메뉴 건너뛰기




Volumn 18, Issue 20, 2012, Pages 2920-3006

Engineering Security into Distributed Systems: A Survey of Methodologies

Author keywords

Computer Security; Distributed Systems; Model Driven Security; Model based Development; Secure Software Architectures; Secure Software Engineering; Security Engineering; Security Methodologies; Security Patterns; Survey

Indexed keywords


EID: 84874788713     PISSN: 0948695X     EISSN: 09486968     Source Type: Journal    
DOI: None     Document Type: Review
Times cited : (49)

References (253)
  • 1
    • 55049109759 scopus 로고    scopus 로고
    • Model-driven security engineering for trust management in SECTET
    • Alam, M., Breu, R., Hafner, M.: "Model-driven security engineering for trust management in SECTET;" J. Softw. 2(1), (2007), 47-59.
    • (2007) J. Softw , vol.2 , Issue.1 , pp. 47-59
    • Alam, M.1    Breu, R.2    Hafner, M.3
  • 4
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases: Use cases with hostile intent
    • Alexander, I.: "Misuse cases: use cases with hostile intent;" IEEE Software 20(1), (2003), 58-66.
    • (2003) IEEE Software , vol.20 , Issue.1 , pp. 58-66
    • Alexander, I.1
  • 6
    • 80052133002 scopus 로고    scopus 로고
    • The ISDF Framework: Towards Secure Software Development
    • Alkussayer, A., Allen, W.H.: "The ISDF Framework: Towards Secure Software Development;" J. Inf. Process. Syst. 6, (2010), 91-104.
    • (2010) J. Inf. Process. Syst , vol.6 , pp. 91-104
    • Alkussayer, A.1    Allen, W.H.2
  • 11
    • 60849104397 scopus 로고    scopus 로고
    • Automated analysis of security-design models
    • Basin, D., Clavel, M., Doser, J. & Egea, M.: "Automated analysis of security-design models;" Inf. Softw. Technol. 51(5), (2009), 815-831.
    • (2009) Inf. Softw. Technol , vol.51 , Issue.5 , pp. 815-831
    • Basin, D.1    Clavel, M.2    Doser, J.3    Egea, M.4
  • 13
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • Baskerville, R.: "Information systems security design methods: implications for information systems development;" ACM Comput. Surv. 25(4), (1993), 375-414.
    • (1993) ACM Comput. Surv , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 18
    • 84856580263 scopus 로고    scopus 로고
    • Patterns in Object-Oriented Analysis
    • Faculty of Business Administration and Economics, University of Hagen, Germany
    • Blaimer, N., Bortfeldt, A., Pankratz, G.: "Patterns in Object-Oriented Analysis;" Working Paper No. 451, Faculty of Business Administration and Economics, University of Hagen, Germany, (2010).
    • (2010) Working Paper No. 451
    • Blaimer, N.1    Bortfeldt, A.2    Pankratz, G.3
  • 19
    • 84866900591 scopus 로고    scopus 로고
    • Security Design Patterns
    • The Open Group
    • Blakley, B., Heath, C.: "Security Design Patterns. " Technical Guide, The Open Group, (2004).
    • (2004) Technical Guide
    • Blakley, B.1    Heath, C.2
  • 23
    • 84935093956 scopus 로고    scopus 로고
    • Towards a systematic development of secure systems
    • L.J., Castro, E., Garcia-Villalba, J.C.H. (Eds.), Inf. Syst. Secur. J. (Special Issue)
    • Breu, R., Burger, K., Hafner, M.: "Towards a systematic development of secure systems;" Fernández-Medina, L.J., Castro, E., Garcia-Villalba, J.C.H. (Eds.), Inf. Syst. Secur. J. (Special Issue) 13(3), (2004), 1-12.
    • (2004) Fernández-Medina , vol.13 , Issue.3 , pp. 1-12
    • Breu, R.1    Burger, K.2    Hafner, M.3
  • 24
    • 84994715673 scopus 로고    scopus 로고
    • Model-Driven Security Engineering of Service Oriented Systems
    • In Kaschek, R. et al. (Eds.), Springer, Berlin Heidelberg, [Breu et al. 2008]
    • Breu, R., Hafner, M., Innerhofer-Oberperfler, F., Wozak, F.: "Model-Driven Security Engineering of Service Oriented Systems;" In Kaschek, R. et al. (Eds.), Information Systems and e-Business Technologies: Springer, Berlin Heidelberg, (2008), 59-71.
    • (2008) Information Systems and e-Business Technologies , pp. 59-71
    • Breu, R.1    Hafner, M.2    Innerhofer-Oberperfler, F.3    Wozak, F.4
  • 29
    • 70349862227 scopus 로고    scopus 로고
    • Model-Driven Security in Practice: An Industrial Experience
    • In I. Schieferdecker, A. Hartman (Eds.), Springer, Berlin Heidelberg
    • Clavel, M., Silva, V. da, Braga, C., Egea, M.: "Model-Driven Security in Practice: An Industrial Experience;" In I. Schieferdecker, A. Hartman (Eds.), Model Driven Architecture-Foundations and Applications, Springer, Berlin Heidelberg, (2008), 326-337.
    • (2008) Model Driven Architecture-Foundations and Applications , pp. 326-337
    • Clavel, M.1    Silva, V.2    da Braga, C.3    Egea, M.4
  • 30
    • 0025446390 scopus 로고
    • A model for security in distributed systems
    • [Cole 1990]
    • Cole, R.: "A model for security in distributed systems;" Comput. Secur. 9(4), (1990), 319-330.
    • (1990) Comput. Secur , vol.9 , Issue.4 , pp. 319-330
    • Cole, R.1
  • 32
    • 57049186171 scopus 로고    scopus 로고
    • A Survey of Modeling and Analysis Approaches for Architecting Secure Software Systems
    • [Dai and Cooper 2007]
    • Dai, L., Cooper, K.: "A Survey of Modeling and Analysis Approaches for Architecting Secure Software Systems;" Int. J. Netw. Secur. 5(2), (2007), 187-198.
