메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1-272

Software security engineering: Design and applications

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84891973904     PISSN: None     EISSN: None     Source Type: Book    
DOI: None     Document Type: Book
Times cited : (17)

References (266)
  • 1
    • 84892049375 scopus 로고    scopus 로고
    • A look at software security engineering: a guide for project managers
    • Allen, J. H. et al. (2010) A look at software security engineering: a guide for project managers, http://www.stsc.hill.af.mil/crosstalk/2010/03/1003 allenellisonmeadbarnummcgraw.html.
    • (2010)
    • Allen, J.H.1
  • 2
    • 57649151414 scopus 로고    scopus 로고
    • Software security engineering: A guide for project managers
    • Addison Wesley, SEI series, USA
    • Allen, J. et al. (2008) Software security engineering: A guide for project managers, Addison Wesley, SEI series, USA.
    • (2008)
    • Allen, J.1
  • 3
    • 84892099860 scopus 로고    scopus 로고
    • Ashford, W. (2009) http://www.computerweekly.com/Articles/2009/07/14/236875/on-demand-service-aims-to-cut-cost-of-fixing-softwaresecurity. htm.
    • (2009)
    • Ashford, W.1
  • 4
    • 84892011677 scopus 로고    scopus 로고
    • Vulnerability cause graphs, Design of a Process for Software Security
    • Second International Conference on Availability, Reliability and Security (ARES'07)
    • Byers, D. and Shahmehri, N. (2007) Vulnerability cause graphs, Design of a Process for Software Security, Second International Conference on Availability, Reliability and Security (ARES'07).
    • (2007)
    • Byers, D.1    Shahmehri, N.2
  • 5
    • 84892008144 scopus 로고    scopus 로고
    • BCS Security
    • BCS Security (2009) http://www.bcs.org/server.php?show=ConWebDoc. 25668andchangeNav=8265.
    • (2009)
  • 6
    • 84892121297 scopus 로고    scopus 로고
    • Software security touchpoints
    • Cigital Touchpoints
    • Cigital Touchpoints (2009) Software security touchpoints http://www. cigital.com/training/touchpoints/.
    • (2009)
  • 7
    • 37349131994 scopus 로고    scopus 로고
    • Comprehensive lightweight application security process
    • CLASP
    • CLASP (2006) Comprehensive lightweight application security process, http://www.owasp.org.
    • (2006)
  • 8
    • 0002543106 scopus 로고    scopus 로고
    • Software Engineering for Security: a Roadmap, The future of Software Engineering
    • Finkelstein, A (ed.), ACM press, as part of 22nd Intl. conference on Software Engineering, Limerick, Ireland
    • Devanbu, P. T. and Stubblebine, S. (2000) Software Engineering for Security: a Roadmap, The future of Software Engineering, Finkelstein, A (ed.), ACM press, as part of 22nd Intl. conference on Software Engineering, Limerick, Ireland.
    • (2000)
    • Devanbu, P.T.1    Stubblebine, S.2
  • 9
    • 47849113405 scopus 로고    scopus 로고
    • S2D-ProM: A Strategy Oriented Process Model for Secure Software Development
    • International Conference on Software Engineering Advances (ICSEA, 2007)
    • Essafi, M., Labed, L. and Ghezala, H. B. (2007) S2D-ProM: A Strategy Oriented Process Model for Secure Software Development, International Conference on Software Engineering Advances (ICSEA, 2007).
    • (2007)
    • Essafi, M.1    Labed, L.2    Ghezala, H.B.3
  • 11
    • 84892029227 scopus 로고    scopus 로고
    • The Silent Battlefield: Government's Alarming Vulnerability to Cyber Attack
    • Foritfy report, white paper
    • Foritfy report (2009) The Silent Battlefield: Government's Alarming Vulnerability to Cyber Attack, white paper, www.fortify.com.
    • (2009)
  • 12
    • 84892018980 scopus 로고    scopus 로고
    • Taxonomy of security
    • Gonzalez-Castillo, Y. O. (2004) Taxonomy of security, (http://www. europeanbiometrics.info/images/resources/66_470_file.pdf.
