메뉴 건너뛰기




Volumn 45, Issue , 2009, Pages 21-36

Security and Dependability Engineering

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84874759719     PISSN: 15682633     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-88775-3_2     Document Type: Article
Times cited : (4)

References (93)
  • 2
    • 55049109759 scopus 로고    scopus 로고
    • Model-driven security engineering for trust management in SECTET
    • Alam M, Hafner M, and Breu R (2007). Model-driven security engineering for trust management in SECTET. Journal of Software, 2(1).
    • (2007) Journal of Software , vol.2 , Issue.1
    • Alam, M.1    Hafner, M.2    Breu, R.3
  • 5
    • 24344438696 scopus 로고    scopus 로고
    • Secure software development by example
    • Apvrille A and Pourzandi M (2005). Secure software development by example. IEEE Security & Privacy, 3(4):10-17.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.4 , pp. 10-17
    • Apvrille, A.1    Pourzandi, M.2
  • 6
    • 49049111838 scopus 로고    scopus 로고
    • Modelling security properties in a grid-based operating system with anti-goals
    • Arenas A, Aziz B, Bicarregui J, Matthews B, and Yang EY (2008). Modelling security properties in a grid-based operating system with anti-goals. In ARES [42]: 1429-1436.
    • (2008) In ARES , Issue.42 , pp. 1429-1436
    • Arenas, A.1    Aziz, B.2    Bicarregui, J.3    Matthews, B.4    Yang, E.Y.5
  • 7
    • 80052122622 scopus 로고    scopus 로고
    • A Metamodel-Based Approach for Analyzing Security-Design Models
    • Basin DA, Clavel M, Doser J, Egea M (2007). A Metamodel-Based Approach for Analyzing Security-Design Models. MoDELS 2007: 420-435.
    • (2007) MoDELS , vol.2007 , pp. 420-435
    • Basin, D.A.1    Clavel, M.2    Doser, J.3    Egea, M.4
  • 9
    • 33845216895 scopus 로고    scopus 로고
    • A model based approach to trust, security and assurance
    • Baldwin A, Beres Y, Shiu S, and Kearney P (2006). A model based approach to trust, security and assurance. BT Technology Journal, 24(4):53-68.
    • (2006) BT Technology Journal , vol.24 , Issue.4 , pp. 53-68
    • Baldwin, A.1    Beres, Y.2    Shiu, S.3    Kearney, P.4
  • 10
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: From UML models to access control infrastructures
    • Basin DA, Doser J, and Lodderstedt T (2006). Model driven security: From UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol., 15(1): 39-91.
    • (2006) ACM Trans. Softw. Eng. Methodol , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.A.1    Doser, J.2    Lodderstedt, T.3
  • 15
    • 33846828667 scopus 로고    scopus 로고
    • A model-driven approach for the german health telematics architectural framework and security infrastructure
    • Blobel B and Pharow P (2007). A model-driven approach for the german health telematics architectural framework and security infrastructure. International Journal of Medical Informatics, 76(2-3): 169-175.
    • (2007) International Journal of Medical Informatics , vol.76 , Issue.2-3 , pp. 169-175
    • Blobel, B.1    Pharow, P.2
  • 17
    • 33750286091 scopus 로고    scopus 로고
    • A model transformation semantics and analysis methodology for SecureUML
    • of LNCS, Springer
    • Brucker AD, Doser J, and Wolff B (2006). A model transformation semantics and analysis methodology for SecureUML. In MoDELS 2006, volume 4199 of LNCS: 306-320. Springer.
    • (2006) MoDELS 2006 , vol.4199 , pp. 306-320
    • Brucker, A.D.1    Doser, J.2    Wolff, B.3
  • 18
    • 26444451066 scopus 로고    scopus 로고
    • End-to-end integrated security and performance analysis on the DEGAS Choreographer Platform
    • of LNCS, Springer
    • Buchholtz M, Gilmore S, Haenel V, and Montangero C (2005). End-to-end integrated security and performance analysis on the DEGAS Choreographer Platform. In FM 2005, volume 3582 of LNCS: 286-301. Springer.
