메뉴 건너뛰기




Volumn 18, Issue 12, 2012, Pages 1608-1627

Aligning security and privacy to support the development of secure information systems

Author keywords

Constraints; Goal modelling; Meta model; Privacy; Security

Indexed keywords


EID: 84866253432     PISSN: 0958695X     EISSN: 09486968     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (24)

References (34)
  • 1
    • 77950545414 scopus 로고    scopus 로고
    • Strategies for developing policies and requirements for secure electronic commerce systems
    • [Antón, 00], ACM
    • [Antón, 00] A. Antón, and J. Earp, Strategies for developing policies and requirements for secure electronic commerce systems. 1st Workshop on security and privacy in e-commerce. ACM, 2000.
    • (2000) 1st Workshop On Security and Privacy In E-commerce
    • Antón, A.1    Earp, J.2
  • 2
    • 84866246200 scopus 로고    scopus 로고
    • Business Process Patterns and Frameworks: Reusing Knowledge in Process Innovation
    • [Barros, 04], Technical Report 56, Universidad de Chile, 2004
    • [Barros, 04] O. Barros, Business Process Patterns and Frameworks: Reusing Knowledge in Process Innovation, Technical Report 56, Universidad de Chile, 2004. [Cocoon, 02] Cocoon XML publishing framework, 2002, http://xml.apache.org/cocoon/
    • (2002) [Cocoon, 02] Cocoon XML Publishing Framework
    • Barros, O.1
  • 4
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing Regulator Rules for privacy and Security Requirements
    • [Breaux, 08], January-February
    • [Breaux, 08] T. D. Breaux and A. I. Antón, Analyzing Regulator Rules for privacy and Security Requirements, IEEE transactions on software engineering, Vol. 34, No. 1, January-February 2008.
    • (2008) IEEE Transactions On Software Engineering , vol.34 , Issue.1
    • Breaux, T.D.1    Antón, A.I.2
  • 6
    • 84979855000 scopus 로고
    • Dealing with security requirements during the development of information systems
    • [Chung, 93], CAiSE'93, Paris, France, Springer Verlag LNCS 685
    • [Chung, 93] L. Chung, Dealing with security requirements during the development of information systems. The 5th international conference of advanced information systems engineering, CAiSE'93, Paris, France, Springer Verlag LNCS 685, pp: 234-251,1993.
    • (1993) The 5th International Conference of Advanced Information Systems Engineering , pp. 234-251
    • Chung, L.1
  • 7
    • 84866234347 scopus 로고
    • IT-Security and Privacy
    • [Fischer-Hübner, 01], Lecture Notes in Computer Science, Springer-Verlag, Berlin, 2001
    • [Fischer-Hübner, 01] S. Fischer-Hübner, IT-Security and Privacy, Design and Use of Privacy Enhancing Security Mechanisms. Lecture Notes in Computer Science, Vol. 1958. Springer-Verlag, Berlin, 2001.
    • (1958) Design and Use of Privacy Enhancing Security Mechanisms
    • Fischer-Hübner, S.1
  • 10
    • 77950516884 scopus 로고    scopus 로고
    • Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec
    • [Houmb, 10], March
    • [Houmb, 10] S. H. Houmb, S. Islam, E. Knauss, J. Jürjens, and K. Schneider. Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec. Requirements Engineering Journal, 15(1):63-93, March 2010.
    • (2010) Requirements Engineering Journal , vol.15 , Issue.1 , pp. 63-93
    • Houmb, S.H.1    Islam, S.2    Knauss, E.3    Jürjens, J.4    Schneider, K.5
  • 17
    • 50949085110 scopus 로고    scopus 로고
    • Addressing privacy requirements in system design: The PriS method
    • [Kalloniatis, 08]
    • [Kalloniatis, 08] C. Kalloniatis, E. Kavakli, and S. Gritzalis, Addressing privacy requirements in system design: The PriS method, Requirements Engineering, 13(3): 241-255, 2008.
    • (2008) Requirements Engineering , vol.13 , Issue.3 , pp. 241-255
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 18
    • 70849084080 scopus 로고    scopus 로고
    • Proceedings of the PCI 2009 13th Pan-Hellenic Conference on Informatics (with international participation)
    • [Kalloniatis, 09], N. Alexandris, V. Chryssikopoulos, C. Douligeris, N. Kanellopoulos (Eds.), September, Corfu: Greece, IEEE CPS Conference Publishing Services
    • [Kalloniatis, 09] C. Kalloniatis, E. Kavakli, S. Gritzalis, Methods for Designing Privacy Aware Information Systems: A review, Proceedings of the PCI 2009 13th Pan-Hellenic Conference on Informatics (with international participation), N. Alexandris, V. Chryssikopoulos, C. Douligeris, N. Kanellopoulos (Eds.), September 2009, Corfu: Greece, IEEE CPS Conference Publishing Services.
    • (2009) Methods For Designing Privacy Aware Information Systems: A Review