    • (2004)
    • Gonzalez-Castillo, Y.O.1
  • 13
    • 33747259074 scopus 로고    scopus 로고
    • The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software
    • Microsoft Press
    • Howard, M. and Lipner, S. (2006) The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software, Microsoft Press.
    • (2006)
    • Howard, M.1    Lipner, S.2
  • 14
    • 7744243916 scopus 로고    scopus 로고
    • Secure Systems Development with UML (UMLsec)
    • Springer- Verlog, Germany
    • Jurjen, J. (2005) Secure Systems Development with UML (UMLsec), Springer- Verlog, Germany.
    • (2005)
    • Jurjen, J.1
  • 15
    • 84892017952 scopus 로고    scopus 로고
    • Security principles: identity, authentication, authorization, Current ISandT
    • Nov/Dec
    • Logan, C. (2004) Security principles: identity, authentication, authorization, Current ISandT, Issue 2, Vol 20, Nov/Dec, http://web.mit.edu/ist/isnews/v20/n02/200206.html.
    • (2004) , vol.20 , Issue.2
    • Logan, C.1
  • 16
    • 2342469291 scopus 로고    scopus 로고
    • Software Security: Building Security
    • March/April
    • McGraw, G. (2004) Software Security: Building Security In, IEEE Security and Privacy, March/April.
    • (2004) IEEE Security and Privacy
    • McGraw, G.1
  • 17
    • 33144456824 scopus 로고    scopus 로고
    • Software security: building security
    • in, Addison Wesley, USA
    • McGraw, G. (2006) Software security: building security in, Addison Wesley, USA.
    • (2006)
    • McGraw, G.1
  • 18
    • 84932090691 scopus 로고    scopus 로고
    • Software components: guidelines and applications
    • Ramachandran, M. (2008) Software components: guidelines and applications, https://www.novapublishers.com/catalog/product_info.php?products_id=7 577.
    • (2008)
    • Ramachandran, M.1
  • 19
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre, G. and A. L. Opdahl (2005) Eliciting security requirements with misuse cases, Requirements Eng (2005) 10: 34-44.
    • (2005) Requirements Eng , vol.10 , Issue.2005 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 21
    • 79960616059 scopus 로고    scopus 로고
    • On the Secure Software Development Process: CLASP, SDL and Touchpoints Compared
    • Elsevier
    • Win, de B et al. (2008) On the Secure Software Development Process: CLASP, SDL and Touchpoints Compared, Elsevier.
    • (2008)
    • Win de, B.1
  • 22
    • 57649151414 scopus 로고    scopus 로고
    • Software security engineering: a guide for project managers
    • Addison Wesley, 2008
    • Allen, J. H., et al. (2008) Software security engineering: a guide for project managers, Addison Wesley, 2008.
    • (2008)
    • Allen, J.H.1
  • 23
    • 78349247421 scopus 로고    scopus 로고
    • Distributed system security: issues, processes and solutions
    • Wiley
    • Belapurkar, A., et al. (2009) Distributed system security: issues, processes and solutions, Wiley.
    • (2009)
    • Belapurkar, A.1
  • 24
    • 84892099337 scopus 로고    scopus 로고
    • Security engineering for software (SES), CS996-CISM
    • Chen, A. Jia (2004) Security engineering for software (SES), CS996-CISM, isis.poly.edu/courses/cs996-management/Lectures/SES.pdf.
    • (2004)
    • Chen, A.J.1
  • 25
    • 84891962794 scopus 로고    scopus 로고
    • OWASP CLASP Version 1.2
    • CLASP
    • CLASP (2006) OWASP CLASP Version 1.2, http://www.lulu.com/items/volume_62/1401000/1401307/3/print/OWASP_CLASP_v1.2_for_print_L ULU.pdf.
    • (2006)
  • 26
    • 84892075010 scopus 로고    scopus 로고
    • Building Security In
    • Graham, D. (2006) Building Security In, https://buildsecurityin.uscert. gov/bsi/articles/best-practices/requirements/548-BSI.html.
    • (2006)
    • Graham, D.1
  • 27
    • 2642566896 scopus 로고    scopus 로고
    • Trustworthy Refinement through Intrusion-Aware Design
    • CMU/SEI-2003-TR-002, ADA414865
    • Ellison, R.J. and Moore, A. P. (2003) Trustworthy Refinement through Intrusion-Aware Design (CMU/SEI-2003-TR-002, ADA414865).
