. Gordijn, R. Wieringa, LNCS Springer Berlin/Heidelberg, London
    • H. Mouratidis, A. Sunyaev, and J. Jürjens Secure information systems engineering: experiences and lessons learned from two health care projects P. Van Eck, J. Gordijn, R. Wieringa, Advanced Information Systems Engineering LNCS vol. 5565 2009 Springer Berlin/Heidelberg, London 231 245
    • (2009) Advanced Information Systems Engineering , vol.5565 , pp. 231-245
    • Mouratidis, H.1    Sunyaev, A.2    Jürjens, J.3
  • 31
    • 60949097689 scopus 로고    scopus 로고
    • Experimental comparison of attack trees and misuse cases for security threat identification
    • A.L. Opdahl, and G. Sindre Experimental comparison of attack trees and misuse cases for security threat identification Information and Software Technology 51 5 2009 916 932
    • (2009) Information and Software Technology , vol.51 , Issue.5 , pp. 916-932
    • Opdahl, A.L.1    Sindre, G.2
  • 32
    • 84861945642 scopus 로고    scopus 로고
    • Oracle
    • Oracle, 2011. < http://www.oracle.com >.
    • (2011)
  • 33
    • 84861945644 scopus 로고    scopus 로고
    • Oracle: Oracle@Database - Security Guide
    • Oracle: Oracle@Database - Security Guide, 2008. < http://download. oracle.com/docs/cd/B28359-01/network.111/b28531.pdf >.
    • (2008)
  • 34
    • 77949562741 scopus 로고    scopus 로고
    • A framework of composable access control features: Preserving separation of access control concerns from models to code
    • J.A. Pavlich-Mariscal, S.A. Demurjian, and L.D. Michel A framework of composable access control features: preserving separation of access control concerns from models to code Computers & Security 29 3 2010 350 379
    • (2010) Computers & Security , vol.29 , Issue.3 , pp. 350-379
    • Pavlich-Mariscal, J.A.1    Demurjian, S.A.2    Michel, L.D.3
  • 38
    • 67349109419 scopus 로고    scopus 로고
    • Utilizing domain models for application design and validation
    • I. Reinhartz-Berger, and A. Sturm Utilizing domain models for application design and validation Information & Software Technology 51 8 2009 1275 1289
    • (2009) Information & Software Technology , vol.51 , Issue.8 , pp. 1275-1289
    • Reinhartz-Berger, I.1    Sturm, A.2
  • 39
    • 84874765620 scopus 로고    scopus 로고
    • Connecting security requirements analysis and secure design using patterns and UMLsec
    • H. Schmidt, and J. Jürjens Connecting security requirements analysis and secure design using patterns and UMLsec CAiSE 2011 2011 367 382
    • (2011) CAiSE , vol.2011 , pp. 367-382
    • Schmidt, H.1    Jürjens, J.2
  • 42
    • 0141725660 scopus 로고    scopus 로고
    • The pragmatics of model-driven development
    • B. Selic The pragmatics of model-driven development IEEE Software 20 5 2003 19 25
    • (2003) IEEE Software , vol.20 , Issue.5 , pp. 19-25
    • Selic, B.1
  • 43
    • 84861956909 scopus 로고    scopus 로고
    • SERENITY Project
    • SERENITY Project, 2011. < http://www.serenity-project.org >.
    • (2011)
  • 44
    • 0031078530 scopus 로고    scopus 로고
    • Entity-relationship and object-oriented data modeling - An experimental comparison of design quality
    • P. Shoval, and S. Shiran Entity-relationship and object-oriented data modeling - an experimental comparison of design quality Data & Knowledge Engineering 21 1997 297 315
    • (1997) Data & Knowledge Engineering , vol.21 , pp. 297-315
    • Shoval, P.1    Shiran, S.2
  • 45
    • 3543080954 scopus 로고    scopus 로고
    • A controlled experiment comparing the maintainability of programs designed with and without design patterns - A replication in a real programming environment
    • M. Vokáč, W. Tichy, D.I.K. Sjoberg, E. Arisholm, and M. Aldrin A controlled experiment comparing the maintainability of programs designed with and without design patterns - a replication in a real programming environment Empirical Software Engineering 9 3 2004 149 195
    • (2004) Empirical Software Engineering , vol.9 , Issue.3 , pp. 149-195
    • Vokáč, M.1    Tichy, W.2    Sjoberg, D.I.K.3    Arisholm, E.4    Aldrin, M.5
  • 48
    • 84867330357 scopus 로고    scopus 로고
    • What do we know about the effectiveness of software design patterns
    • 10.1109/TSE.2011.79
    • C. Zhang, and D. Budgen What do we know about the effectiveness of software design patterns IEEE Transactions on Software Engineering 2011 10.1109/TSE.2011.79
    • (2011) IEEE Transactions on Software Engineering
    • Zhang, C.1    Budgen, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.