메뉴 건너뛰기




Volumn , Issue , 2006, Pages 275-326

A software product line reference architecture for security

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84869874535     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-3-540-33253-4_8     Document Type: Chapter
Times cited : (21)

References (62)
  • 1
    • 33749469503 scopus 로고    scopus 로고
    • Outsourcing managed security services
    • CMU/SEI-SIM-012. 2003, Carnegie Mellon, Software Engineering Institute: Pittsburg, PA
    • Allen J, Gabbard D, and May C (2003) Outsourcing Managed Security Services In: Security improvement module, CMU/SEI-SIM-012. 2003, Carnegie Mellon, Software Engineering Institute: Pittsburg, PA.
    • (2003) Security Improvement Module
    • Allen, J.1    Gabbard, D.2    May, C.3
  • 4
  • 6
    • 8844284465 scopus 로고    scopus 로고
    • Persistent software attributes
    • Bollinger T, Voas J, and Boasson M, Persistent Software Attributes. IEEE Software, 2004. 21(6): p. 16-18.
    • (2004) IEEE Software , vol.21 , Issue.6 , pp. 16-18
    • Bollinger, T.1    Voas, J.2    Boasson, M.3
  • 9
    • 0036036577 scopus 로고    scopus 로고
    • Security attribute evaluation method: A cost-benefit approach
    • ACM Press
    • Butler SA (2002) Security Attribute Evaluation Method: A Cost-Benefit Approach. In: International conference on software engineering. ACM Press. p. 232-240.
    • (2002) International Conference on Software Engineering , pp. 232-240
    • Butler, S.A.1
  • 18
    • 1242321281 scopus 로고    scopus 로고
    • Ddos attacks and defense mechanisms: Classification and state-of-the-art
    • Douligeris C and Mitrokotsa A, Ddos Attacks and Defense Mechanisms: Classification and State-of-the-Art. Computer Networks, 2004. 44(5): p. 643-666.
    • (2004) Computer Networks , vol.44 , Issue.5 , pp. 643-666
    • Douligeris, C.1    Mitrokotsa, A.2
  • 19
    • 0032058031 scopus 로고    scopus 로고
    • Client/server benefits, problems, best practices
    • Duchessi P and Chengalur-Smith I, Client/Server Benefits, Problems, Best Practices. Communications of the ACM, 1998. 41(5): p. 87-94.
    • (1998) Communications of the ACM , vol.41 , Issue.5 , pp. 87-94
    • Duchessi, P.1    Chengalur-Smith, I.2
  • 21
    • 33744905133 scopus 로고    scopus 로고
    • A pattern language for security models
    • Fernandez EB and Pan R (2001) A Pattern Language for Security Models. In: PLoP 2001.
    • (2001) PLoP 2001
    • Fernandez, E.B.1    Pan, R.2
  • 25
    • 35048892011 scopus 로고    scopus 로고
    • Patterns in product family architecture design
    • Springer Verlag Linden FVd
    • Hallsteinsen S, Fægri TE, and Syrstad M (2003) Patterns in Product Family Architecture Design. In: Linden FVd (ed) PFE-5. Springer Verlag. p. 261-268.
    • (2003) PFE-5 , pp. 261-268
    • Hallsteinsen, S.1    Fægri, T.E.2    Syrstad, M.3
  • 26
    • 35048892011 scopus 로고    scopus 로고
    • Patterns in product family architecture design
    • 5th International workshop on Product Family Engineering. Springer, Berlin Heidelberg New York
    • Hallsteinsen S, Fægri TE, and Syrstad M (2003) Patterns in Product Family Architecture Design. In: Linden FVd (ed) 5th International workshop on Product Family Engineering. Springer, Berlin Heidelberg New York. p. 261-268.
    • (2003) Linden FVd , pp. 261-268
    • Hallsteinsen, S.1    Fægri, T.E.2    Syrstad, M.3
  • 30
    • 4644328140 scopus 로고    scopus 로고
    • Measuring software product quality: A survey of iso/iec 9126
    • Jung H-W, Kim S-G, and Chung C-S, Measuring Software Product Quality: A Survey of Iso/Iec 9126. IEEE Software, 2004. 21(5): p. 88-92.
    • (2004) IEEE Software , vol.21 , Issue.5 , pp. 88-92
    • Jung, H.-W.1    Kim, S.-G.2    Chung, C.-S.3
  • 34
    • 0036641895 scopus 로고    scopus 로고