    • (2003)
    • Ellison, R.J.1    Moore, A.P.2
  • 28
    • 84892026808 scopus 로고    scopus 로고
    • Software Engineering Institute
    • Carnegie Mellon University
    • Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2003. http://www.sei.cmu.edu/publications/documents/03. reports/03tr002.html.
    • (2003)
    • Pittsburgh, P.A.1
  • 29
    • 84892099792 scopus 로고    scopus 로고
    • Engineering Safety- and Security-Related Requirements ICCBSS Tutorial
    • SEI, Carnegie Mellon University, 27 February
    • Firesmith, D. (2007) Engineering Safety- and Security-Related Requirements ICCBSS Tutorial, SEI, Carnegie Mellon University, 27 February.
    • (2007)
    • Firesmith, D.1
  • 30
    • 2942757657 scopus 로고    scopus 로고
    • Engineering security requirements
    • Firesmith, D. (2003) Engineering security requirements, Journal of Object Technology, Volume 2, No. 1, 2003.
    • (2003) Journal of Object Technology , vol.2 , Issue.1 , pp. 2003
    • Firesmith, D.1
  • 31
    • 0004189634 scopus 로고
    • Design Patterns
    • Addison Wesley
    • Gamma, E. (1995) Design Patterns, Addison Wesley.
    • (1995)
    • Gamma, E.1
  • 32
    • 61949376588 scopus 로고    scopus 로고
    • Security in the Software Lifecycle: Making Software Development Processes-and Software Produced by Them-More Secure
    • Draft version 1.2. U.S. Department of Homeland Security, August
    • Goertzel, K., et al. (2006) Security in the Software Lifecycle: Making Software Development Processes-and Software Produced by Them-More Secure, Draft version 1.2. U.S. Department of Homeland Security, August, http://www.cert.org/books/secureswe/SecuritySL.pdf.
    • (2006)
    • Goertzel, K.1
  • 33
    • 49049107220 scopus 로고    scopus 로고
    • Software Security Assurance: A State-of-the-Art Report (SOAR)
    • Herndon, VA: Information Assurance Technology Analysis Center (IATAC) and Defense Technical Information Center (DTIC), 2007
    • Goertzel, K., et al. (2007) Software Security Assurance: A State-of-the-Art Report (SOAR). Herndon, VA: Information Assurance Technology Analysis Center (IATAC) and Defense Technical Information Center (DTIC), 2007. http://iac.dtic.mil/iatac/download/security.pdf.
    • (2007)
    • Goertzel, K.1
  • 34
    • 0010729284 scopus 로고    scopus 로고
    • Writing Secure Code (2nd ed.)
    • Redmond, WA: Microsoft Press
    • Howard, M. and LeBlanc, D. C. (2002) Writing Secure Code (2nd ed.). Redmond, WA: Microsoft Press.
    • (2002)
    • Howard, M.1    LeBlanc, D.C.2
  • 35
    • 0003504769 scopus 로고
    • Object-oriented software engineering: use-case-driven approach
    • Addison Wesley
    • Jacobson, I. (1992) Object-oriented software engineering: use-case-driven approach, Addison Wesley.
    • (1992)
    • Jacobson, I.1
  • 36
    • 0003499649 scopus 로고    scopus 로고
    • Requirements Engineering: Processes and Techniques
    • Wiley
    • Kotonya, G. and Sommerville, I. (1998) Requirements Engineering: Processes and Techniques, Wiley.
    • (1998)
    • Kotonya, G.1    Sommerville, I.2
  • 37
    • 67249135314 scopus 로고    scopus 로고
    • Requirements Engineering: From system goals to UML models to software specifications
    • Wiley, UK
    • Lamsweerde, van A. (2009) Requirements Engineering: From system goals to UML models to software specifications, Wiley, UK.
    • (2009)
    • Lamsweerde van, A.1
  • 38
    • 33144456824 scopus 로고    scopus 로고
    • Software security: building security
    • Addison Wesley, USA
    • McGraw, G. (2006) Software security: building security in, Addison Wesley, USA.
