메뉴 건너뛰기




Volumn 65, Issue , 2002, Pages 469-485

Extended description techniques for security engineering

Author keywords

Autofocus; Case; Design patterns; Formal methods; Graphical description techniques; Requirements engineering; Security engineering; Security patterns; Security properties; Software engineering; Uml rt

Indexed keywords

COMPUTER AIDED SOFTWARE ENGINEERING; FORMAL METHODS; REQUIREMENTS ENGINEERING; SECURITY OF DATA; SOFTWARE ENGINEERING;

EID: 84883274584     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (24)
  • 3
    • 84957667419 scopus 로고    scopus 로고
    • Enriching the Software Development Process by Formal Methods
    • Broy, M. and Slotosch, O. (1999). Enriching the Software Development Process by Formal Methods. In Current Trends in Applied Formal Methods 1998, pages 44-61.
    • (1999) In Current Trends In Applied Formal Methods , vol.1998 , pp. 44-61
    • Broy, M.1    Slotosch, O.2
  • 6
    • 20444495150 scopus 로고    scopus 로고
    • Common Criteria, Technical report, Communications Security Establishment (Canada), Service Central de la Sécurité des Systèmes d'Information (France), Bundesamt für Sicherheit in der Informationstech-nik (Germany), Netherlands National Communications Security Agency, Communications-Electronics Security Group (United Kingdom), National Institute of Standards and Technology (United States), National Security Agency (United States)
    • Common Criteria (1999). Common criteria for information technology security evaluation version 2.1. Technical report, Communications Security Establishment (Canada), Service Central de la Sécurité des Systèmes d'Information (France), Bundesamt für Sicherheit in der Informationstech-nik (Germany), Netherlands National Communications Security Agency, Communications-Electronics Security Group (United Kingdom), National Institute of Standards and Technology (United States), National Security Agency (United States).
    • (1999) Common Criteria For Information Technology Security Evaluation Version 2.1
  • 13
    • 15944409094 scopus 로고    scopus 로고
    • ITU, 120: Message Sequence Chart (MSC). ITU-TS, Geneva
    • ITU (1996). ITU-TS Recommendation Z. 120: Message Sequence Chart (MSC). ITU-TS, Geneva.
    • (1996) ITU-TS Recommendation Z
  • 16
    • 19144362557 scopus 로고    scopus 로고
    • Formally Defining Security Properties with Relations on Streams
    • Schneider, S. and Ryan, P., editors, Elsevier Science Publishers
    • Lotz, V. (2000). Formally Defining Security Properties with Relations on Streams. In Schneider, S. and Ryan, P., editors, Electronic Notes in Theoretical Computer Science, volume 32. Elsevier Science Publishers.
    • (2000) Electronic Notes In Theoretical Computer Science , vol.32
    • Lotz, V.1
  • 17
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR
    • Margaria and Steffen, editors, of lncs, sv
    • Lowe, G. (1996). Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR. In Margaria and Steffen, editors, TACAS, volume 1055 of lncs, pages 147-166. sv.
    • (1996) TACAS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 18
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson, L. C. (1998). The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1-2):85-128.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 20
    • 0038594096 scopus 로고    scopus 로고
    • Quest: Overview over the Project
    • Hutter, D., Stephan, W., Traverso, P., and Ullmann, M., editors, Springer LNCS 1641
    • Slotosch, O. (1998). Quest: Overview over the Project. In Hutter, D., Stephan, W., Traverso, P., and Ullmann, M., editors, Applied Formal Methods-FM-Trends 98, pages 346-350. Springer LNCS 1641.
    • (1998) Applied Formal Methods-FM-Trends , vol.98 , pp. 346-350
    • Slotosch, O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.