    • (2007) Int. J. Netw. Secur , vol.5 , Issue.2 , pp. 187-198
    • Dai, L.1    Cooper, K.2
  • 33
    • 30544450414 scopus 로고    scopus 로고
    • A comprehensive approach for the development of modular software architecture description languages
    • [Dashofy et al. 2005]
    • Dashofy, E.M., Hoek, A. van der, Taylor, R.N.: "A comprehensive approach for the development of modular software architecture description languages;" ACM Trans. Softw. Eng. Methodol. 14(2), (2005), 199-245.
    • (2005) ACM Trans. Softw. Eng. Methodol , vol.14 , Issue.2 , pp. 199-245
    • Dashofy, E.M.1    Hoek, A.2    van der Taylor, R.N.3
  • 34
    • 67349139935 scopus 로고    scopus 로고
    • On the secure software development process: CLASP, SDL and Touchpoints compared
    • [De Win et al. 2009]
    • De Win, B., Scandariato, R., Buyens, K., Grégoire, J., Joosen, W.: "On the secure software development process: CLASP, SDL and Touchpoints compared;" Inf. Softw. Technol. 51(7), (2009), 1152-1171.
    • (2009) Inf. Softw. Technol , vol.51 , Issue.7 , pp. 1152-1171
    • De Win, B.1    Scandariato, R.2    Buyens, K.3    Grégoire, J.4    Joosen, W.5
  • 35
    • 51949101035 scopus 로고    scopus 로고
    • Architecting Secure Software Systems Using an Aspect-Oriented Approach: A Survey of Current Research
    • Iowa State University,. [Dehlinger and Subramanian 2006]
    • Dehlinger, J., Subramanian, N.V.: "Architecting Secure Software Systems Using an Aspect-Oriented Approach: A Survey of Current Research;" Technical Report, Computer Science, Iowa State University, (2006).
    • (2006) Technical Report, Computer Science
    • Dehlinger, J.1    Subramanian, N.V.2
  • 38
    • 0141502155 scopus 로고    scopus 로고
    • An approach for modeling and analysis of security system architectures
    • [Deng et al. 2003]
    • Deng, Y., Wang, J., Tsai, J.J.P., Beznosov, K.: "An approach for modeling and analysis of security system architectures;" IEEE Trans. Knowl. Data Eng. 15(5), (2003), 1099-1119.
    • (2003) IEEE Trans. Knowl. Data Eng , vol.15 , Issue.5 , pp. 1099-1119
    • Deng, Y.1    Wang, J.2    Tsai, J.J.P.3    Beznosov, K.4
  • 44
    • 51749089325 scopus 로고    scopus 로고
    • 1st ed., Prentice Hall PTR,. [Erl 2009]
    • Erl, T.: "SOA Design Patterns;" 1st ed., Prentice Hall PTR, (2009).
    • (2009) SOA Design Patterns
    • Erl, T.1
  • 51
    • 84860080088 scopus 로고    scopus 로고
    • Layers and non-functional patterns
    • In, Phoenix,. [Fernandez 2003]
    • Fernandez, E.B.: "Layers and non-functional patterns;" In Procs. of ChiliPLoP 2003, Phoenix, (2003).
    • (2003) Procs. of ChiliPLoP 2003
    • Fernandez, E.B.1
  • 57
  • 59
    • 36448967526 scopus 로고    scopus 로고
    • Attack Patterns: A New Forensic and Design Tool
    • In Craiger, P., Shenoi, S. (Eds.), Springer, New York, [Fernandez et al. 2007a]
    • Fernandez, E.B., Pelaez, J., Larrondo-Petrie, M.: "Attack Patterns: A New Forensic and Design Tool;" In Craiger, P., Shenoi, S. (Eds.), Advances in Digital Forensics III, Springer, New York, (2007), 345-357.
    • (2007) Advances in Digital Forensics III , pp. 345-357
    • Fernandez, E.B.1    Pelaez, J.2    Larrondo-Petrie, M.3
  • 62
    • 79960307542 scopus 로고    scopus 로고
    • Security patterns and a methodology to apply them
    • In Spanoudakis, G., Maña, A., Kokolakis, S. (Eds.), Boston, MA: Springer Verlag, [Fernandez 2009]
    • Fernandez, E.B.: "Security patterns and a methodology to apply them;" In Spanoudakis, G., Maña, A., Kokolakis, S. (Eds.), Security and Dependability for Ambient Intelligence, Boston, MA: Springer Verlag, (2009), 37-46.
    • (2009) Security and Dependability for Ambient Intelligence , pp. 37-46
    • Fernandez, E.B.1
  • 66
    • 84871386548 scopus 로고    scopus 로고
    • Secure Middleware Patterns
    • In Y. Xiang, J. Lopez, C.-C.J. Kuo and W. Zhou (Eds.), Melbourne, Australia: LNCS 7672, Springer, Heidelberg, [Fernandez and Uzunov 2012]
    • Fernandez, E.B., Uzunov, A.V.: "Secure Middleware Patterns;" In Y. Xiang, J. Lopez, C.-C.J. Kuo and W. Zhou (Eds.), Procs. of the 4th International Symposium on Cyberspace Safety and Security (CSS). Melbourne, Australia: LNCS 7672, Springer, Heidelberg, (2012), 470-482.
    • (2012) Procs. of the 4th International Symposium on Cyberspace Safety and Security (CSS) , pp. 470-482
    • Fernandez, E.B.1    Uzunov, A.V.2
  • 68
    • 60849106337 scopus 로고    scopus 로고
    • Model-Driven Development for secure information systems
    • [Fernández-Medina et al. 2009]
    • Fernández-Medina, E., Jürjens, J., Trujillo, J., Jajodia, S.: "Model-Driven Development for secure information systems;" Inf. Softw. Technol. 51(5), (2009), 809-814.
