메뉴 건너뛰기




Volumn 18, Issue 3, 2013, Pages 251-279

Evaluating the effectiveness of the security quality requirements engineering (SQUARE) method: A case study using smart grid advanced metering infrastructure

Author keywords

Advanced metering infrastructure (AMI) security; Qualitative research evaluation; Security quality requirements engineering (SQUARE) method; Security requirements engineering method evaluation; Smart grid security

Indexed keywords

IMPACT ANALYSIS; ITS APPLICATIONS; QUALITATIVE RESEARCH; QUALITY REQUIREMENTS; RISK LEVELS; SECURITY REQUIREMENTS; SECURITY REQUIREMENTS ENGINEERING; SMART GRID;

EID: 84881611525     PISSN: 09473602     EISSN: 1432010X     Source Type: Journal    
DOI: 10.1007/s00766-012-0153-4     Document Type: Article
Times cited : (37)

References (97)
  • 1
    • 53849146921 scopus 로고    scopus 로고
    • Master's Thesis, School of Engineering, Blekinge Institute of Technology, Ronneby, Sweden
    • Ahl V (2005) An experimental comparison of five prioritization methods. Master's Thesis, School of Engineering, Blekinge Institute of Technology, Ronneby, Sweden.
    • (2005) An experimental comparison of five prioritization methods
    • Ahl, V.1
  • 3
    • 70349839518 scopus 로고    scopus 로고
    • Smart metering for the future energy systems in the Netherlands
    • Linköping, Sweden doi: 10. 1109/CRIS. 2009. 5071484
    • AlAbdulkarim L, Lukszo Z (2009) Smart metering for the future energy systems in the Netherlands. In: 4th IEEE international conference on critical infrastructures (CRIS), Linköping, Sweden, pp 1-7. doi: 10. 1109/CRIS. 2009. 5071484.
    • (2009) 4th IEEE international conference on critical infrastructures (CRIS) , pp. 1-7
    • AlAbdulkarim, L.1    Lukszo, Z.2
  • 4
    • 80054991493 scopus 로고    scopus 로고
    • A scenario-based approach for requirements elicitation for software systems complying with the utilization of ubiquitous computing technologies
    • Munich, Germany doi: 10. 1109/COMPSACW. 2011. 63
    • Alawairdhi M, Aleisa E (2011) A scenario-based approach for requirements elicitation for software systems complying with the utilization of ubiquitous computing technologies. In: The 35th IEEE annual computer software and applications conference workshops (COMPSACW), Munich, Germany, pp 341-344. doi: 10. 1109/COMPSACW. 2011. 63.
    • (2011) The 35th IEEE annual computer software and applications conference workshops (COMPSACW) , pp. 341-344
    • Alawairdhi, M.1    Aleisa, E.2
  • 5
    • 79451469012 scopus 로고    scopus 로고
    • A goal-based framework for contextual requirements modeling and analysis
    • Ali R, Dalpiaz F, Giorgini P (2010) A goal-based framework for contextual requirements modeling and analysis. Require Eng 15(4): 439-458.
    • (2010) Requirements Engineering , vol.15 , Issue.4 , pp. 439-458
    • Ali, R.1    Dalpiaz, F.2    Giorgini, P.3
  • 7
    • 27744595750 scopus 로고    scopus 로고
    • Toward a smart grid: power delivery for the 21st century
    • doi: 10. 1109/MPAE. 2005. 1507024
    • Amin M, Wollenberg B (2005) Toward a smart grid: power delivery for the 21st century. IEEE Power Energy Mag 3(5): 34-41. doi: 10. 1109/MPAE. 2005. 1507024.
    • (2005) IEEE Power Energy Mag , vol.3 , Issue.5 , pp. 34-41
    • Amin, M.1    Wollenberg, B.2
  • 9
    • 4243980729 scopus 로고    scopus 로고
    • Strategies for developing policies and requirements for secure e-commerce systems
    • In: Ghosh AK (ed) Kluwer Academic Publishers
    • Antón Al, Earp JB (2001) Strategies for developing policies and requirements for secure e-commerce systems. In: Ghosh AK (ed) Recent advances in e-commerce security and privacy. Kluwer Academic Publishers, pp 29-46.