    • (2006)
    • McGraw, G.1
  • 39
    • 70349553280 scopus 로고    scopus 로고
    • Incorporating Security Quality Requirements Engineering (SQUARE) into Standard Life-Cycle Models
    • SEI Technical Note CMU/SEI-2008-TN-006
    • Mead, N. R. et al. (2008) Incorporating Security Quality Requirements Engineering (SQUARE) into Standard Life-Cycle Models, SEI Technical Note CMU/SEI-2008-TN-006, http://www.sei.cmu.edu.
    • (2008)
    • Mead, N.R.1
  • 40
    • 71049166722 scopus 로고    scopus 로고
    • Security Requirements Engineering: A Survey
    • ISR Technical Report # UCI-ISR-08-2, Institute for Software Research, University of California, Irvine
    • Romero-Mariona, J., Ziv, H., Richardson, D. J. (2008), Security Requirements Engineering: A Survey, ISR Technical Report # UCI-ISR-08-2, Institute for Software Research, University of California, Irvine.
    • (2008)
    • Romero-Mariona, J.1    Ziv, H.2    Richardson, D.J.3
  • 41
    • 0006964066 scopus 로고    scopus 로고
    • Attack Trees: modeling security threats
    • Dr. Dobbs Journal, December
    • Schneier, B. (1999) Attack Trees: modeling security threats, Dr. Dobbs Journal, December, http://www.schneier.com/paper-attacktrees-ddjft. html.
    • (1999)
    • Schneier, B.1
  • 42
    • 0003487308 scopus 로고    scopus 로고
    • Secrets and Lies: Digital Security in a Networked World
    • New York, NY: John Wiley and Sons
    • Schneier, B. (2000) Secrets and Lies: Digital Security in a Networked World. New York, NY: John Wiley and Sons.
    • (2000)
    • Schneier, B.1
  • 43
    • 0003917832 scopus 로고    scopus 로고
    • Requirements Engineering: A good practice guide
    • Wiley
    • Sommerville, I. and Sawyer, P. (1998) Requirements Engineering: A good practice guide, Wiley.
    • (1998)
    • Sommerville, I.1    Sawyer, P.2
  • 44
    • 39449099894 scopus 로고    scopus 로고
    • Security requirements for rest of us: a survey
    • Special Issue on Security and Agile requirement engineering methods, January/February
    • Tondel, I. A et al. (2008) Security requirements for rest of us: a survey, IEEE Software, Special Issue on Security and Agile requirement engineering methods, January/February.
    • (2008) IEEE Software
    • Tondel, I.A.1
  • 45
    • 67349139935 scopus 로고    scopus 로고
    • On the secure software development process: CLASP, SDL and Touchpoints compared
    • Win, D. B. et al. (2009) On the secure software development process: CLASP, SDL and Touchpoints compared, Information and Software Technology 51 (2009) 1152-1171.
    • (2009) Information and Software Technology , vol.51 , Issue.2009 , pp. 1152-1171
    • Win, D.B.1
  • 46
    • 35348824361 scopus 로고    scopus 로고
    • The art of software security assessment: identifying and preventing software vulnerabilities
    • Addison Wesley
    • Dowd, M., McDonald, J. and Schuh, J. (2007) The art of software security assessment: identifying and preventing software vulnerabilities, Addison Wesley.
    • (2007)
    • Dowd, M.1    McDonald, J.2    Schuh, J.3
  • 47
    • 84892027226 scopus 로고    scopus 로고
    • SDL Threat Modeling Tool 3.1
    • Microsoft
    • Microsoft (2009a) SDL Threat Modeling Tool 3.1, http://www.microsoft. com/downloads/en/details.aspx?FamilyID=A48CCCB1-814B-47B6- 9D17-1E273F65AE19anddisplaylang=en
    • (2009)
  • 48
    • 49049107220 scopus 로고    scopus 로고
    • Software Security Assurance
    • State-of-the-Art Report (SOAR) July 31, 2007, Published by IATAC and DACS
    • Goertzel, K. M. et al. (2007) Software Security Assurance, State-of-the-Art Report (SOAR) July 31, 2007, Published by IATAC and DACS.
