메뉴 건너뛰기




Volumn 18, Issue 6, 2012, Pages 816-844

Syntactic and semantic extensions to Secure Tropos to support security risk management

Author keywords

Information system; Risk management; Secure tropos; Security; Syntax and semantics of modelling language

Indexed keywords


EID: 84862645179     PISSN: 0958695X     EISSN: 09486968     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (26)

References (49)
  • 3
    • 49049105211 scopus 로고    scopus 로고
    • Risk as Dependability Metrics for the Evaluation of Business Solutions: A Modeldriven Approach
    • [Asnar et al., 2008]
    • [Asnar et al., 2008] Asnar, Y., Moretti, R., Sebastianis, M., and Zannone, N. (2008). Risk as Dependability Metrics for the Evaluation of Business Solutions: A Modeldriven Approach. In ARES, pages 1240-1247.
    • (2008) ARES , pp. 1240-1247
    • Asnar, Y.1    Moretti, R.2    Sebastianis, M.3    Zannone, N.4
  • 4
    • 0003669844 scopus 로고    scopus 로고
    • [AS/NZS 4360, 2004] AS/NZS 4360, SAI Global
    • [AS/NZS 4360, 2004] AS/NZS 4360 (2004). Risk Management. SAI Global.
    • (2004) Risk Management
  • 7
    • 33751416458 scopus 로고    scopus 로고
    • A Common Criteria Based Security Requirements Engineering Process for the Development of Secure Information Systems
    • [D. Mellado, 2007]
    • [D. Mellado, 2007] D. Mellado, E. Fernndez-Medina, M. (2007). A Common Criteria Based Security Requirements Engineering Process for the Development of Secure Information Systems. Computer Standards and Interfaces, 29:244-253.
    • (2007) Computer Standards and Interfaces , vol.29 , pp. 244-253
    • Mellado, D.1    Fernndez-Medina, E.2
  • 8
    • 77955431422 scopus 로고    scopus 로고
    • Security Requirements Engineering Framework for Software Product Lines
    • [D. Mellado, 2010]
    • [D. Mellado, 2010] D. Mellado, E. Fernndez-Medina, M. (2010). Security Requirements Engineering Framework for Software Product Lines. Information and Software Technology, 52:1094-1117.
    • (2010) Information and Software Technology , vol.52 , pp. 1094-1117
    • Mellado, D.1    Fernndez-Medina, E.2
  • 9
    • 77950524618 scopus 로고    scopus 로고
    • A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs
    • [Elahi and Yu, 2007], Parent, C., Schewe, K.-D., Storey, V. C., and Thalheim, B., editors, Springer-Verlag Berlin Heidelberg
    • [Elahi and Yu, 2007] Elahi, G. and Yu, E. (2007). A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs. In Parent, C., Schewe, K.-D., Storey, V. C., and Thalheim, B., editors, Proceedings of the 26th International Conference on Conceptual Modelling (ER 2007), volume 4801, pages 87-101. Springer-Verlag Berlin Heidelberg.
    • (2007) Proceedings of the 26th International Conference On Conceptual Modelling (ER 2007) , vol.4801 , pp. 87-101
    • Elahi, G.1    Yu, E.2
  • 12
    • 47949111490 scopus 로고    scopus 로고
    • Discovering and Understanding Multi-dimensional Correlations among Certification Requirements with application to Risk Assessment
    • [Gandhi and Lee, 2007]
    • [Gandhi and Lee, 2007] Gandhi, R. A. and Lee, S.-W. (2007). Discovering and Understanding Multi-dimensional Correlations among Certification Requirements with application to Risk Assessment. Requirements Engineering, IEEE International Conference on, 0:231-240.
    • (2007) Requirements Engineering, IEEE International Conference On , vol.0 , pp. 231-240
    • Gandhi, R.A.1    Lee, S.-W.2
  • 13
    • 40449096402 scopus 로고    scopus 로고
    • Security Requirements Engineering: A Framework for Representation and Analysis
    • [Haley et al., 2008]
    • [Haley et al., 2008] Haley, C., Laney, R., Moffett, J., and Nuseibeh, B. (2008). Security Requirements Engineering: A Framework for Representation and Analysis. IEEE Transactions on Software Engineering, 34(1):133-153.
    • (2008) IEEE Transactions On Software Engineering , vol.34 , Issue.1 , pp. 133-153
    • Haley, C.1    Laney, R.2    Moffett, J.3    Nuseibeh, B.4
  • 18
    • 3342920504 scopus 로고    scopus 로고
    • [ISO/IEC Guide 73, 2002] ISO/IEC Guide 73, International Organisation for Standardisation