    • (2001) Recent advances in e-commerce security and privacy , pp. 29-46
    • Antón, A.1    Earp, J.B.2
  • 10
    • 0003827816 scopus 로고    scopus 로고
    • Extreme programming explained: embrace change
    • Beck K (2000) Extreme programming explained: embrace change. Addison-Wesley Professional.
    • (2000) Addison-Wesley Professional
    • Beck, K.1
  • 11
    • 67649653902 scopus 로고    scopus 로고
    • Networking AMI smart meters
    • Atlanta, Georgia doi: 10. 1109/ENERGY. 2008. 4781067
    • Bennett C, Highfill D (2008) Networking AMI smart meters. In: IEEE Energy 2030 conference, Atlanta, Georgia, pp 1-8. doi: 10. 1109/ENERGY. 2008. 4781067.
    • (2008) IEEE Energy 2030 conference , pp. 1-8
    • Bennett, C.1    Highfill, D.2
  • 12
    • 0024681034 scopus 로고
    • Theory-w software project management principles and examples
    • Boehm B, Ross R (1989) Theory-w software project management principles and examples. IEEE Trans Softw Eng 15(7): 902-916.
    • (1989) IEEE Trans Software Eng , vol.15 , Issue.7 , pp. 902-916
    • Boehm, B.1    Ross, R.2
  • 14
    • 0036036577 scopus 로고    scopus 로고
    • Security attribute evaluation method: a cost-benefit approach
    • Orlando, Florida doi: 10. 1145/581339. 581370
    • Butler S (2002) Security attribute evaluation method: a cost-benefit approach. In: Proceedings of the 24th ACM international conference on software engineering. Orlando, Florida, pp 232-240. doi: 10. 1145/581339. 581370.
    • (2002) Proceedings of the 24th ACM international conference on software engineering , pp. 232-240
    • Butler, S.1
  • 15
  • 18
    • 0034845823 scopus 로고    scopus 로고
    • DDP-A tool for life-cycle risk management
    • Big Sky, MT doi: 10. 1109/AERO. 2001. 931736
    • Cornford S, Feather M, Hicks K (2001) DDP-A tool for life-cycle risk management. In: IEEE Proceedings of aerospace conference, vol 1. Big Sky, MT, pp 1/441-1/451. doi: 10. 1109/AERO. 2001. 931736.
    • (2001) IEEE Proceedings of aerospace conference , vol.1 , pp. 441-451
    • Cornford, S.1    Feather, M.2    Hicks, K.3
  • 23
    • 0037339884 scopus 로고    scopus 로고
    • The art of requirements triage
    • doi:10.1109/MC.2003.1185216
    • Davis A (2003) The art of requirements triage. IEEE Computer 36(3): 42-49. doi: 10. 1109/MC. 2003. 1185216.
    • (2003) IEEE Computer , vol.36 , Issue.3 , pp. 42-49
    • Davis, A.1
  • 25
    • 33947368645 scopus 로고    scopus 로고
    • Model-based security analysis in seven steps a guided tour to the CORAS method
    • doi:10.1007/s10550-007-0013-9
    • Den Braber F, Hogganvik I, Lund M, Stolen K, Vraalsen F (2007) Model-based security analysis in seven steps a guided tour to the CORAS method. BT Technol J 25(1): 101-117. doi: 10. 1007/s10550-007-0013-9.
    • (2007) BT Technology Journal , vol.25 , Issue.1 , pp. 101-117
    • Den Braber, F.1    Hogganvik, I.2    Lund, M.3    Stolen, K.4    Vraalsen, F.5
  • 27
    • 38349123642 scopus 로고    scopus 로고
    • A goal oriented approach for modeling and analyzing security trade-offs
    • Springer, Berlin
    • Elahi G, Yu E (2007) A goal oriented approach for modeling and analyzing security trade-offs. In: Proceedings of the 26th international conference on Conceptual modeling, ER'07. Springer, Berlin, pp 375-390. http://dl. acm. org/citation. cfm?id=1784489. 1784524.