    • (2009) Inf. Softw. Technol , vol.51 , Issue.5 , pp. 809-814
    • Fernández-Medina, E.1    Jürjens, J.2    Trujillo, J.3    Jajodia, S.4
  • 69
    • 2942713443 scopus 로고    scopus 로고
    • Security Use Cases
    • [Firesmith 2003]
    • Firesmith, D.: "Security Use Cases;" J. Object Technol. 2(3), (2003), 53-64.
    • (2003) J. Object Technol , vol.2 , Issue.3 , pp. 53-64
    • Firesmith, D.1
  • 71
    • 84931024051 scopus 로고    scopus 로고
    • Integrating security and usability into the requirements and design process
    • [Flechais et al. 2007]
    • Flechais, I., Mascolo, C., Sasse, M.A.: "Integrating security and usability into the requirements and design process;" Int. J. Electron. Secur. Digit. Forensics 1(1), (2007), 12-26.
    • (2007) Int. J. Electron. Secur. Digit. Forensics , vol.1 , Issue.1 , pp. 12-26
    • Flechais, I.1    Mascolo, C.2    Sasse, M.A.3
  • 72
    • 47749136281 scopus 로고    scopus 로고
    • A Generic Approach for Automatic Model Composition
    • In Giese, H. (Ed.), Springer, Berlin Heidelberg, [Fleurey et al. 2008]
    • Fleurey, F., Baudry, B., France, R., Ghosh, S.: "A Generic Approach for Automatic Model Composition;" In Giese, H. (Ed.), Models in Software Engineering, Springer, Berlin Heidelberg, (2008), 7-15.
    • (2008) Models in Software Engineering , pp. 7-15
    • Fleurey, F.1    Baudry, B.2    France, R.3    Ghosh, S.4
  • 74
    • 0141572943 scopus 로고    scopus 로고
    • Patterns as precise characterizations of designs
    • Colorado State University,. [France et al. 2002]
    • France, R.B., Kim, D., Song, E., Ghosh, S.: "Patterns as precise characterizations of designs;" Technical Report, Colorado State University, (2002).
    • (2002) Technical Report
    • France, R.B.1    Kim, D.2    Song, E.3    Ghosh, S.4
  • 75
    • 5744230994 scopus 로고    scopus 로고
    • Aspect-oriented approach to early design modelling
    • [France et al. 2004a]
    • France, R., Ray, I., Georg, G., Ghosh, S.: "Aspect-oriented approach to early design modelling;" IEE Proc.-Softw. 151(4), (2004), 173-185.
    • (2004) IEE Proc.-Softw , vol.151 , Issue.4 , pp. 173-185
    • France, R.1    Ray, I.2    Georg, G.3    Ghosh, S.4
  • 76
    • 1942468141 scopus 로고    scopus 로고
    • A UML-based pattern specification technique
    • [France et al. 2004b]
    • France, R., Kim, D., Ghosh, S., Song, E.: "A UML-based pattern specification technique;" IEEE Trans. on Softw. Eng. 30(3), (2004), 193-206.
    • (2004) IEEE Trans. on Softw. Eng , vol.30 , Issue.3 , pp. 193-206
    • France, R.1    Kim, D.2    Ghosh, S.3    Song, E.4
  • 77
    • 34748861160 scopus 로고    scopus 로고
    • Model-driven Development of Complex Software: A Research Roadmap
    • In, IEEE, [France and Rumpe 2007]
    • France, R., Rumpe, B.: "Model-driven Development of Complex Software: A Research Roadmap;" In Future of Software Engineering, IEEE, (2007), 37-54.
    • (2007) Future of Software Engineering , pp. 37-54
    • France, R.1    Rumpe, B.2
  • 82
    • 84863712088 scopus 로고    scopus 로고
    • Applying dynamic separation of aspects to distributed systems security: A case study
    • [García et al. 2012]
    • García, M., Llewellyn-Jones, D., Ortin, F., Merabti, M.: "Applying dynamic separation of aspects to distributed systems security: A case study;" IET Softw. 6(3), (2012), 231-248.
    • (2012) IET Softw , vol.6 , Issue.3 , pp. 231-248
    • García, M.1    Llewellyn-Jones, D.2    Ortin, F.3    Merabti, M.4
  • 85
    • 33746838915 scopus 로고    scopus 로고
    • Aspect-Oriented Risk Driven Development of Secure Applications
    • E., Liu, P. (Eds.), Data and Applications Security: Springer Berlin Heidelberg, [Georg et al. 2006]
    • Georg, G., Houmb, S.H., Ray, I.: "Aspect-Oriented Risk Driven Development of Secure Applications;" In Damiani, E., Liu, P. (Eds.), Data and Applications Security: Springer Berlin Heidelberg, (2006), 282-296.
    • (2006) In Damiani , pp. 282-296
    • Georg, G.1    Houmb, S.H.2    Ray, I.3
  • 88
    • 0036145519 scopus 로고    scopus 로고
    • Building Software Securely from the Ground Up
    • Ghosh, A.K., Howell, C., Whittaker, J.A.: "Building Software Securely from the Ground Up;" IEEE Softw. 19(1), (2002), 14-16.
    • (2002) IEEE Softw , vol.19 , Issue.1 , pp. 14-16
    • Ghosh, A.K.1    Howell, C.2    Whittaker, J.A.3
  • 90
    • 23144448551 scopus 로고    scopus 로고
    • The Tropos Software Development Methodology: Processes, Models and Diagrams
    • In Giunchiglia, F., Odell, J., Weiß, G. (Eds.), Springer, Berlin Heidelberg
    • Giunchiglia, F., Mylopoulos, J., Perini, A.: "The Tropos Software Development Methodology: Processes, Models and Diagrams;" In Giunchiglia, F., Odell, J., Weiß, G. (Eds.), Agent-Oriented Software Engineering III, Springer, Berlin Heidelberg, (2003), 162-173.
    • (2003) Agent-Oriented Software Engineering III , pp. 162-173
    • Giunchiglia, F.1    Mylopoulos, J.2    Perini, A.3
  • 94
    • 0032623470 scopus 로고    scopus 로고
    • Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification
    • Gritzalis, S., Spinellis, D., Georgiadis, P.: "Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification;" Comput. Commun. 22(8), (1999), 697-709.
