메뉴 건너뛰기




Volumn 18, Issue 12, 2012, Pages 1679-1702

Risk-driven security metrics in agile software development - An industrial pilot study

Author keywords

Agile SW Development; Risk Analysis; Security metrics

Indexed keywords


EID: 84866244993     PISSN: 0958695X     EISSN: 09486968     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (16)

References (37)
  • 2
    • 84878047431 scopus 로고    scopus 로고
    • Evolution of the Voice Interconnect
    • Baldwin et al. 2010
    • [Baldwin et al. 2010] Balwin, J., Ewert, J., Yamen, S., "Evolution of the Voice Interconnect," Ericsson Review No. 2, 2010, 10-15.
    • (2010) Ericsson Review No. 2 , pp. 10-15
    • Balwin, J.1    Ewert, J.2    Yamen, S.3
  • 3
    • 84866246940 scopus 로고    scopus 로고
    • Guide to Adopting and Using the Security Content Automation Protocol (SCAP)
    • Barrett et al. 2009, U.S. National Institute of Standards and Technology
    • [Barrett et al. 2009] Barrett, M., Johnson, C., Mell, P., Quinn, S., Scarfone, K., "Guide to Adopting and Using the Security Content Automation Protocol (SCAP)," NIST Special Publication 800-117 (Draft), U.S. National Institute of Standards and Technology, 2009.
    • (2009) NIST Special Publication 800-117 (Draft)
    • Barrett, M.1    Johnson, C.2    Mell, P.3    Quinn, S.4    Scarfone, K.5
  • 6
    • 27544477471 scopus 로고    scopus 로고
    • Electronic Authentication Guideline
    • Burr 2008, U.S. Department of Commerce, NIST SP 800-63-1, Draft
    • [Burr 2008] Burr, W.E. et al. 2008. "Electronic Authentication Guideline," National Institute of Standards and Technology, U.S. Department of Commerce, NIST SP 800-63-1, Draft.
    • (2008) National Institute of Standards and Technology
    • Burr, W.E.1
  • 8
    • 81155123884 scopus 로고    scopus 로고
    • Operational Security Assurance Evaluation in Open Infrastructures
    • Haddad et al. 2011
    • [Haddad et al. 2011] Haddad, S., Dubus, S., Hecker, A., Kanstrén, T., Marquet, B., Savola, R., "Operational Security Assurance Evaluation in Open Infrastructures", Proc. CRiSIS 2011, pp. 100-105.
    • (2011) Proc. CRiSIS , pp. 100-105
    • Haddad, S.1    Dubus, S.2    Hecker, A.3    Kanstrén, T.4    Marquet, B.5    Savola, R.6
  • 9
    • 84866233732 scopus 로고    scopus 로고
    • Efficient Softswitching
    • Ericsson 2009
    • [Ericsson 2009] "Efficient Softswitching," Whitepaper, Ericsson, 2009. 11 p.
    • (2009) Whitepaper, Ericsson , pp. 11
  • 13
    • 34250156527 scopus 로고    scopus 로고
    • Writing Secure Code
    • Howard and LeBlanc 2003
    • [Howard and LeBlanc 2003] Howard, M. and LeBlanc, D., "Writing Secure Code," Microsoft, 2003.
    • (2003) Microsoft
    • Howard, M.1    Leblanc, D.2
  • 17
    • 84866233725 scopus 로고    scopus 로고
    • Series H: Audiovisual and Multimedia Systems - Infrastructure of Audiovisual Services - Communication Procedures - Gateway Control Protocol: Version 3
    • ITU-T 2005, International Telecommunication Union, Telecommunication Standardization Sector (ITU-T), Geneva, Switzerland
    • [ITU-T 2005] International Telecommunication Union, Telecommunication Standardization Sector (ITU-T), "Series H: Audiovisual and Multimedia Systems - Infrastructure of Audiovisual Services - Communication Procedures - Gateway Control Protocol: Version 3," ITU-T Recommendation H.248.1, Geneva, Switzerland, 2005, 195 p.
    • (2005) ITU-T Recommendation H.248.1 , pp. 195
  • 19
    • 84872856964 scopus 로고    scopus 로고
    • An Adaptive and Dependable Distributed Monitoring Framework
    • Kanstrén et al. 2011
    • [Kanstrén et al. 2011] Kanstrén, T., Savola, R., Haddad, S., Hecker, A., "An Adaptive and Dependable Distributed Monitoring Framework," Int. Journal on Advances in Security, 4(1&2), 1-19.
    • Int. Journal On Advances In Security , vol.4 , Issue.1-2 , pp. 1-19
    • Kanstrén, T.1    Savola, R.2    Haddad, S.3    Hecker, A.4
  • 22
    • 84880727392 scopus 로고    scopus 로고
    • Applied Security Visualization
    • Marty 2008
    • [Marty 2008] Marty, R., "Applied Security Visualization", Addison-Wesley, 2008, 552 p.
    • (2008) Addison-Wesley , pp. 552
    • Marty, R.1
  • 26