    • (2007)
    • Goertzel, K.M.1
  • 49
    • 33746103289 scopus 로고    scopus 로고
    • Trust Beyond Security: An Expanded Trust Model
    • Hoffman, J. L. et al. (2006) Trust Beyond Security: An Expanded Trust Model, Communications Of The Acm July, Vol. 49, No. 7.
    • (2006) Communications Of The Acm July , vol.49 , Issue.7
    • Hoffman, J.L.1
  • 50
    • 84892111666 scopus 로고    scopus 로고
    • No More Chewy Centers: Introducing The Zero Trust Model of Information Security
    • Forrestter Report, September
    • Kindervag, J. (2010) No More Chewy Centers: Introducing The Zero Trust Model of Information Security, Forrestter Report, September, http://www.packetmotion.com/landing/zero-trust-model/
    • (2010)
    • Kindervag, J.1
  • 51
    • 79952274582 scopus 로고    scopus 로고
    • A Practical Approach to Threat Modeling
    • March
    • Olzak, T. (2006) A Practical Approach to Threat Modeling, March, http://adventuresinsecurity.com/blog/wp-content/uploads/2006/03/A_ Practical_Approach_to_Threat_Modeling.pdf.
    • (2006)
    • Olzak, T.1
  • 52
    • 84892139974 scopus 로고    scopus 로고
    • Threat Modeling for Web Application Deployment, ThinkingStone
    • accessed on 8th January 2011
    • Ristic, I. (2011) Threat Modeling for Web Application Deployment, ThinkingStone, http://www.modsecurity.org/documentation/Threat_ Modelling.pdf, accessed on 8th January 2011.
    • (2011)
    • Ristic, I.1
  • 53
    • 84892044627 scopus 로고    scopus 로고
    • Trust model
    • Openloop, accessed on 10th January
    • Openloop (2011) Trust model, http://www.openloop.com/software Engineering/security/PKI/TrustModel/index.htm, accessed on 10th January.
    • (2011)
  • 54
    • 84892059273 scopus 로고    scopus 로고
    • Assessing Information Security Risks in the Software Development Lifecycle
    • September
    • Ashbaugh, D. A. (2006) Assessing Information Security Risks in the Software Development Lifecycle, September, www.stsc.hill.af.mil.
    • (2006)
    • Ashbaugh, D.A.1
  • 55
    • 84892050496 scopus 로고    scopus 로고
    • TAM, accessed on 11th January
    • TAM (2011) http://www.microsoft.com/downloads/en/confirmation.aspx? familyid=59888078-9daf-4e96-b7d1-944703479451anddisplaylang=en, accessed on 11th January.
    • (2011)
  • 56
    • 84864749614 scopus 로고    scopus 로고
    • Using Microsoft's Threat Analysis and Modeling Tool
    • Meneely, A. et al. (2009) Using Microsoft's Threat Analysis and Modeling Tool, http://agile.csc.ncsu.edu/SEMaterials/tutorials/msthreatmodeling/.
    • (2009)
    • Meneely, A.1
  • 57
    • 84891999236 scopus 로고    scopus 로고
    • IT infrastructure threat modeling guide
    • Microsoft
    • Microsoft (2009b) IT infrastructure threat modeling guide http://www.microsoft.com/downloads/en/details.aspx?FamilyID=e1d53e3 f-a512-4668-85b3-169a777fc58fanddisplaylang=en.
    • (2009)
  • 58
    • 33845915969 scopus 로고    scopus 로고
    • International Conference on Information Security and Cryptology-ICISC 2005. LNCS 3935
    • Mauw, S. and Oostdijk, M. (2005) International Conference on Information Security and Cryptology-ICISC 2005. LNCS 3935, http://www.sti. uniurb.it/events/fosad05/attacktrees.pdf.
    • (2005)
    • Mauw, S.1    Oostdijk, M.2
  • 59
    • 74549179551 scopus 로고    scopus 로고
    • Introduction to Attack Patterns
    • Cigital Inc
    • Barnum, S. and Sethi, A. (2006) Introduction to Attack Patterns, Cigital Inc, https://buildsecurityin.us-cert.gov/bsi/articles/knowledge/attack/585- BSI.html
    • (2006)
    • Barnum, S.1    Sethi, A.2
  • 60
    • 33644539077 scopus 로고    scopus 로고
    • Ambient Intelligence
    • AmI
    • AmI (2008). Ambient Intelligence, http://www.ambientintelligence.org/.