    • [ISO/IEC Guide 73, 2002] ISO/IEC Guide 73 (2002). Risk management - Vocabulary - Guidelines for Use in Standards. International Organisation for Standardisation.
    • (2002) Risk Management - Vocabulary - Guidelines For Use In Standards
  • 28
    • 73549107313 scopus 로고    scopus 로고
    • Complexity Effects on End User Understanding of Data Models: An Experimental Comparison of Large Data Model Represetation Mehods
    • [Moody, 2002]
    • [Moody, 2002] Moody, D. L. (2002). Complexity Effects on End User Understanding of Data Models: an Experimental Comparison of Large Data Model Represetation Mehods. In Proceedings of the 10th European Conferece on Information Systems (ECIS'2002).
    • (2002) Proceedings of the 10th European Conferece On Information Systems (ECIS'2002)
    • Moody, D.L.1
  • 29
    • 73449140991 scopus 로고    scopus 로고
    • The "Physics" of Notations: Toward a Scientific Basis for Constructing Visual Notations in Software Engineering
    • [Moody, 2009]
    • [Moody, 2009] Moody, D. L. (2009). The "Physics" of Notations: Toward a Scientific Basis for Constructing Visual Notations in Software Engineering. IEEE Transactions on Software Engineering, 35(6):756-777.
    • (2009) IEEE Transactions On Software Engineering , vol.35 , Issue.6 , pp. 756-777
    • Moody, D.L.1
  • 33
    • 34548508691 scopus 로고    scopus 로고
    • Security Attack Testing (SAT) - Testing the Security of Information Systems at Design Time
    • [Mouratidis and Giorgini, 2007b]
    • [Mouratidis and Giorgini, 2007b] Mouratidis, H. and Giorgini, P. (2007b). Security Attack Testing (SAT) - Testing the Security of Information Systems at Design Time. Information Systems, 32(8):1166-1183.
    • (2007) Information Systems , vol.32 , Issue.8 , pp. 1166-1183
    • Mouratidis, H.1    Giorgini, P.2
  • 38
    • 23944475544 scopus 로고    scopus 로고
    • When Security Meets Software Engineering: A Case of Modelling Secure Information Systems
    • [Mouratidis et al., 2005]
    • [Mouratidis et al., 2005] Mouratidis, H., Giorgini, P., and Manson, G. A. (2005). When Security Meets Software Engineering: a Case of Modelling Secure Information Systems. Information Systems, 30(8):609-629.
    • (2005) Information Systems , vol.30 , Issue.8 , pp. 609-629
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.A.3
  • 40
    • 84990316932 scopus 로고    scopus 로고
    • A Novel Agent-Based System to Support the Single Assessment Process of Older People
    • [Mouratidis et al., 2003b]
    • [Mouratidis et al., 2003b] Mouratidis, H., Philp, I., and Manson, G. (2003b). A Novel Agent-Based System to Support the Single Assessment Process of Older People. Journal of Health Informatics, 9(3):149-162.
    • (2003) Journal of Health Informatics , vol.9 , Issue.3 , pp. 149-162
    • Mouratidis, H.1    Philp, I.2    Manson, G.3
  • 41
    • 16344385743 scopus 로고    scopus 로고
    • [Object Management Group (OMG), 2004] Object Management Group (OMG)
    • [Object Management Group (OMG), 2004] Object Management Group (OMG) (2004). Unified Modeling Language: Superstructure, version 2.0.
    • (2004) Unified Modeling Language: Superstructure, Version 2.0
  • 42
  • 45
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting Security Requirements with Misuse Cases
    • [Sindre and Opdahl, 2005]
    • [Sindre and Opdahl, 2005] Sindre, G. and Opdahl, A. L. (2005). Eliciting Security Requirements with Misuse Cases. Requirements Engineering Journal, 10(1):34-44.
    • (2005) Requirements Engineering Journal , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 47
    • 4544255381 scopus 로고    scopus 로고
    • Elaborating Security Requirements by Construction of Intentional Anti-models
    • [van Lamsweerde, 2004], IEEE Computer Society
    • [van Lamsweerde, 2004] van Lamsweerde, A. (2004). Elaborating Security Requirements by Construction of Intentional Anti-models. In Proceedings of the 26th International Conference on Software Engineering (ICSE'04), pages 148-157. IEEE Computer Society.
    • (2004) Proceedings of the 26th International Conference On Software Engineering (ICSE'04) , pp. 148-157
    • van Lamsweerde, A.1
  • 49


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.