    • (1999) Comput. Commun , vol.22 , Issue.8 , pp. 697-709
    • Gritzalis, S.1    Spinellis, D.2    Georgiadis, P.3
  • 95
    • 73349088987 scopus 로고    scopus 로고
    • Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models
    • In Śle{ogonek}zak, D. et al. (Eds.), Springer, Berlin Heidelberg
    • Gunawan, L.A., Herrmann, P., Kraemer, F.A.: "Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models;" In Śle{ogonek}zak, D. et al. (Eds.), Security Technology, Springer, Berlin Heidelberg, (2009), 72-85.
    • (2009) Security Technology , pp. 72-85
    • Gunawan, L.A.1    Herrmann, P.2    Kraemer, F.A.3
  • 100
    • 70349473097 scopus 로고    scopus 로고
    • The practical application of a process for eliciting and designing security in web service systems
    • Gutiérrez, C., Rosado, D.G., Fernández-Medina, E.: "The practical application of a process for eliciting and designing security in web service systems. " Inf. Softw. Technol. 51(12), (2009), 1712-1738.
    • (2009) Inf. Softw. Technol , vol.51 , Issue.12 , pp. 1712-1738
    • Gutiérrez, C.1    Rosado, D.G.2    Fernández-Medina, E.3
  • 102
    • 34547107609 scopus 로고    scopus 로고
    • Organizing security patterns
    • Hafiz, M., Adamczyk, P., Johnson, R.E.: "Organizing security patterns;" IEEE Softw. 24(4), (2007), 52-60.
    • (2007) IEEE Softw , vol.24 , Issue.4 , pp. 52-60
    • Hafiz, M.1    Adamczyk, P.2    Johnson, R.E.3
  • 103
    • 33750453781 scopus 로고    scopus 로고
    • SECTET: An extensible framework for the realization of secure inter-organizational workflows
    • Hafner, M., Breu, R., Agreiter, B., Nowak, A.: "SECTET: an extensible framework for the realization of secure inter-organizational workflows;" Internet Res. 16(5), (2006), 491-506.
    • (2006) Internet Res , vol.16 , Issue.5 , pp. 491-506
    • Hafner, M.1    Breu, R.2    Agreiter, B.3    Nowak, A.4
  • 104
    • 73149108190 scopus 로고    scopus 로고
    • SeAAS-A Reference Architecture for Security Services in SOA
    • Hafner, M., Memon, M., Breu, R.: "SeAAS-A Reference Architecture for Security Services in SOA;" J. Univers. Comput. Sci. 15(15), (2009), 2916-2936.
    • (2009) J. Univers. Comput. Sci , vol.15 , Issue.15 , pp. 2916-2936
    • Hafner, M.1    Memon, M.2    Breu, R.3
  • 106
    • 40449096402 scopus 로고    scopus 로고
    • Security Requirements Engineering: A Framework for Representation and Analysis
    • Haley, C., Laney, R., Moffett, J., Nuseibeh, B.: "Security Requirements Engineering: A Framework for Representation and Analysis;" IEEE Trans. Softw. Eng. 34(1), (2008), 133-153.
    • (2008) IEEE Trans. Softw. Eng , vol.34 , Issue.1 , pp. 133-153
    • Haley, C.1    Laney, R.2    Moffett, J.3    Nuseibeh, B.4
  • 110
    • 79955137982 scopus 로고    scopus 로고
    • Deriving Software Architectures from Problem Descriptions
    • GI
    • Hatebur, D., Heisel, M.: "Deriving Software Architectures from Problem Descriptions;" In Software Engineering 2009-Workshopband, GI, (2009), 383-392.
    • (2009) Software Engineering 2009-Workshopband , pp. 383-392
    • Hatebur, D.1    Heisel, M.2
  • 112
    • 79953186499 scopus 로고    scopus 로고
    • Systematic Development of UMLsec Design Models Based on Security Requirements
    • In Giannakopoulou, D., Orejas, F. (Eds.), Springer, Berlin Heidelberg
    • Hatebur, Denis, Heisel, M., Jürjens, J., Schmidt, H.: "Systematic Development of UMLsec Design Models Based on Security Requirements;" In Giannakopoulou, D., Orejas, F. (Eds.), Fundamental Approaches to Software Engineering, Springer, Berlin Heidelberg, (2011), 232-246.
    • (2011) Fundamental Approaches to Software Engineering , pp. 232-246
    • Hatebur, D.1    Heisel, M.2    Jürjens, J.3    Schmidt, H.4
  • 114
    • 85009069580 scopus 로고    scopus 로고
    • Secure Software Engineering: Learning from the Past to Address Future Challenges
    • Hein, D., Saiedian, H.: "Secure Software Engineering: Learning from the Past to Address Future Challenges;" Inf. Secur. J.: A Global Perspective, 18(1), (2009), 8-25.
    • (2009) Inf. Secur. J.: A Global Perspective , vol.18 , Issue.1 , pp. 8-25
    • Hein, D.1    Saiedian, H.2
  • 116
  • 122
    • 4344674013 scopus 로고    scopus 로고
    • Agent UML notation for multiagent system design
    • Huget, M.P.: "Agent UML notation for multiagent system design;" IEEE Internet Comput. 8(4), (2004), 63-71.
    • (2004) IEEE Internet Comput , vol.8 , Issue.4 , pp. 63-71
    • Huget, M.P.1
  • 128
    • 40249101754 scopus 로고    scopus 로고
    • The security of applications: Not all are created equal
    • @stake, Available at [Accessed 24 Mar 2011]
    • Jaquith, A.: "The security of applications: Not all are created equal;" Research Report, @stake, (2002), 1-12. Available at [Accessed 24 Mar 2011]: http://www.securitymanagement.com/archive/library/atstake_tech0502.pdf
    • (2002) Research Report , pp. 1-12
    • Jaquith, A.1
  • 129
    • 36248951815 scopus 로고    scopus 로고
    • Software engineering for secure software-state of the art: A survey
    • Purdue University, West Lafayette
    • Jayaram, K., Mathur, A.P.: "Software engineering for secure software-state of the art: A survey;" CERIAS Tech. Report 2005-67, Purdue University, West Lafayette, (2005).