    • (2008)
  • 62
    • 84892079313 scopus 로고    scopus 로고
    • Commonality analysis for defining software product lines
    • Tutorial, ICSE 2000, Limerick, Ireland
    • Ardis, M. (2000). Commonality analysis for defining software product lines, Tutorial, ICSE 2000, Limerick, Ireland.
    • (2000)
    • Ardis, M.1
  • 63
    • 0012647401 scopus 로고    scopus 로고
    • Component-Based Product-Line Engineering with the UML
    • Addison-Wesley, September 2001
    • Atkinson et al. (2001). Component-Based Product-Line Engineering with the UML, Addison-Wesley, September 2001.
    • (2001)
    • Atkinson1
  • 64
    • 84892004803 scopus 로고    scopus 로고
    • Software Architecture
    • In Practice Addison Wesley
    • Bass, L. Clements, P. Kazman, R (1998). Software Architecture In Practice Addison Wesley.
    • (1998)
    • Clements, B.L.1    Kazman, P.R.2
  • 65
    • 35048869305 scopus 로고
    • The Artistry of software architecture
    • Special issue, IEEE Software, November 1995
    • Boasson, M. (1995). The Artistry of software architecture, Special issue, IEEE Software, November 1995.
    • (1995)
    • Boasson, M.1
  • 66
    • 1442338082 scopus 로고    scopus 로고
    • Understanding.NET: A Tutorial and Analysis
    • Addison Wesley 2002
    • Chappell, D. (2002). Understanding.NET: A Tutorial and Analysis, Addison Wesley 2002.
    • (2002)
    • Chappell, D.1
  • 67
    • 21244456616 scopus 로고    scopus 로고
    • User stories applied for agile software development
    • Addison-Wesley Press 2004
    • Cohn, M. (2004). User stories applied for agile software development. Addison-Wesley Press 2004.
    • (2004)
    • Cohn, M.1
  • 68
    • 0032207150 scopus 로고    scopus 로고
    • Commonality and variability in software engineering
    • IEEE Software, November/December 1998
    • Coplien, J., Hoffman, D., and Weiss, D. (1998). Commonality and variability in software engineering, IEEE Software, November/December 1998.
    • (1998)
    • Coplien, J.1    Hoffman, D.2    Weiss, D.3
  • 69
    • 62749156655 scopus 로고    scopus 로고
    • Design Software Product Lines
    • Addison Wesley 2004
    • Gomma, E. (2004). Design Software Product Lines, Addison Wesley 2004.
    • (2004)
    • Gomma, E.1
  • 70
    • 84892134534 scopus 로고    scopus 로고
    • The Nature of Artificial Intelligence, Artificial Intelligence at Edinburgh University: a Perspective
    • Howe, J. (2007). The Nature of Artificial Intelligence, Artificial Intelligence at Edinburgh University: a Perspective, http://www.inf.ed.ac.uk/about/ AIhistory.html.
    • (2007)
    • Howe, J.1
  • 71
    • 0003504769 scopus 로고
    • Object-Oriented Software Engineering: A use-casedriven approach
    • Addison Wesley, 1992
    • Jacobson, et al. (1992). Object-Oriented Software Engineering: A use-casedriven approach, Addison Wesley, 1992.
    • (1992)
    • Jacobson1
  • 72
    • 0003535126 scopus 로고    scopus 로고
    • Software architecture for product families
    • Addison Wesley 2000
    • Jazayeri, M., Ran, A., van der Linden, F. (2000). Software architecture for product families, Addison Wesley 2000.
    • (2000)
    • Jazayeri, M.1    Ran, A.2    van der Linden, F.3
  • 73
    • 84892060441 scopus 로고
    • The 4+1 view model of software architecture
    • Special issue, IEEE Software, November 1995
    • Kruchten, P. (1995). The 4+1 view model of software architecture, Special issue, IEEE Software, November 1995.