    • (2007) Proceedings of the 26th international conference on Conceptual modeling, ER'07 , pp. 375-390
    • Elahi, G.1    Yu, E.2
  • 28
    • 77954005795 scopus 로고    scopus 로고
    • Cyber Security and Power System Communication Essential Parts of a Smart Grid Infrastructure
    • Ericsson G (2010) Cyber security and power system communication essential parts of a smart grid infrastructure. IEEE Trans Power Deliv 25(3): 1501-1507.
    • (2010) IEEE Trans Power Delivery , vol.25 , Issue.3 , pp. 1501-1507
    • Ericsson, G.1
  • 30
    • 73649137161 scopus 로고    scopus 로고
    • The path of the smart grid
    • Farhangi H (2009) The path of the smart grid. IEEE Power Energy Mag 8(1): 18-28.
    • (2009) IEEE Power Energ Mag , vol.8 , Issue.1 , pp. 18-28
    • Farhangi, H.1
  • 32
    • 78649624431 scopus 로고    scopus 로고
    • NIST interoperability framework and action plans
    • Minneapolis doi: 10. 1109/PES. 2010. 5589699
    • FitzPatrick G, Wollman D (2010) NIST interoperability framework and action plans. In: IEEE power and energy society general meeting, Minneapolis, pp 1-4. doi: 10. 1109/PES. 2010. 5589699.
    • (2010) IEEE power and energy society general meeting , pp. 1-4
    • FitzPatrick, G.1    Wollman, D.2
  • 34
    • 4544227055 scopus 로고    scopus 로고
    • The future's smart delivery system [electric power supply]
    • Gellings C, Samotyj M, Howe B (2004) The future's smart delivery system [electric power supply]. IEEE Power Energy Mag 2(5): 40-48.
    • (2004) IEEE Power Energ Mag , vol.2 , Issue.5 , pp. 40-48
    • Gellings, C.1    Samotyj, M.2    Howe, B.3
  • 38
    • 40449096402 scopus 로고    scopus 로고
    • Security requirements engineering: A framework for representation and analysis
    • Haley C, Laney R, Moffett J, Nuseibeh B (2008) Security requirements engineering: a framework for representation and analysis. IEEE Trans on Softw Eng 34(1): 133-153.
    • (2008) IEEE Trans Software Eng , vol.34 , Issue.1 , pp. 133-153
    • Haley, C.1    Laney, R.2    Moffett, J.3    Nuseibeh, B.4
  • 40
    • 0141885086 scopus 로고    scopus 로고
    • Evaluation of qualitative research
    • Horsburgh D (2003) Evaluation of qualitative research. J Clin Nurs 12(2): 307-312.
    • (2003) J Clin Nurs , vol.12 , Issue.2 , pp. 307-312
    • Horsburgh, D.1
  • 42
    • 0033683937 scopus 로고    scopus 로고
    • An assessment of the relative efficiency of a facilitator-driven requirements collection process with respect to the conventional interview method
    • Schaumburg, IL doi: 10. 1109/ICRE. 2000. 855608
    • Hubbard R, Schroeder C, Mead N (2000) An assessment of the relative efficiency of a facilitator-driven requirements collection process with respect to the conventional interview method. In: Proceedings of 4th IEEE international conference on requirements engineering. Schaumburg, IL, pp 178-186. doi: 10. 1109/ICRE. 2000. 855608.
    • (2000) Proceedings of 4th IEEE international conference on requirements engineering , pp. 178-186
    • Hubbard, R.1    Schroeder, C.2    Mead, N.3
  • 47
    • 0041307366 scopus 로고
    • Department of Computer and Information science, Linkoping University, Linkoping, Sweden, Licentiate thesis 513
    • Karlsson J (1995) Towards a strategy for software requirements selection. Department of Computer and Information science, Linkoping University, Linkoping, Sweden, Licentiate thesis 513.
    • (1995) Towards a strategy for software requirements selection
    • Karlsson, J.1
  • 49
    • 0031234218 scopus 로고    scopus 로고
    • A cost-value approach for prioritizing requirements
    • doi:10.1109/52.605933
    • Karlsson J, Ryan K (1997) A cost-value approach for prioritizing requirements. IEEE Software 14(5): 67-74. doi: 10. 1109/52. 605933.