    • (2005) CERIAS Tech. Report 2005-67
    • Jayaram, K.1    Mathur, A.P.2
  • 130
    • 0003062036 scopus 로고    scopus 로고
    • An agent-based approach for building complex software systems
    • Jennings, N.R.: "An agent-based approach for building complex software systems;" Commun. ACM 44(4), (2001), 35-41.
    • (2001) Commun. ACM , vol.44 , Issue.4 , pp. 35-41
    • Jennings, N.R.1
  • 132
    • 57349117128 scopus 로고    scopus 로고
    • A SIP-Based Programming Framework for Advanced Telephony Applications
    • In Schulzrinne, H., State, R., Niccolini, S. (Eds.), Springer, Berlin Heidelberg
    • Jouve, W., Palix, N., Consel, C., Kadionik, P.: "A SIP-Based Programming Framework for Advanced Telephony Applications;" In Schulzrinne, H., State, R., Niccolini, S. (Eds.), Services and Security for Next Generation Networks (IPTComm 2008), Springer, Berlin Heidelberg, (2008), 1-20.
    • (2008) Services and Security for Next Generation Networks (IPTComm 2008) , pp. 1-20
    • Jouve, W.1    Palix, N.2    Consel, C.3    Kadionik, P.4
  • 135
    • 42449093736 scopus 로고    scopus 로고
    • Towards Using Security Patterns in Model-based System Development
    • In, Kloster Irsee, Germany
    • Jürjens, J., Popp, G., Wimmel, G.: "Towards Using Security Patterns in Model-based System Development;" In Procs. of EuroPLoP 2002, Kloster Irsee, Germany, (2002).
    • (2002) Procs. of EuroPLoP 2002
    • Jürjens, J.1    Popp, G.2    Wimmel, G.3
  • 138
    • 33749646163 scopus 로고    scopus 로고
    • Model-Based Security Engineering with UML: Introducing Security Aspects
    • In Boer, F.S. et al. (Eds.), Springer, Berlin Heidelberg
    • Jürjens, J.: "Model-Based Security Engineering with UML: Introducing Security Aspects;" In Boer, F.S. et al. (Eds.), Formal Methods for Components and Objects, Springer, Berlin Heidelberg, (2006), 64-87.
    • (2006) Formal Methods for Components and Objects , pp. 64-87
    • Jürjens, J.1
  • 139
    • 33749391615 scopus 로고    scopus 로고
    • Model-Based Security Engineering for Real
    • In Misra, J., Nipkow, T., Sekerinski, E. (Eds.), Springer, Berlin Heidelberg
    • Jürjens, J.: "Model-Based Security Engineering for Real;" In Misra, J., Nipkow, T., Sekerinski, E. (Eds.), FM 2006: Formal Methods, Springer, Berlin Heidelberg, (2006), 600-606.
    • (2006) FM 2006: Formal Methods , pp. 600-606
    • Jürjens, J.1
  • 141
    • 84874759719 scopus 로고    scopus 로고
    • Security and Dependability Engineering
    • In Spanoudakis, G., Maña, A., Kokolakis, S. (Eds.), Boston, MA: Springer Verlag
    • Jürjens, J.: "Security and Dependability Engineering;" In Spanoudakis, G., Maña, A., Kokolakis, S. (Eds.), Security and Dependability for Ambient Intelligence, Boston, MA: Springer Verlag, (2009), 21-36.
    • (2009) Security and Dependability for Ambient Intelligence , pp. 21-36
    • Jürjens, J.1
  • 143
    • 84874786207 scopus 로고    scopus 로고
    • SECTET-Model driven Security of Service Oriented Systems based on Security-as-a-Service
    • In, Tokyo, Japan,. Available at, (Accessed 2011)
    • Katt, B., Breu, R., Memon, M., Hafner, M.: "SECTET-Model driven Security of Service Oriented Systems based on Security-as-a-Service;" In Presentation in Japan-Austria Joint Workshop on "ICT, " October 18-19, Tokyo, Japan, (2010). Available at: http://www.jst.go.jp/sicp/ws2010_austria/presentation/presentation_05.pdf (Accessed 2011)
    • (2010) Presentation in Japan-Austria Joint Workshop on "ICT, " October 18-19
    • Katt, B.1    Breu, R.2    Memon, M.3    Hafner, M.4
  • 144
    • 80455147712 scopus 로고    scopus 로고
    • A Survey on Requirements and Design Methods for Secure Software Development
    • Queen's University, Kingston, Ontario, Canada,. Available at:, (Accessed: December 2010)
    • Khan, M.U.A., Zulkernine, M.: "A Survey on Requirements and Design Methods for Secure Software Development;" Technical Report No. 2009-562, School of Computing, Queen's University, Kingston, Ontario, Canada, (2009). Available at: http://research.cs.queensu.ca/TechReports/Reports/2009-562.pdf (Accessed: December 2010).
    • (2009) Technical Report No. 2009-562, School of Computing
    • Khan, M.U.A.1    Zulkernine, M.2
  • 146
    • 70350663534 scopus 로고    scopus 로고
    • Engineering Reactive Systems: A Compositional and Model-Driven Method Based on Collaborative Building Blocks
    • Norwegian University of Science and Technology
    • Kraemer, F.A.: "Engineering Reactive Systems: A Compositional and Model-Driven Method Based on Collaborative Building Blocks;" PhD Thesis, Norwegian University of Science and Technology, (2008).
    • (2008) PhD Thesis
    • Kraemer, F.A.1
  • 147
    • 71749097369 scopus 로고    scopus 로고
    • Tool support for the rapid composition, analysis and implementation of reactive services
    • Kraemer, F.A., Slåtten, V., Herrmann, P.: "Tool support for the rapid composition, analysis and implementation of reactive services;" J. Syst. Softw. 82(12), (2009), 2068-2080.