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 19
    • 84992927367 scopus 로고    scopus 로고
    • Protecting Privacy in System Design: The Electronic Voting Case, Transforming Government: People
    • [Kavakli, 07]
    • [Kavakli, 07] E. Kavakli, S. Gritzalis, and C. Kalloniatis, C. (2007), Protecting Privacy in System Design: The Electronic Voting Case, Transforming Government: People, Process and Policy, 1(4): 307-332.
    • (2007) Process and Policy , vol.1 , Issue.4 , pp. 307-332
    • Kavakli, E.1    Gritzalis, S.2    Kalloniatis, C.3
  • 22
    • 2542438623 scopus 로고    scopus 로고
    • From Information Modelling to Enterprise Modelling
    • [Loucopoulos, 00], Springer
    • [Loucopoulos, 00] P. Loucopoulos, From Information Modelling to Enterprise Modelling. In: IS Engineering: State of the Art and Research Themes. Springer, 2000, 67-78.
    • (2000) IS Engineering: State of the Art and Research Themes , pp. 67-78
    • Loucopoulos, P.1
  • 23
    • 33644508508 scopus 로고    scopus 로고
    • Enterprise Knowledge Management and Conceptual Modelling
    • [Loucopoulos, 99], Springer
    • [Loucopoulos, 99] P. Loucopoulos, V. Kavakli, Enterprise Knowledge Management and Conceptual Modelling. LNCS Vol. 1565. Springer,123-143,1999.
    • (1999) LNCS , vol.1565 , pp. 123-143
    • Loucopoulos, P.1    Kavakli, V.2
  • 25
    • 84899324292 scopus 로고    scopus 로고
    • Identifying Security Requirements Using the Security Quality Requirements Engineering (SQUARE) Method
    • [Mead, 06], Idea Publishing Group
    • [Mead, 06] N.R. Mead, Identifying Security Requirements Using the Security Quality Requirements Engineering (SQUARE) Method, Integrating Security and Software Engineering, pp. 44-69, Idea Publishing Group, 2006.
    • (2006) Integrating Security and Software Engineering , pp. 44-69
    • Mead, N.R.1
  • 26
    • 33751416458 scopus 로고    scopus 로고
    • A common criterion based security requirements engineering process for the development of secure information system
    • [Mellado, 07], June
    • [Mellado, 07] D. Mellado, E. Medina, and M. Piattini, A common criterion based security requirements engineering process for the development of secure information system. Computer standards & interfaces, 29:244- 253, June 2007.
    • (2007) Computer Standards & Interfaces, 29:244- , pp. 253
    • Mellado, D.1    Medina, E.2    Piattini, M.3
  • 27
    • 12344314483 scopus 로고    scopus 로고
    • A framework for security requirements engineering
    • [Moffett, 95], University of York, YCS
    • [Moffett, 95] D. Moffett and B. Nuseibeh, A framework for security requirements engineering. Department of computer science, University of York, YCS 368, 2003.
    • (2003) Department of Computer Science , pp. 368
    • Moffett, D.1    Nuseibeh, B.2
  • 30
    • 34548508691 scopus 로고    scopus 로고
    • Security Attack Testing (SAT) - testing the security of information systems at design time.
    • [Mouratidis, 07b]
    • [Mouratidis, 07b] H. Mouratidis and P. Giorgini, Security Attack Testing (SAT) - testing the security of information systems at design time. Inf. Syst. 32(8): 1166-1183, 2007.
    • (2007) Inf. Syst , vol.32 , Issue.8 , pp. 1166-1183
    • Mouratidis, H.1    Giorgini, P.2
  • 31
    • 84866234350 scopus 로고    scopus 로고
    • Designing Law-Compliant Software Requirement
    • [Siena, 09], Volume 5829/2009, 28th International Conference on Conceptual Modeling (ER2009), Gramado, Brazil
    • [Siena, 09] A. Siena, J. Mylopoulos, A. Perini, and A. Susi. Designing Law-Compliant Software Requirement, LNCS, Volume 5829/2009, 28th International Conference on Conceptual Modeling (ER2009), Gramado, Brazil.
    • LNCS
    • Siena, A.1    Mylopoulos, J.2    Perini, A.3    Susi, A.4
  • 32
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting Security Requirements with Misuse Cases
    • [Sindre, 05]
    • [Sindre, 05] G. Sindre and A. L. Opdahl, Eliciting Security Requirements with Misuse Cases, Requirements Engineering, 10(1):34-44, January 2005.
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 33
    • 85026689401 scopus 로고
    • Modeling organisations for information systems requirements engineering
    • [Yu, 93]
    • [Yu, 93] E. Yu. Modeling organisations for information systems requirements engineering. 1st IEEE International Symposium on Requirements Engineering pp: 34-41, 1993.
    • (1993) 1st IEEE International Symposium On Requirements Engineering , pp. 34-41
    • Yu, E.1
  • 34


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.