    • 84866233729 scopus 로고    scopus 로고
    • A Taxonomical Approach for Information Security Metrics Development
    • Savola 2007, Reykjavik, Iceland
    • [Savola 2007] Savola, R., "A Taxonomical Approach for Information Security Metrics Development," Nordsec'07 Supplemental Booklet of Short Papers, Reykjavik, Iceland, 11 p.
    • Nordsec'07 Supplemental Booklet of Short Papers , pp. 11
    • Savola, R.1
  • 27
    • 78149392355 scopus 로고    scopus 로고
    • A Security Metrics Taxonomization Model for Software-Intensive Systems
    • Savola 2009, Dec
    • [Savola 2009] Savola, R., "A Security Metrics Taxonomization Model for Software-Intensive Systems," Journal of Information Processing Systems, Vol. 5, No. 4, Dec. 2009, 197-206.
    • (2009) Journal of Information Processing Systems , vol.5 , Issue.4 , pp. 197-206
    • Savola, R.1
  • 28
    • 78149392139 scopus 로고    scopus 로고
    • On the Feasibility of Utilizing Security Metrics in Software-Intensive Systems
    • Savola 2010
    • [Savola 2010] Savola, R., "On the Feasibility of Utilizing Security Metrics in Software-Intensive Systems," Int. Journal of Computer Science and Network Security, 10(1), 230-239.
    • Int. Journal of Computer Science and Network Security , vol.10 , Issue.1 , pp. 230-239
    • Savola, R.1
  • 29
    • 77958019527 scopus 로고    scopus 로고
    • Development of Measurable Security for a Distributed Messaging System
    • Savola and Abie 2010
    • [Savola and Abie 2010] Savola, R., Abie, H., "Development of Measurable Security for a Distributed Messaging System," Int. Journal on Advances in Security, 2(4), 358-380.
    • Int. Journal On Advances In Security , vol.2 , Issue.4 , pp. 358-380
    • Savola, R.1    Abie, H.2
  • 30
    • 84875991371 scopus 로고    scopus 로고
    • Increasing Measurability and Meaningfulness of Adaptive Security Monitoring by System Architectural Design and Mechanisms
    • Savola and Heinonen 2011a
    • [Savola and Heinonen 2011a] Savola, R., Heinonen, P., "Increasing Measurability and Meaningfulness of Adaptive Security Monitoring by System Architectural Design and Mechanisms," Int. Journal on Advances in Systems and Measurements, 4(1&2), 1-19.
    • Int. Journal On Advances In Systems and Measurements , vol.4 , Issue.1-2 , pp. 1-19
    • Savola, R.1    Heinonen, P.2
  • 31
    • 80053954598 scopus 로고    scopus 로고
    • A Visualization and Modeling Tool for Security Metrics and Measurements Management
    • Savola and Heinonen 2011b
    • [Savola and Heinonen 2011b] Savola, R., Heinonen, P., "A Visualization and Modeling Tool for Security Metrics and Measurements Management," Proc. ISSA 2011, 8 p.
    • (2011) Proc. ISSA , pp. 8
    • Savola, R.1    Heinonen, P.2
  • 32
    • 78149472349 scopus 로고    scopus 로고
    • Towards Security Effectiveness Measurement Utilizing Risk-Based Security Assurance
    • Savola, Pentikäinen and Ouedraogo 2010
    • [Savola, Pentikäinen and Ouedraogo 2010] Savola, R., Pentikäinen, H. and Ouedraogo, M., "Towards Security Effectiveness Measurement Utilizing Risk-Based Security Assurance," Proc. ISSA 2010, 8 p.
    • (2010) Proc. ISSA , pp. 8
    • Savola, R.1    Pentikäinen, H.2    Ouedraogo, M.3
  • 33
    • 84862064647 scopus 로고    scopus 로고
    • Agile Software Development with Scrum
    • Schwaber and Beedle 2001
    • [Schwaber and Beedle 2001] Schwaber, K., Beedle, M., "Agile Software Development with Scrum," Prentice Hall, 2001.
    • (2001) Prentice Hall
    • Schwaber, K.1    Beedle, M.2
  • 34
    • 84866244157 scopus 로고    scopus 로고
    • SecViz 2011, Jan. 15
    • [SecViz 2011] Security Visualization. http://www.secviz.org/node/89 [Jan. 15, 2012].
    • (2012) Security Visualization
  • 35
    • 77950875313 scopus 로고    scopus 로고
    • Quantified Security is a Weak Hypothesis: A Critical Survey of Results and Assumptions
    • Verendel 2009, Oxford, U.K
    • [Verendel 2009] Verendel, V., "Quantified Security is a Weak Hypothesis: a Critical Survey of Results and Assumptions," New Security Paradigms Workshop, Oxford, U.K., 2009, 37-50.
    • (2009) New Security Paradigms Workshop , pp. 37-50
    • Verendel, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.