    • (2009) J. Syst. Softw , vol.82 , Issue.12 , pp. 2068-2080
    • Kraemer, F.A.1    Slåtten, V.2    Herrmann, P.3
  • 151
    • 26844531710 scopus 로고    scopus 로고
    • Model driven security from UML Models to Access Control Architectures
    • University of Freiburg, Germany,. Available at
    • Lodderstedt, T.: "Model driven security from UML Models to Access Control Architectures;" PhD Thesis, University of Freiburg, Germany, (2003). Available at: http://www.freidok.uni-freiburg.de/volltexte/1253/
    • (2003) PhD Thesis
    • Lodderstedt, T.1
  • 152
    • 77956382145 scopus 로고    scopus 로고
    • Using a Situational Method Engineering Approach to Identify Reusable Method Fragments from the Secure TROPOS Methodology
    • Low, G., Mouratidis, H., Henderson-Sellers, B.: "Using a Situational Method Engineering Approach to Identify Reusable Method Fragments from the Secure TROPOS Methodology;" J. Object Technol. 9(4), (2010), 93-125.
    • (2010) J. Object Technol , vol.9 , Issue.4 , pp. 93-125
    • Low, G.1    Mouratidis, H.2    Henderson-Sellers, B.3
  • 156
    • 2342469291 scopus 로고    scopus 로고
    • Software security
    • McGraw, G.: "Software security;" IEEE Security & Privacy 2(2), (2004), 80-83.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.2 , pp. 80-83
    • McGraw, G.1
  • 158
    • 17644399286 scopus 로고    scopus 로고
    • Tool Support for Aspect-Oriented Design
    • In Bruel, J.-M., Bellahsene, Z. (Eds.), Springer, Berlin Heidelberg
    • Mekerke, F., Georg, G., France, R.: "Tool Support for Aspect-Oriented Design;" In Bruel, J.-M., Bellahsene, Z. (Eds.), Advances in Object-Oriented Information Systems, Springer, Berlin Heidelberg, (2002), 280-289.
    • (2002) Advances in Object-Oriented Information Systems , pp. 280-289
    • Mekerke, F.1    Georg, G.2    France, R.3
  • 172
    • 23944475544 scopus 로고    scopus 로고
    • When security meets software engineering: A case of modelling secure information systems
    • Mouratidis, H., Giorgini, P., Manson, G.: "When security meets software engineering: a case of modelling secure information systems;" Inf. Syst. 30(8), (2005), 609-629.
    • (2005) Inf. Syst , vol.30 , Issue.8 , pp. 609-629
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.3
  • 174
    • 33745804721 scopus 로고    scopus 로고
    • Modelling Secure Systems Using An Agent Oriented Approach and Security Patterns
    • Mouratidis, H., Weiss, M., Giorgini, P.: "Modelling Secure Systems Using An Agent Oriented Approach and Security Patterns;" Int. J. Softw. Eng. Knowl. Eng. 16(4), (2006), 471-498.
    • (2006) Int. J. Softw. Eng. Knowl. Eng , vol.16 , Issue.4 , pp. 471-498
    • Mouratidis, H.1    Weiss, M.2    Giorgini, P.3
  • 175
    • 33746038490 scopus 로고    scopus 로고
    • Towards a Comprehensive Framework for Secure Systems Development
    • In Dubois, E., Pohl, K. (Eds.), Springer, Berlin Heidelberg
    • Mouratidis, H., Jürjens, J., Fox, J.: "Towards a Comprehensive Framework for Secure Systems Development;" In Dubois, E., Pohl, K. (Eds.), Advanced Information Systems Engineering, Springer, Berlin Heidelberg, (2006), 48-62.
    • (2006) Advanced Information Systems Engineering , pp. 48-62
    • Mouratidis, H.1    Jürjens, J.2    Fox, J.3
  • 176
  • 177
    • 34249004734 scopus 로고    scopus 로고
    • Secure Tropos: A Security-Oriented Extension of the Tropos methodology
    • Mouratidis, H., Giorgini, P.: "Secure Tropos: A Security-Oriented Extension of the Tropos methodology;" Int. J. Softw. Eng. Knowl. Eng. 17(2), (2007), 285-309.
    • (2007) Int. J. Softw. Eng. Knowl. Eng , vol.17 , Issue.2 , pp. 285-309
    • Mouratidis, H.1    Giorgini, P.2
  • 178
    • 34548508691 scopus 로고    scopus 로고
    • Security Attack Testing (SAT)--testing the security of information systems at design time
    • Mouratidis, H., Giorgini, P.: "Security Attack Testing (SAT)--testing the security of information systems at design time;" Inf. Syst. 32(8), (2007), 1166-1183.
    • (2007) Inf. Syst , vol.32 , Issue.8 , pp. 1166-1183
    • Mouratidis, H.1    Giorgini, P.2
  • 179
    • 79959571738 scopus 로고    scopus 로고
    • Secure Tropos: An Agent Oriented Software Engineering Methodology for the Development of Health and Social Care Information Systems
    • Mouratidis, H.: "Secure Tropos: An Agent Oriented Software Engineering Methodology for the Development of Health and Social Care Information Systems;" Int. J. Comput. Sci. Secur. 3(3), (2009), 241-271.
    • (2009) Int. J. Comput. Sci. Secur , vol.3 , Issue.3 , pp. 241-271
    • Mouratidis, H.1
  • 180
    • 77954504239 scopus 로고    scopus 로고
    • From Goal-Driven Security Requirements Engineering to Secure Design
    • Mouratidis, H., Jürjens, J.: "From Goal-Driven Security Requirements Engineering to Secure Design;" Int. J. Intell. Syst. 25(8), (2010), 813-840.
    • (2010) Int. J. Intell. Syst , vol.25 , Issue.8 , pp. 813-840
    • Mouratidis, H.1    Jürjens, J.2
  • 181
    • 79953033529 scopus 로고    scopus 로고
    • Secure Software Systems Engineering: The Secure Tropos Approach (Invited Paper)
    • Mouratidis, H.: "Secure Software Systems Engineering: The Secure Tropos Approach" (Invited Paper); J. Softw. 6(3), (2011), 331-339.
