메뉴 건너뛰기




Volumn 7617 LNCS, Issue , 2012, Pages 89-104

How to select a security requirements method? A comparative study with students and practitioners

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION SCENARIO; COMPARATIVE STUDIES; EMPIRICAL EVALUATIONS; QUALITATIVE STUDY; SECURITY MANAGEMENT; SECURITY REQUIREMENTS; SECURITY REQUIREMENTS ENGINEERING; SECURITY RISKS; SOFTWARE LIFE CYCLES;

EID: 84868373023     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-34210-3_7     Document Type: Conference Paper
Times cited : (19)

References (21)
  • 3
    • 72449133279 scopus 로고    scopus 로고
    • A systematic mapping study on empirical evaluation of software requirements specifications techniques
    • Condori-Fernandez, N., Daneva, M., Sikkel, K., Wieringa, R., Dieste, O., Pastor, O.: A systematic mapping study on empirical evaluation of software requirements specifications techniques. In: Proc. of ESEM 2009, pp. 502-505 (2009)
    • (2009) Proc. of ESEM 2009 , pp. 502-505
    • Condori-Fernandez, N.1    Daneva, M.2    Sikkel, K.3    Wieringa, R.4    Dieste, O.5    Pastor, O.6
  • 4
    • 27644537252 scopus 로고    scopus 로고
    • Modeling security requirements through ownership, permission and delegation
    • Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modeling security requirements through ownership, permission and delegation. In: Proc. of RE 2005, pp. 167-176 (2005)
    • (2005) Proc. of RE 2005 , pp. 167-176
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 5
    • 81255185570 scopus 로고    scopus 로고
    • Reducing the effort to comprehend risk models: Text labels are often preferred over graphical means
    • Grondahl, I.H., Lund, M.S., Stolen, K.: Reducing the effort to comprehend risk models: Text labels are often preferred over graphical means. Risk Analysis 31(11), 1813-1831 (2011)
    • (2011) Risk Analysis , vol.31 , Issue.11 , pp. 1813-1831
    • Grondahl, I.H.1    Lund, M.S.2    Stolen, K.3
  • 8
    • 33750384757 scopus 로고    scopus 로고
    • A Graphical Approach to Risk Identification, Motivated by Empirical Investigations
    • Wang, J., Whittle, J., Harel, D., Reggio, G. (eds.) MoDELS 2006. Springer, Heidelberg
    • Hogganvik, I., Stølen, K.: A Graphical Approach to Risk Identification, Motivated by Empirical Investigations. In: Wang, J., Whittle, J., Harel, D., Reggio, G. (eds.) MoDELS 2006. LNCS, vol. 4199, pp. 574-588. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4199 , pp. 574-588
    • Hogganvik, I.1    Stølen, K.2
  • 10
    • 79955163100 scopus 로고    scopus 로고
    • UMLsec: Extending UML for Secure Systems Development
    • Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. Springer, Heidelberg
    • Jürjens, J.: UMLsec: Extending UML for Secure Systems Development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412-425. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2460 , pp. 412-425
    • Jürjens, J.1
  • 11
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: A UML-Based Modeling Language for Model-Driven Security
    • Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. Springer, Heidelberg
    • Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426-441. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2460 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 14
    • 33751189883 scopus 로고    scopus 로고
    • Security quality requirements engineering (square) methodology
    • Mead, N.R., Stehney, T.: Security quality requirements engineering (square) methodology. SIGSOFT Softw. Eng. Notes 30(4), 1-7 (2005)
    • (2005) SIGSOFT Softw. Eng. Notes , vol.30 , Issue.4 , pp. 1-7
    • Mead, N.R.1    Stehney, T.2
  • 16
    • 35048845022 scopus 로고    scopus 로고
    • Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems
    • Eder, J., Missikoff, M. (eds.) CAiSE 2003. Springer, Heidelberg
    • Mouratidis, H., Giorgini, P., Manson, G.: Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol. 2681, pp. 1031-1031. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2681 , pp. 1031-1031
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.3
  • 18
    • 60949097689 scopus 로고    scopus 로고
    • Experimental comparison of attack trees and misuse cases for security threat identification
    • Opdahl, A.L., Sindre, G.: Experimental comparison of attack trees and misuse cases for security threat identification. Inf. Softw. Technol. 51(5), 916-932 (2009)
    • (2009) Inf. Softw. Technol. , vol.51 , Issue.5 , pp. 916-932
    • Opdahl, A.L.1    Sindre, G.2
  • 19
    • 0009629259 scopus 로고
    • Software-engineering research revisited
    • Potts, C.: Software-engineering research revisited. IEEE Softw. 10(5), 19-28 (1993)
    • (1993) IEEE Softw. , vol.10 , Issue.5 , pp. 19-28
    • Potts, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.