    • (1997) IEEE Software , vol.14 , Issue.5 , pp. 67-74
    • Karlsson, J.1    Ryan, K.2
  • 51
    • 0004120213 scopus 로고
    • Working Paper No 131, Institute of Urban and Regional Development, University of California, Berkeley, CA
    • Kunz W, Rittel H (1970) Issues as elements of information systems. Working Paper No 131, Institute of Urban and Regional Development, University of California, Berkeley, CA.
    • (1970) Issues as elements of information systems
    • Kunz, W.1    Rittel, H.2
  • 63
    • 34249004734 scopus 로고    scopus 로고
    • Secure tropos: A security-oriented extension of the tropos methodology
    • Mouratidis H, Giorgini P (2007) Secure tropos: a security-oriented extension of the tropos methodology. Int J Softw Eng Knowl Eng 17(2): 285-309.
    • (2007) Int J Software Eng Knowl Eng , vol.17 , Issue.2 , pp. 285-309
    • Mouratidis, H.1    Giorgini, P.2
  • 64
    • 70450206834 scopus 로고    scopus 로고
    • Enhancing secure Tropos to effectively deal with security requirements in the development of multiagent systems
    • doi: 10. 1007/978-3-642-04879-1_2
    • Mouratidis H, Giorgini P (2009) Enhancing secure Tropos to effectively deal with security requirements in the development of multiagent systems. Safe Secur Multiagent Syst, Lecture Notes in Computer Science, vol 4324/2009, pp 8-26. doi: 10. 1007/978-3-642-04879-1_2.
    • (2009) Safe Secur Multiagent Syst, Lecture Notes in Computer Science, vol 4324/2009 , pp. 8-26
    • Mouratidis, H.1    Giorgini, P.2
  • 65
    • 77954504239 scopus 로고    scopus 로고
    • From goal-driven security requirements engineering to secure design
    • Mouratidis H, Jurjens J (2010) From goal-driven security requirements engineering to secure design. Int J Intell Syst 25(8): 813-840.
    • (2010) Int J Intell Syst , vol.25 , Issue.8 , pp. 813-840
    • Mouratidis, H.1    Jurjens, J.2
  • 68
    • 84881614692 scopus 로고    scopus 로고
    • Network, telecom dictionary, encyclopedia-NetworkDictionary: Information, computer and network security terms glossary and dictionary-d-networkdictionary (2004-2011)
    • Network, telecom dictionary, encyclopedia-NetworkDictionary: Information, computer and network security terms glossary and dictionary-d-networkdictionary (2004-2011). http://www. networkdictionary. com/security/d. php.
  • 71
    • 84992975038 scopus 로고    scopus 로고
    • Using case studies in research
    • Rowley J (2002) Using case studies in research. Manage Res News 25(1): 16-27.
    • (2002) Management Research News , vol.25 , Issue.1 , pp. 16-27
    • Rowley, J.1
  • 74
    • 82855173182 scopus 로고    scopus 로고
    • Security Measures for Advanced Metering Infrastructure Components
    • Chengdu, China doi: 10. 1109/APPEEC. 2010. 5448261
    • Shein R (2010) Security Measures for Advanced Metering Infrastructure Components. In: IEEE Asia-Pacific power and energy engineering conference (APPEEC), Chengdu, China, pp 1-3. doi: 10. 1109/APPEEC. 2010. 5448261.
    • (2010) IEEE Asia-Pacific power and energy engineering conference (APPEEC) , pp. 1-3
    • Shein, R.1
  • 75
    • 3142680761 scopus 로고    scopus 로고
    • Strategies for ensuring trustworthiness in qualitative research projects
    • Shenton A (2004) Strategies for ensuring trustworthiness in qualitative research projects. Educ inform 22(2): 63-76.
    • (2004) Education for Information , vol.22 , Issue.2 , pp. 63-76
    • Shenton, A.1
  • 77
    • 0032629380 scopus 로고    scopus 로고
    • Increase flexibility and security in prepayment, through the use of a separate consumer interface
    • Birmingham, UK doi: 10. 1049/cp: 19990145
    • Smart D (2002) Increase flexibility and security in prepayment, through the use of a separate consumer interface. In: 9th IET international conference on (Conf. Publ. No. 462) metering and tariffs for energy supply. Birmingham, UK, pp 242-247. doi: 10. 1049/cp: 19990145.