    • (2005) FM 2005 , vol.3582 , pp. 286-301
    • Buchholtz, M.1    Gilmore, S.2    Haenel, V.3    Montangero, C.4
  • 21
  • 25
    • 38349123642 scopus 로고    scopus 로고
    • A goal oriented approach for modeling and analyzing security trade-offs
    • of LNCS, Springer
    • Elahi G and Yu E (2007). A goal oriented approach for modeling and analyzing security trade-offs. In ER 2007, volume 4801 of LNCS: 375-390. Springer.
    • (2007) ER 2007 , vol.4801 , pp. 375-390
    • Elahi, G.1    Yu, E.2
  • 28
    • 35048814534 scopus 로고    scopus 로고
    • Extending OCL for secure database development
    • Springer
    • Fernández-Medina E and Piattini M (2004). Extending OCL for secure database development. In UML 2004, LNCS: 380-394. Springer.
    • (2004) UML 2004, LNCS , pp. 380-394
    • Fernández-Medina, E.1    Piattini, M.2
  • 31
    • 33646135775 scopus 로고    scopus 로고
    • Choreographing security and performance analysis for web services
    • of LNCS, Springer
    • Gilmore S, Haenel V, Kloul L, and Maidl M (2005). Choreographing security and performance analysis for web services. In EPEW/WS-FM 2005, volume 3670 of LNCS: 200-214. Springer.
    • (2005) EPEW/WS-FM 2005 , vol.3670 , pp. 200-214
    • Gilmore, S.1    Haenel, V.2    Kloul, L.3    Maidl, M.4
  • 32
    • 0142156745 scopus 로고    scopus 로고
    • Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard
    • In I.-Y. Song, S.W. Liddle, T.W. Ling, and P Scheuermann, editors, of LNCS, Springer
    • Giorgini P, Massacci F, and Mylopoulos J (2003). Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard. In I.-Y. Song, S.W. Liddle, T.W. Ling, and P Scheuermann, editors, 22nd International Conference on Conceptual Modeling (ER 2003), volume 2813 of LNCS: 263-276. Springer.
    • (2003) 22nd International Conference On Conceptual Modeling (ER 2003) , vol.2813 , pp. 263-276
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3
  • 34
    • 19144370194 scopus 로고    scopus 로고
    • On the verification of cryptographic protocols-a tale of two committees
    • In S Schneider and P Ryan, editors, of ENTCS. Elsevier
    • Gollmann D (2000). On the verification of cryptographic protocols-a tale of two committees. In S Schneider and P Ryan, editors, Workshop on Security Architectures and Information Flow, volume 32 of ENTCS. Elsevier.
    • (2000) Workshop On Security Architectures and Information Flow , vol.32
    • Gollmann, D.1
  • 35
    • 26944475725 scopus 로고    scopus 로고
    • Cryptographic protocol analysis on real c code
    • Springer
    • Goubault-Larrecq J and Parrennes F (2005). Cryptographic protocol analysis on real c code. In VMCAI'05, LNCS. Springer.
    • (2005) VMCAI'05, LNCS
    • Goubault-Larrecq, J.1    Parrennes, F.2
  • 36
    • 84882794820 scopus 로고    scopus 로고
    • Validation of cryptographic protocols by efficient automated testing
    • In James N. Etheredge and Bill Z. Manaris, editors, AAAI Press
    • Gürgens S and Peralta R (2000). Validation of cryptographic protocols by efficient automated testing. In James N. Etheredge and Bill Z. Manaris, editors, FLAIRS Conference: 7-12. AAAI Press.
    • (2000) FLAIRS Conference , pp. 7-12
    • Gürgens, S.1    Peralta, R.2
  • 37
    • 40449096402 scopus 로고    scopus 로고
    • Security requirements engineering: A framework for representation and analysis
    • Haley CB, Laney RC, Moffett JD, and Nuseibeh B (2008). Security requirements engineering: A framework for representation and analysis. IEEE Trans. Software Eng., 34(1):133-153.
    • (2008) IEEE Trans. Software Eng , vol.34 , Issue.1 , pp. 133-153
    • Haley, C.B.1    Laney, R.C.2    Moffett, J.D.3    Nuseibeh, B.4
  • 38
    • 84944039689 scopus 로고    scopus 로고
    • A method for secure smartcard applications
    • In Hélène Kirchner and Christophe Ringeissen, editors, of Lecture Notes in Computer Science, Springer
    • Haneberg D, Reif W, and Stenzel K (2002). A method for secure smartcard applications. In Hélène Kirchner and Christophe Ringeissen, editors, AMAST, volume 2422 of Lecture Notes in Computer Science: 319-333. Springer.
