메뉴 건너뛰기




Volumn 21, Issue 3, 2012, Pages 137-149

Towards an Ontological Approach to Information System Security and Safety Requirement Modeling and Reuse

Author keywords

ontology; requirement management; reuse; safety; security; sharing; use misuse case

Indexed keywords

DOMAIN KNOWLEDGE; FORMAL REPRESENTATIONS; HEALTH CARE INFORMATION SYSTEM; INFORMATION SYSTEM SECURITY; MISUSE CASE; ONTOLOGICAL APPROACH; PROBLEM DOMAIN; REQUIREMENT ENGINEERING; REQUIREMENT MANAGEMENT; REUSE; SAFETY REQUIREMENTS; SECURITY; SECURITY REQUIREMENTS; SECURITY THREATS; SHARING;

EID: 84862174649     PISSN: 19393555     EISSN: 19393547     Source Type: Journal    
DOI: 10.1080/19393555.2011.652290     Document Type: Article
Times cited : (11)

References (23)
  • 1
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases, use cases with hostile intent
    • Alexander, I. F. 2003. Misuse cases, use cases with hostile intent. IEEE Software, 20(1): 58-66.
    • (2003) IEEE Software , vol.20 , Issue.1 , pp. 58-66
    • Alexander, I.F.1
  • 4
    • 33646387991 scopus 로고    scopus 로고
    • Developing the electronic health record: What about patient safety?
    • Boaden, R. and Joyce, P. 2006. Developing the electronic health record: What about patient safety?. Health Services Management Research, 19: 94-104.
    • (2006) Health Services Management Research , vol.19 , pp. 94-104
    • Boaden, R.1    Joyce, P.2
  • 8
    • 75749107370 scopus 로고    scopus 로고
    • Halden, MN: International Seminar on Dependable Requirements Engineering of Computerized Systems at NPPs, Institute for Energy Technology (IFE)
    • Dobson, G. and Sawyer, P. 2006. Revisiting ontology-based requirements engineering in the age of the semantic Web, Halden, MN: International Seminar on Dependable Requirements Engineering of Computerized Systems at NPPs, Institute for Energy Technology (IFE).
    • (2006) Revisiting ontology-based requirements engineering in the age of the semantic Web
    • Dobson, G.1    Sawyer, P.2
  • 11
    • 35148839490 scopus 로고
    • A translation approach to portable ontology specification
    • Gruber, T. R. 1993. A translation approach to portable ontology specification. Knowledge Acquisition, 5: 199-220.
    • (1993) Knowledge Acquisition , vol.5 , pp. 199-220
    • Gruber, T.R.1
  • 12
    • 58149365542 scopus 로고
    • Towards principles for the design of ontologies used for knowledge sharing
    • Gruber, T. R. 1995. Towards principles for the design of ontologies used for knowledge sharing. International Journal of Human and Computer Studies, 43(5/6): 907-928.
    • (1995) International Journal of Human and Computer Studies , vol.43 , Issue.5-6 , pp. 907-928
    • Gruber, T.R.1
  • 19
    • 84862177331 scopus 로고    scopus 로고
    • Protege Ontology Editor and Knowledge Acquisition System Stanford University
    • Protege Ontology Editor and Knowledge Acquisition System. (2004). Stanford University. http://protege.stanford.edu/.
    • (2004)
  • 20
    • 77954606675 scopus 로고    scopus 로고
    • An extended misuse case notation: Including vulnerabilities and the insider threats
    • Luxembourg: Essener Informatik Beitrage
    • Rostad, L. 2006. "An extended misuse case notation: Including vulnerabilities and the insider threats". In Proceedings of Requirements Engineering: Foundation for Software Quality (REFSQ'06), 33-43. Luxembourg: Essener Informatik Beitrage.
    • (2006) Proceedings of Requirements Engineering: Foundation for Software Quality (REFSQ'06) , pp. 33-43
    • Rostad, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.