메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Extracting security requirements from relevant laws and regulations

Author keywords

Duty dependency; Hohfeld; Right dependency; Secure Tropos

Indexed keywords

DUTY DEPENDENCY; HOHFELD; LAWS AND REGULATIONS; RIGHT DEPENDENCY; SECURE TROPOS; SECURITY REQUIREMENTS; SENSITIVE INFORMATIONS; SOFTWARE SYSTEMS; SYSTEM REQUIREMENTS;

EID: 84865007784     PISSN: 21511349     EISSN: 21511357     Source Type: Conference Proceeding    
DOI: 10.1109/RCIS.2012.6240443     Document Type: Conference Paper
Times cited : (7)

References (25)
  • 1
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • J. Saltzer and M. Schroeder, "The protection of information in computer systems," Proceedings of the IEEE.63(9), pp.1278-1308, September 1975
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 2
  • 7
    • 77955462130 scopus 로고    scopus 로고
    • Toward a framework to elicit and manage security and privacy requirments from laws and regulation
    • S. Islam, H.Mouratidis, S.Wagner, "Toward a framework to elicit and manage security and privacy requirments from laws and regulation," Lecture Notes in Computer Science, Volume 6182/2010, pp.255-261, 2010.
    • (2010) Lecture Notes in Computer Science , vol.6182 , Issue.2010 , pp. 255-261
    • Islam, S.1    Mouratidis, H.2    Wagner, S.3
  • 10
    • 0002953848 scopus 로고
    • Fundamental legal conceptions as applied in judicial reasoning
    • W. N. Hohfeld, "Fundamental legal conceptions as applied in judicial reasoning," Yale Law Journal 23(1), 1913.
    • (1913) Yale Law Journal , vol.23 , Issue.1
    • Hohfeld, W.N.1
  • 11
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing regulator rules for privacy and security requirements
    • January-February
    • T. D, Breaux and A. I. Antón, "Analyzing regulator rules for privacy and security requirements," IEEE transactions on software engineering, Vol. 34, No. 1, January-February 2008.
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.1
    • Breaux, T.D.1    Antón, A.I.2
  • 14
    • 33746038490 scopus 로고    scopus 로고
    • Towards a comprehensive framework for secure systems development
    • CAiSE 2006, Springer-Verlag
    • H. Mouratidis, J. Jürjens and J. Fox, "Towards a comprehensive framework for secure systems development," CAiSE 2006, Lecture Notes in Computer Science 4001,pp. 48-62, Springer-Verlag, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4001 , pp. 4862
    • Mouratidis, H.1    Jürjens, J.2    Fox, J.3
  • 15
    • 84871557995 scopus 로고    scopus 로고
    • GlobalPlatform, http://www.globalplatform.org/aboutus.asp
    • GlobalPlatform
  • 16
    • 84871557995 scopus 로고    scopus 로고
    • GlobalPlatform, http://www.globalplatform.org/specificationssystems.asp
    • GlobalPlatform
  • 17
    • 84864988834 scopus 로고    scopus 로고
    • European Commission Justice
    • European Commission Justice, Protection of Personal Data http://ec.europa.eu/justice/data-protection/index-en.htm
    • Protection of Personal Data
  • 23
    • 33751416458 scopus 로고    scopus 로고
    • A common criterion based security requirements engineering process for the development of secure information system
    • June
    • D. Mellado, E. Medina and M. Piattini, "A common criterion based security requirements engineering process for the development of secure information system," Computer standards & interfaces," 29:244-253, June 2007.
    • (2007) Computer Standards & Interfaces , vol.29 , pp. 244-253
    • Mellado, D.1    Medina, E.2    Piattini, M.3
  • 24
    • 77950516884 scopus 로고    scopus 로고
    • Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec
    • March 2010, Special Issue on Security Requirements Engineering, Springer-Verlag
    • S. H. Houmb, S. Islam, E. Knauss, J. Jürjens and K. Schneider, Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec, Requirements Engineering Journal (REJ), Vol 15, No 1, 2010, PP 63-93., March 2010, Special Issue on Security Requirements Engineering, Springer-Verlag.
    • (2010) Requirements Engineering Journal (REJ) , vol.15 , Issue.1 , pp. 63-93
    • Houmb, S.H.1    Islam, S.2    Knauss, E.3    Jürjens, J.4    Schneider, K.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.