    • (2002) AMAST , vol.2422 , pp. 319-333
    • Haneberg, D.1    Reif, W.2    Stenzel, K.3
  • 39
    • 0142157005 scopus 로고    scopus 로고
    • Bridging model-based and language-based security
    • In E Snekkenes and D Gollmann, editors, of LNCS, Springer
    • Heldal R and Hultin F (2003). Bridging model-based and language-based security. In E Snekkenes and D Gollmann, editors, 8th European Symposium on Research in Computer Security (ESORICS 2003), volume 2808 of LNCS: 235-252. Springer.
    • (2003) 8th European Symposium On Research In Computer Security (ESORICS 2003) , vol.2808 , pp. 235-252
    • Heldal, R.1    Hultin, F.2
  • 42
    • 84882799865 scopus 로고    scopus 로고
    • IEEE. 3rd Int Conference on Availability, Reliability and Security (ARES 2008)
    • IEEE. 3rd Int Conference on Availability, Reliability and Security (ARES 2008), 2008.
    • (2008)
  • 44
    • 84885216103 scopus 로고    scopus 로고
    • Secure information flow for concurrent processes
    • In C Palamidessi, editor, of LNCS, Springer
    • Jürjens J (2000). Secure information flow for concurrent processes. In C Palamidessi, editor, CONCUR 2000 (11th International Conference on Concurrency Theory), volume 1877 of LNCS: 395-409. Springer.
    • (2000) CONCUR 2000 (11th International Conference On Concurrency Theory) , vol.1877 , pp. 395-409
    • Jürjens, J.1
  • 46
    • 84944220091 scopus 로고    scopus 로고
    • Towards development of secure systems using UMLsec
    • In H Hußmann, editor, of LNCS, Springer. Also Oxford University Computing Laboratory TR-9-00 (November 2000)
    • Jürjens J (2001). Towards development of secure systems using UMLsec. In H Hußmann, editor, 4th International Conference on Fundamental Approaches to Software Engineering (FASE), volume 2029 of LNCS: 187-200. Springer. Also Oxford University Computing Laboratory TR-9-00 (November 2000), http://web.comlab.ox.ac.uk/oucl/publications/tr/tr-9-00.html.
    • (2001) 4th International Conference On Fundamental Approaches to Software Engineering (FASE) , vol.2029 , pp. 187-200
    • Jürjens, J.1
  • 51
    • 33244457785 scopus 로고    scopus 로고
    • Sound methods and effective tools for model-based security engineering with UML
    • Jürjens J (2005). Sound methods and effective tools for model-based security engineering with UML. In 27th Int Conf on Softw Engineering. IEEE.
    • (2005) In 27th Int Conf On Softw Engineering. IEEE
    • Jürjens, J.1
  • 52
    • 34547455692 scopus 로고    scopus 로고
    • Security analysis of crypto-based Java programs using automated theorem provers
    • In S Easterbrook and S Uchitel, editors, ASE 2006). ACM
    • Jürjens J (2006). Security analysis of crypto-based Java programs using automated theorem provers. In S Easterbrook and S Uchitel, editors, 21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006). ACM.
    • (2006) 21st IEEE/ACM International Conference On Automated Software Engineering
    • Jürjens, J.1
  • 54
    • 55049118116 scopus 로고    scopus 로고
    • Model-based security analysis of the German Health Card architecture
    • Special section on Model-based Development of Trustworthy Health Information Systems
    • Jürjens J and Rumm R (2008). Model-based security analysis of the German Health Card architecture. Methods of Information in Medicine, vol. 47, 5: 409-416. Special section on Model-based Development of Trustworthy Health Information Systems.
    • (2008) Methods of Information In Medicine , vol.47 , Issue.5 , pp. 409-416
    • Jürjens, J.1    Rumm, R.2
  • 55
    • 35348959376 scopus 로고    scopus 로고
    • Tools for secure systems development with UML
    • Invited submission to the special issue for FASE 2004/05
    • Jürjens J and Shabalin P (2007). Tools for secure systems development with UML. Intern. Journal on Software Tools for Technology Transfer, 9(5-6):527-544. Invited submission to the special issue for FASE 2004/05.