    • (2011) J. Softw , vol.6 , Issue.3 , pp. 331-339
    • Mouratidis, H.1
  • 187
    • 39849109816 scopus 로고    scopus 로고
    • Process-centered review of object oriented software development methodologies
    • Ramsin, R., Paige, R.F.: "Process-centered review of object oriented software development methodologies;" ACM Comput. Surv. 40(1), (2008), 1-89.
    • (2008) ACM Comput. Surv , vol.40 , Issue.1 , pp. 1-89
    • Ramsin, R.1    Paige, R.F.2
  • 188
    • 1942536622 scopus 로고    scopus 로고
    • An aspect-based approach to modeling access control concerns
    • Ray, I., France, R., Na, L., Georg, G.: "An aspect-based approach to modeling access control concerns;" Inf. Softw. Technol. 46(9), (2004), 575-587.
    • (2004) Inf. Softw. Technol , vol.46 , Issue.9 , pp. 575-587
    • Ray, I.1    France, R.2    Na, L.3    Georg, G.4
  • 191
    • 84977598117 scopus 로고    scopus 로고
    • Towards an architectural treatment of software security: A connector-centric approach
    • Ren, J., Taylor, R., Dourish, P., Redmiles, D.: "Towards an architectural treatment of software security: a connector-centric approach;" ACM SIGSOFT Softw. Eng. Notes 30(4), (2005), 1-7.
    • (2005) ACM SIGSOFT Softw. Eng. Notes , vol.30 , Issue.4 , pp. 1-7
    • Ren, J.1    Taylor, R.2    Dourish, P.3    Redmiles, D.4
  • 192
    • 78049348655 scopus 로고    scopus 로고
    • A Connector-Centric Approach to Architectural Access Control
    • University of California Irvine
    • Ren, Jie: "A Connector-Centric Approach to Architectural Access Control;" PhD Thesis, University of California Irvine, (2006).
    • (2006) PhD Thesis
    • Ren, J.1
  • 195
    • 84874787871 scopus 로고    scopus 로고
    • Integrating Threat Modeling in Secure Agent-Oriented Software Development
    • Rojas, D.M., Mahdy, A.M.: "Integrating Threat Modeling in Secure Agent-Oriented Software Development;" Int. J. Softw. Eng. 2(3), (2011), 23-36.
    • (2011) Int. J. Softw. Eng , vol.2 , Issue.3 , pp. 23-36
    • Rojas, D.M.1    Mahdy, A.M.2
  • 196
    • 33750441515 scopus 로고    scopus 로고
    • Security patterns and requirements for internet-based applications
    • Rosado, D.G., Gutiérrez, C., Fernández-Medina, E., Piattini, M.: "Security patterns and requirements for internet-based applications;" Internet Res. 16(5), (2006), 519-536.
    • (2006) Internet Res , vol.16 , Issue.5 , pp. 519-536
    • Rosado, D.G.1    Gutiérrez, C.2    Fernández-Medina, E.3    Piattini, M.4
  • 199
    • 78650487448 scopus 로고    scopus 로고
    • Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile
    • In Heuser, C., Pernul, G. (Eds.), Springer Berlin/Heidelberg
    • Rosado, D.G., Fernández-Medina, E., López, J.: "Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile;" In Heuser, C., Pernul, G. (Eds.), Advances in Conceptual Modeling-Challenging Perspectives, Springer Berlin/Heidelberg, (2009), 126-136.
    • (2009) Advances in Conceptual Modeling-Challenging Perspectives , pp. 126-136
    • Rosado, D.G.1    Fernández-Medina, E.2    López, J.3
  • 202
    • 79952574576 scopus 로고    scopus 로고
    • Security Services Architecture for Secure Mobile Grid Systems
    • Rosado, D.G., Fernández-Medina, E., López, J.: "Security Services Architecture for Secure Mobile Grid Systems;" J. Syst. Arch. 53(3), (2011), 240-258.
    • (2011) J. Syst. Arch , vol.53 , Issue.3 , pp. 240-258
    • Rosado, D.G.1    Fernández-Medina, E.2    López, J.3
  • 205
    • 73149125546 scopus 로고    scopus 로고
    • ModelSec: A Generative Architecture for Model-Driven Security
    • Sánchez, Ó., Molina, F., García-Molina, J., Toval, A.: "ModelSec: A Generative Architecture for Model-Driven Security;" J. Univers. Comput. Sci. 15(15), (2009), 2957-2980.
    • (2009) J. Univers. Comput. Sci , vol.15 , Issue.15 , pp. 2957-2980
    • Sánchez, O.1    Molina, F.2    García-Molina, J.3    Toval, A.4
  • 209
    • 84976840280 scopus 로고
    • Using design patterns to develop reusable object-oriented communication software
    • Schmidt, D.C.: "Using design patterns to develop reusable object-oriented communication software;" Commun, ACM 38, (1995), 65-74.
    • (1995) Commun, ACM , vol.38 , pp. 65-74
    • Schmidt, D.C.1
  • 210
    • 33344465743 scopus 로고    scopus 로고
    • Model-Driven Engineering
    • Schmidt, D.C.: "Model-Driven Engineering;" Comput. 39(2), (2006), 25-31.
    • (2006) Comput , vol.39 , Issue.2 , pp. 25-31
    • Schmidt, D.C.1
  • 214
    • 79960296459 scopus 로고    scopus 로고
    • Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec
    • In Mouratidis, H., Rolland, C. (Eds.), Springer
    • Schmidt, H., Jürjens, J.: "Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec;" In Mouratidis, H., Rolland, C. (Eds.), Advanced Information Systems Engineering, Springer, (2011), 367-382.