    • (1995)
    • Kruchten, P.1
  • 74
    • 0033697175 scopus 로고    scopus 로고
    • Requirements Engineering for Product Families
    • ICSE 2000, Limerick, Ireland
    • Kuusela, J., and Savolainen, J. (2000). Requirements Engineering for Product Families, ICSE 2000, Limerick, Ireland.
    • (2000)
    • Kuusela, J.1    Savolainen, J.2
  • 75
    • 84892105782 scopus 로고    scopus 로고
    • Requirements-Based Product Line Engineering
    • ESEC/FSE 2001, Vienna, Austria
    • Mannion, M., and Kaindl, M. (2001). Requirements-Based Product Line Engineering, ESEC/FSE 2001, Vienna, Austria.
    • (2001)
    • Mannion, M.1    Kaindl, M.2
  • 76
    • 36948999633 scopus 로고    scopus 로고
    • Tracing variations in software product families
    • CACM, December
    • Mohan, K., and Ramesh, B. (2007). Tracing variations in software product families, CACM, December, Vol. 50 No. 12.
    • (2007) , vol.50 , Issue.12
    • Mohan, K.1    Ramesh, B.2
  • 77
    • 77955431422 scopus 로고    scopus 로고
    • Security requirements engineering framework for software product lines
    • Mellado, D. et al. (2010). Security requirements engineering framework for software product lines, Information and Software Technology 52 (2010) 1094-1117.
    • (2010) Information and Software Technology , vol.52 , Issue.2010 , pp. 1094-1117
    • Mellado, D.1
  • 78
    • 33947637432 scopus 로고    scopus 로고
    • MAP and OAR Methods: Techniques for Developing Core Assets for Software Product Lines from Existing Assets
    • CMU/SEI, April 2002
    • O'Brien, Liam and Smith, Dennis (2002). MAP and OAR Methods: Techniques for Developing Core Assets for Software Product Lines from Existing Assets, CMU/SEI, April 2002.
    • (2002)
    • O'Brien, L.1    Smith, D.2
  • 79
    • 0003871224 scopus 로고    scopus 로고
    • Measuring software reuse
    • Addison Wesley, 1997
    • Poulin, S. J. (1997). Measuring software reuse, Addison Wesley, 1997.
    • (1997)
    • Poulin, S.J.1
  • 80
    • 62749094176 scopus 로고    scopus 로고
    • Domain Analysis
    • ACM SIGSOFT Software Engineering Notes, May 1998
    • Prieto-Diaz (1998). Domain Analysis, ACM SIGSOFT Software Engineering Notes, May 1998.
    • (1998)
    • Prieto-Diaz1
  • 81
    • 15244350148 scopus 로고    scopus 로고
    • Commonality and Variability Analysis in Industrial Practice for Product-line Improvement
    • Wiley
    • Ramachandran, M. (2005). Commonality and Variability Analysis in Industrial Practice for Product-line Improvement, Special issue, Journal of Software Process Improvement and Practice, Vol.10, Wiley.
    • (2005) Journal of Software Process Improvement and Practice , vol.10 , Issue.SPEC ISSUE
    • Ramachandran, M.1
  • 83
    • 84932090691 scopus 로고    scopus 로고
    • Software Components: Guidelines and Applications
    • Nova Science Publishers, New York, USA. ISBN: 978-1- 60456-870-7, October/November 2008
    • Ramachandran, M. (2008). Software Components: Guidelines and Applications, Nova Science Publishers, New York, USA. ISBN: 978-1- 60456-870-7, October/November 2008, https://www.novapublishers.com/catalog/product_info.php?products_id=7577 Pages 410.
    • (2008) , pp. 410
    • Ramachandran, M.1
  • 84
    • 84891965204 scopus 로고    scopus 로고
    • Knowledge-based Reasoning for Software Architectural Design Strategies
    • SE Notes, March 2003
    • Ramachandran, M. and Mangano, D. (2003). Knowledge-based Reasoning for Software Architectural Design Strategies, SE Notes, March 2003.