    • (2007) Intern. Journal On Software Tools For Technology Transfer , vol.9 , Issue.5-6 , pp. 527-544
    • Jürjens, J.1    Shabalin, P.2
  • 58
    • 33947420435 scopus 로고    scopus 로고
    • A risk-driven security analysis method and modeling language
    • Kearney P and Brügger L (2007). A risk-driven security analysis method and modeling language. BT Technology Journal, 25(1).
    • (2007) BT Technology Journal , vol.25 , Issue.1
    • Kearney, P.1    Brügger, L.2
  • 59
    • 37849187634 scopus 로고    scopus 로고
    • UML specification of access control policies and their formal verification
    • Koch M and Parisi-Presicce F (2006). UML specification of access control policies and their formal verification. Software and System Modeling, 5(4):429-447.
    • (2006) Software and System Modeling , vol.5 , Issue.4 , pp. 429-447
    • Koch, M.1    Parisi-Presicce, F.2
  • 60
    • 33746584791 scopus 로고    scopus 로고
    • SecTOOL-supporting requirements engineering for access control
    • In Günter Müller, editor, of Lecture Notes in Computer Science, Springer
    • Kolarczyk S, Koch M, Löhr K-P, and Pauls K (2006). SecTOOL-supporting requirements engineering for access control. In Günter Müller, editor, ETRICS, volume 3995 of Lecture Notes in Computer Science: 254-267. Springer.
    • (2006) ETRICS , vol.3995 , pp. 254-267
    • Kolarczyk, S.1    Koch, M.2    Löhr, K.-P.3    Pauls, K.4
  • 61
    • 0031335394 scopus 로고    scopus 로고
    • Threat scenarios as a means to formally develop secure systems
    • Lotz V (1997). Threat scenarios as a means to formally develop secure systems. Journal of Computer Security, 5(1):31-68.
    • (1997) Journal of Computer Security , vol.5 , Issue.1 , pp. 31-68
    • Lotz, V.1
  • 62
    • 33750048791 scopus 로고    scopus 로고
    • A business process-driven approach to security engineering
    • IEEE Computer Society
    • Maña A, Montenegro JA, Rudolph C, and Vivas JL (2003). A business process-driven approach to security engineering. In DEXA Workshops: 477-481. IEEE Computer Society.
    • (2003) DEXA Workshops , pp. 477-481
    • Maña, A.1    Montenegro, J.A.2    Rudolph, C.3    Vivas, J.L.4
  • 64
    • 34548563765 scopus 로고    scopus 로고
    • Computer-aided support for secure tropos
    • Massacci F, Mylopoulos J, and Zannone N (2007). Computer-aided support for secure tropos. Autom. Softw. Eng., 14(3):341-364.
    • (2007) Autom. Softw. Eng , vol.14 , Issue.3 , pp. 341-364
    • Massacci, F.1    Mylopoulos, J.2    Zannone, N.3
  • 67
    • 35348953633 scopus 로고    scopus 로고
    • Specification and refinement of access control
    • Méry D and Merz S (2007). Specification and refinement of access control. J. UCS, 13(8):1073-1093.
    • (2007) J. UCS , vol.13 , Issue.8 , pp. 1073-1093
    • Méry, D.1    Merz, S.2
  • 69
    • 35048845022 scopus 로고    scopus 로고
    • Integrating security and systems engineering: Towards the modelling of secure information systems
    • In J Eder andMMissikoff, editors, of LNCS, Springer
    • Mouratidis H, Giorgini P, and Manson GA (2003). Integrating security and systems engineering: Towards the modelling of secure information systems. In J Eder andMMissikoff, editors, 15th International Conference on Advanced Information Systems Engineering (CAiSE 2003), volume 2681 of LNCS: 63-78. Springer.
    • (2003) 15th International Conference On Advanced Information Systems Engineering (CAiSE 2003) , vol.2681 , pp. 63-78
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.A.3
  • 71
    • 49049110544 scopus 로고    scopus 로고
    • Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models
    • Pironti A, Sisto R (2008). Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models. In ARES 2008: 72-79.
    • (2008) ARES 2008 , pp. 72-79
    • Pironti, A.1    Sisto, R.2
  • 72
    • 1942536622 scopus 로고    scopus 로고
    • An aspect-based approach to modeling access control concerns
    • Ray I, France RB, Li N, and Georg G (2004). An aspect-based approach to modeling access control concerns. Information & Software Technology, 46(9):575-587.