    • (2011) Advanced Information Systems Engineering , pp. 367-382
    • Schmidt, H.1    Jürjens, J.2
  • 215
    • 79960340272 scopus 로고    scopus 로고
    • UMLsec4UML2-adopting UMLsec to support UML2
    • Technical University of Dortmund, Available at
    • Schmidt, H., Jürjens, J.: "UMLsec4UML2-adopting UMLsec to support UML2;" Technical Report 838, Technical University of Dortmund, (2011), Available at: http://hdl.handle.net/2003/27602.
    • (2011) Technical Report 838
    • Schmidt, H.1    Jürjens, J.2
  • 222
    • 84874765622 scopus 로고    scopus 로고
    • SecTro:, Available at, (Accessed 2011)
    • SecTro: "SecTro automated modeling tool;" (2011), Available at: http://sectro.securetropos.org/(Accessed 2011).
    • (2011) SecTro automated modeling tool
  • 226
    • 84947918153 scopus 로고    scopus 로고
    • Procedure calls are the assembly language of software interconnection: Connectors deserve first-class status
    • In, Springer
    • Shaw, M.: "Procedure calls are the assembly language of software interconnection: Connectors deserve first-class status;" In Studies of Software Design, Springer, (1996), 17-32.
    • (1996) Studies of Software Design , pp. 17-32
    • Shaw, M.1
  • 227
    • 33947608669 scopus 로고    scopus 로고
    • Software requirements and architecture modeling for evolving non-secure applications into secure applications
    • Shin, M.E., Gomaa, H.: "Software requirements and architecture modeling for evolving non-secure applications into secure applications;" Sci. Comput. Program. 66(1), (2007), 60-70.
    • (2007) Sci. Comput. Program , vol.66 , Issue.1 , pp. 60-70
    • Shin, M.E.1    Gomaa, H.2
  • 232
    • 77956325951 scopus 로고    scopus 로고
    • Usability of Security Specification Approaches for UML Design: A Survey
    • Talhi, C., Mouheb, D., Lima, V., Debbabi, M., Wang, L., Pourzandi, M.: "Usability of Security Specification Approaches for UML Design: A Survey;" J. Object Technol. 8(6), (2009), 103-122.
    • (2009) J. Object Technol , vol.8 , Issue.6 , pp. 103-122
    • Talhi, C.1    Mouheb, D.2    Lima, V.3    Debbabi, M.4    Wang, L.5    Pourzandi, M.6
  • 234
    • 0035780469 scopus 로고    scopus 로고
    • Embedding security practices in contemporary information systems development approaches
    • Tryfonas, T., Kiountouzis, E., Poulymenakou, A.: "Embedding security practices in contemporary information systems development approaches;" Inf. Manag. Comput. Secur. 9(4), (2001), 183-197.
    • (2001) Inf. Manag. Comput. Secur , vol.9 , Issue.4 , pp. 183-197
    • Tryfonas, T.1    Kiountouzis, E.2    Poulymenakou, A.3
  • 236
    • 84862283276 scopus 로고    scopus 로고
    • Securing distributed systems using patterns: A survey
    • Uzunov, A.V., Fernandez, E.B., Falkner, K.: "Securing distributed systems using patterns: A survey;" Comput. Secur. 31(5), (2012), 681-703.
    • (2012) Comput. Secur , vol.31 , Issue.5 , pp. 681-703
    • Uzunov, A.V.1    Fernandez, E.B.2    Falkner, K.3
  • 239
    • 68149181919 scopus 로고    scopus 로고
    • A Multi-dimensional Classification for Users of Security Patterns
    • VanHilst, M., Fernandez, E.B., Braz, F.: "A Multi-dimensional Classification for Users of Security Patterns;" J. Res. Pract. Inf. Technol. 41(2), (2009), 87-97.
    • (2009) J. Res. Pract. Inf. Technol , vol.41 , Issue.2 , pp. 87-97
    • VanHilst, M.1    Fernandez, E.B.2    Braz, F.3
  • 241
    • 19944367288 scopus 로고    scopus 로고
    • Secure information systems development-a survey and comparison
    • Villarroel, R., Fernández-Medina, E., Piattini, M: "Secure information systems development-a survey and comparison;" Comput. Secur. 24(4), (2005), 308-321.
    • (2005) Comput. Secur , vol.24 , Issue.4 , pp. 308-321
    • Villarroel, R.1    Fernández-Medina, E.2    Piattini, M.3
  • 244
    • 0034816038 scopus 로고    scopus 로고
    • A method for designing secure solutions
    • Whitmore, J.J.: "A method for designing secure solutions;" IBM Syst. J. 40(3), (2001), 747-768.
    • (2001) IBM Syst. J , vol.40 , Issue.3 , pp. 747-768
    • Whitmore, J.J.1
  • 245
    • 84899165292 scopus 로고    scopus 로고
    • State of Practice in Secure Software: Experts' Views on Best Ways Ahead
    • In Mouratidis, H. (Ed.), IGI Global
    • [Whyte and Harrison 2011] Whyte, B., Harrison, J.: "State of Practice in Secure Software: Experts' Views on Best Ways Ahead;" In Mouratidis, H. (Ed.), Software Engineering for Secure Systems, IGI Global, (2011), 1-14.
    • (2011) Software Engineering for Secure Systems , pp. 1-14
    • Whyte, B.1    Harrison, J.2
  • 246
    • 0031074051 scopus 로고    scopus 로고
    • Agent-based software engineering
    • Wooldridge, M.: "Agent-based software engineering;" IEEE Proc. Softw. 144(1), (1997), 26-37.
    • (1997) IEEE Proc. Softw , vol.144 , Issue.1 , pp. 26-37
    • Wooldridge, M.1
  • 253
    • 78649302229 scopus 로고    scopus 로고
    • Cloud computing: State-of-the-art and research challenges
    • Zhang, Q., Cheng, L., Boutaba, R.: "Cloud computing: state-of-the-art and research challenges;" J. Internet Serv. Appl. 1(1), (2010), 7-18.
    • (2010) J. Internet Serv. Appl , vol.1 , Issue.1 , pp. 7-18
    • Zhang, Q.1    Cheng, L.2    Boutaba, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.