    • (2002) 9th IET international conference on (Conf. Publ. No. 462) metering and tariffs for energy supply , pp. 242-247
    • Smart, D.1
  • 78
    • 84881617180 scopus 로고    scopus 로고
    • Software Engineering Institute CMU (2010) SQUARE
    • Software Engineering Institute CMU (2010) SQUARE. https://buildsecurityin. us-cert. gov/bsi/articles/best-practices/requirements/232-bsi. html.
  • 79
    • 84881612498 scopus 로고    scopus 로고
    • Software Engineering Institute CMU (2010) SQUARE
    • Software Engineering Institute CMU (2010) SQUARE. http://www. cert. org/sse/square/square-faq. html.
  • 80
    • 84881610949 scopus 로고    scopus 로고
    • Software Engineering Institute CMU
    • Software Engineering Institute CMU (2011) http://www. sei. cmu. edu/.
    • (2011)
  • 83
    • 85008056120 scopus 로고    scopus 로고
    • An AMI system for the deregulated electricity markets
    • Sui H, Wang H, Lu M, Lee W (2009) An AMI system for the deregulated electricity markets. IEEE Trans Indus Appl 45(6): 2104-2108.
    • (2009) IEEE Trans Ind Appl , vol.45 , Issue.6 , pp. 2104-2108
    • Sui, H.1    Wang, H.2    Lu, M.3    Lee, W.4
  • 85
    • 40949132948 scopus 로고    scopus 로고
    • Cybersecurity for electric power control and automation systems
    • Montreal, Quebec doi: 10. 1109/ICSMC. 2007. 4414239
    • Ten C, Govindarasu M, Liu C (2007) Cybersecurity for electric power control and automation systems. In: IEEE international conference on systems, man and cybernetics ISIC. Montreal, Quebec, pp 29-34. doi: 10. 1109/ICSMC. 2007. 4414239.
    • (2007) IEEE international conference on systems, man and cybernetics ISIC , pp. 29-34
    • Ten, C.1    Govindarasu, M.2    Liu, C.3
  • 86
    • 42549101645 scopus 로고    scopus 로고
    • Vulnerability assessment of cybersecurity for SCADA systems using attack trees
    • Tampa, Florida doi: 10. 1109/PES. 2007. 385876
    • Ten CW, Liu CC, Govindarasu M (2007) Vulnerability assessment of cybersecurity for SCADA systems using attack trees. In: IEEE power engineering society general meeting. Tampa, Florida, pp 1-8. doi: 10. 1109/PES. 2007. 385876.
    • (2007) IEEE power engineering society general meeting , pp. 1-8
    • Ten, C.W.1    Liu, C.C.2    Govindarasu, M.3
  • 90
    • 26244452473 scopus 로고    scopus 로고
    • Security and vulnerability in electric power systems
    • University of Missouri Rolla in Rolla, Missouri, USA
    • Watts D (2003) Security and vulnerability in electric power systems. In: 35th North American power symposium (NAPS '03). University of Missouri Rolla in Rolla, Missouri, USA, pp 559-566.
    • (2003) 35th North American power symposium (NAPS '03) , pp. 559-566
    • Watts, D.1
  • 91
    • 77952113745 scopus 로고    scopus 로고
    • An integrated security system of protecting Smart Grid against cyber attacks
    • Gaithersburg, MD doi: 10. 1109/ISGT. 2010. 5434767
    • Wei D, Lu Y, Jafari M, Skare P, Rohde K (2010) An integrated security system of protecting Smart Grid against cyber attacks. In: IEEE innovative smart grid technologies (ISGT). Gaithersburg, MD, pp 1-7. doi: 10. 1109/ISGT. 2010. 5434767.
    • (2010) IEEE innovative smart grid technologies (ISGT) , pp. 1-7
    • Wei, D.1    Lu, Y.2    Jafari, M.3    Skare, P.4    Rohde, K.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.