    • Software product families in Europe: The Esaps and Café projects
    • Linden Fvd, Software Product Families in Europe: The Esaps and Café Projects. IEEE Software, 2002. 19(4): p. 41-49.
    • (2002) IEEE Software , vol.19 , Issue.4 , pp. 41-49
    • Van Der Linden, F.1
  • 36
    • 3042781449 scopus 로고    scopus 로고
    • Towards reliable user authentication through biometrics
    • Matyás V and Ríha Z, Towards Reliable User Authentication through Biometrics. IEEE Security & Privacy, 2003. 1(3): p. 45-49.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.3 , pp. 45-49
    • Matyás, V.1    Ríha, Z.2
  • 38
    • 84887954009 scopus 로고    scopus 로고
    • Microsoft (2002) Building Secure Asp. Net Applications. Microsoft: www.microsoft.com.
    • Microsoft
  • 39
    • 84887878740 scopus 로고    scopus 로고
    • Microsoft (2003) Enterprise Solution Patterns Using Microsoft. Net. Microsoft Corp.: http://msdn. microsoft.com/library/default.asp?url=/library/en- us/dnpatterns/html/Esp.asp.
    • Net. Microsoft Corp.
  • 41
  • 42
    • 10044293457 scopus 로고    scopus 로고
    • Comparing passwords, tokens, and biometrics for user authentication
    • O'Gorman L, Comparing Passwords, Tokens, and Biometrics for User Authentication. Proceedings of the IEEE, 2003. 91 (12).
    • (2003) Proceedings of the IEEE , vol.91 , Issue.12
    • O'Gorman, L.1
  • 49
    • 0016081584 scopus 로고
    • Protection and the control of information sharing in multics
    • Saltzer JH, Protection and the Control of Information Sharing in Multics. Communications of the ACM, 1974. 17(7): p. 388-402.
    • (1974) Communications of the ACM , vol.17 , Issue.7 , pp. 388-402
    • Saltzer, J.H.1
  • 50
  • 51
    • 0038601427 scopus 로고    scopus 로고
    • Patterns, frameworks, and middleware: Their synergistic relationships
    • IEEE Computer Society
    • Schmidt DC and Buschmann F (2003) Patterns, Frameworks, and Middleware: Their Synergistic Relationships. In: International conference on software engineering. IEEE Computer Society. p. 694-704.
    • (2003) International Conference on Software Engineering , pp. 694-704
    • Schmidt, D.C.1    Buschmann, F.2
  • 52
    • 0033489648 scopus 로고    scopus 로고
    • Security architecture-based system design
    • ACM Press
    • Schneider EA (1999) Security Architecture-Based System Design. In: New security paradigms workshop. ACM Press. p. 25-31.
    • (1999) New Security Paradigms Workshop , pp. 25-31
    • Schneider, E.A.1
  • 54
    • 33746064515 scopus 로고    scopus 로고
    • Security engineering with patterns: Origins, theoretical model, and new applications
    • Springer Verlag
    • Shumacher M, ed. Security Engineering with Patterns: Origins, Theoretical Model, and New Applications (2003). Lecture Notes in Computer Science. Vol. 2754. Springer Verlag pp.
    • (2003) Lecture Notes in Computer Science , vol.2754
    • Shumacher, M.1
  • 55
    • 3042740017 scopus 로고    scopus 로고
    • Humans in the loop: Human-computer interaction and security
    • Smith SW, Humans in the Loop: Human-Computer Interaction and Security. IEEE Security & privacy, 2003. 1(3): p. 75-79.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.3 , pp. 75-79
    • Smith, S.W.1
  • 57
    • 21644486638 scopus 로고    scopus 로고
    • Security is harder than you think
    • Viega J and Messier M, Security Is Harder Than You Think, in ACM Queue. 2004. p. 60-65.
    • (2004) ACM Queue , pp. 60-65
    • Viega, J.1    Messier, M.2
  • 60
    • 0032099518 scopus 로고    scopus 로고
    • Security control for cots components
    • Zhong Q and Edwards N, Security Control for Cots Components. IEEE computer, 1998. 31(6): p. 67-73.
    • (1998) IEEE Computer , vol.31 , Issue.6 , pp. 67-73
    • Zhong, Q.1    Edwards, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.