    • (2004) Information & Software Technology , vol.46 , Issue.9 , pp. 575-587
    • Ray, I.1    France, R.B.2    Li, N.3    Georg, G.4
  • 74
    • 33750946214 scopus 로고    scopus 로고
    • A study of security architectural patterns
    • IEEE Computer Society
    • Rosado DG, Fernández-Medina E, Piattini M, and Gutiérrez C (2006). A study of security architectural patterns. In ARES: 358-365. IEEE Computer Society.
    • (2006) ARES , pp. 358-365
    • Rosado, D.G.1    Fernández-Medina, E.2    Piattini, M.3    Gutiérrez, C.4
  • 75
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer J and Schroeder M (1975). The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 76
    • 33751016038 scopus 로고    scopus 로고
    • Stepwise development of secure systems
    • In Janusz Górski, editor, of Lecture Notes in Computer Science, Springer
    • Santen T (2006). Stepwise development of secure systems. In Janusz Górski, editor, SAFECOMP, volume 4166 of Lecture Notes in Computer Science: 142-155. Springer.
    • (2006) SAFECOMP , vol.4166 , pp. 142-155
    • Santen, T.1
  • 77
    • 84957012794 scopus 로고    scopus 로고
    • Confidentiality-preserving refinement is compositional-sometimes
    • In Dieter Gollmann, Günter Karjoth, and Michael Waidner, editors, of Lecture Notes in Computer Science, Springer
    • Santen T, Heisel M, and Pfitzmann A (2002). Confidentiality-preserving refinement is compositional-sometimes. In Dieter Gollmann, Günter Karjoth, and Michael Waidner, editors, ESORICS, volume 2502 of Lecture Notes in Computer Science: 194-211. Springer.
    • (2002) ESORICS , vol.2502 , pp. 194-211
    • Santen, T.1    Heisel, M.2    Pfitzmann, A.3
  • 78
    • 0003714340 scopus 로고    scopus 로고
    • editor, National Academy Press, Washington, DC. Available at
    • Schneider F, editor (1999). Trust in Cyberspace. National Academy Press, Washington, DC. Available at http://www.nap.edu/readingroom/books/trust.
    • (1999) Trust In Cyberspace
    • Schneider, F.1
  • 80
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre G and Opdahl AL (2005). Eliciting security requirements with misuse cases. Requir. Eng., 10(1):34-44.
    • (2005) Requir. Eng , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 84
    • 84882754522 scopus 로고    scopus 로고
    • UMLsec group. Security analysis tool
    • UMLsec group. Security analysis tool, 2004. http://www.umlsec.org.
    • (2004)
  • 85
    • 57349132966 scopus 로고    scopus 로고
    • Executable misuse cases for modeling security concerns
    • Whittle J, Wijesekera D, and Hartong M (2008). Executable misuse cases for modeling security concerns. In ICSE 2008.
    • (2008) ICSE
    • Whittle, J.1    Wijesekera, D.2    Hartong, M.3
  • 86
    • 84882804583 scopus 로고    scopus 로고
    • Knowledge Transfer Network on Cyber Security, UK. Available at
    • Whyte B and Harrison J (2008). Secure software development-a white paper. Knowledge Transfer Network on Cyber Security, UK. Available at http://www.ktn.qinetiqtim.net/content/files/groups/securesoft/SSDSIGsoftwareSecurityFailures.pdf.
    • (2008) Secure Software Development-a White Paper
    • Whyte, B.1    Harrison, J.2
  • 87
    • 84948967933 scopus 로고    scopus 로고
    • Specification-based test generation for security-critical systems using mutations
    • of LNCS, Springer
    • Wimmel G and Jürjens J (2002). Specification-based test generation for security-critical systems using mutations. In International Conference on Formal Engineering Methods (ICFEM), volume 2495 of LNCS: 471-482. Springer.
    • (2002) International Conference On Formal Engineering Methods (ICFEM) , vol.2495 , pp. 471-482
    • Wimmel, G.1    Jürjens, J.2
  • 90
    • 17744383167 scopus 로고    scopus 로고
    • Security patterns: A method for constructing secure and efficient inter-company coordination systems
    • Yoshioka N, Honiden S, and Finkelstein A (2004). Security patterns: A method for constructing secure and efficient inter-company coordination systems. In EDOC: 84-97.
    • (2004) In EDOC , pp. 84-97
    • Yoshioka, N.1    Honiden, S.2    Finkelstein, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.