    • (2003)
    • Ramachandran, M.1    Mangano, D.2
  • 85
    • 84892002484 scopus 로고
    • A framework for analyzing reuse knowledge
    • 7the Intl. conf. on Software Eng and Knowledge Eng (SEKE'95), Washington DC, 22-24 June, 1995, USA
    • Ramachandran, M. and Sommerville, I. (1995). A framework for analyzing reuse knowledge, 7the Intl. conf. on Software Eng and Knowledge Eng (SEKE'95), Washington DC, 22-24 June, 1995, USA.
    • (1995)
    • Ramachandran, M.1    Sommerville, I.2
  • 86
    • 84892013292 scopus 로고    scopus 로고
    • Chapter 20 Commonality Analysis: Implications over a Successful Product Line
    • Edited by Ramachandran, M and de Carvalho, Rogério Atem (Editors) (2008) Handbook of Software Engineering and Productivity Technologies: Implications for Globalisation, IGI Publishers, USA, November 2009
    • Ramachandran, M. and Ganeshan, S. (2009). Chapter 20 Commonality Analysis: Implications over a Successful Product Line, Edited by Ramachandran, M and de Carvalho, Rogério Atem (Editors) (2008) Handbook of Software Engineering and Productivity Technologies: Implications for Globalisation, IGI Publishers, USA, November 2009.
    • (2009)
    • Ramachandran, M.1    Ganeshan, S.2
  • 87
    • 84891962186 scopus 로고    scopus 로고
    • Chapter 21 Rapid Productivity and Quality: Software Product Lines and Trends of the Future
    • Edited by Ramachandran, M and de Carvalho, Rogério Atem (Editors) (2008) Handbook of Software Engineering and Productivity Technologies: Implications for Globalisation, IGI Publishers, USA, November 2009
    • Ramachandran, M. and Ganeshan, S. (2009). Chapter 21 Rapid Productivity and Quality: Software Product Lines and Trends of the Future, Edited by Ramachandran, M and de Carvalho, Rogério Atem (Editors) (2008) Handbook of Software Engineering and Productivity Technologies: Implications for Globalisation, IGI Publishers, USA, November 2009.
    • (2009)
    • Ramachandran, M.1    Ganeshan, S.2
  • 88
    • 84892135496 scopus 로고    scopus 로고
    • Artificial Intelligence and Software Engineering: Status and Future Trends
    • Rech, J. and Althoff, K-D. (2008). Artificial Intelligence and Software Engineering: Status and Future Trends www.iis.uni-hildesheim.de/files/staff/althoff/Publications/KI_AI-SE-Survey.pdf.
    • (2008)
    • Rech, J.1    Althoff, K.-D.2
  • 89
    • 70749153293 scopus 로고
    • The programmers' apprentice project: research overview
    • IEEE Computer, November 1988
    • Ritch, C. and Waters, R. C. (1988). The programmers' apprentice project: research overview, IEEE Computer, November 1988.
    • (1988)
    • Ritch, C.1    Waters, R.C.2
  • 90
    • 33644539077 scopus 로고    scopus 로고
    • Ambient Intelligence
    • IOS Press
    • Riva, G. et al. (editors) (2005). Ambient Intelligence, IOS Press, http://www. ambientintelligence.org/.
    • (2005)
    • Riva, G.1
  • 91
    • 84877168529 scopus 로고    scopus 로고
    • Software Product Lines
    • SEI
    • SEI (2005) Software Product Lines, http://www.sei.cmu.edu/productlines/bibliography.html.
    • (2005)
  • 92
    • 0003787207 scopus 로고    scopus 로고
    • Software Architecture -- Perspectives on an Emerging Discipline
    • Prentice Hall. Jersey
    • Shaw M., Garlan D. (1996). Software Architecture -- Perspectives on an Emerging Discipline. Prentice Hall. Jersey.
    • (1996)
    • Shaw, M.1    Garlan, D.2
  • 93
    • 0003885424 scopus 로고    scopus 로고
    • Software Engineering
    • Somerville, Seventh Edition. Addison Wesley (2004)
    • Somerville (2004). Software Engineering, Seventh Edition. Addison Wesley (2004).
    • (2004)
  • 94
    • 0003499649 scopus 로고    scopus 로고
    • Requirements Engineering: Processes and Techniques
    • Wiley, 1998
    • Sommerville, I. and Kotenya, G. (1998). Requirements Engineering: Processes and Techniques, Wiley, 1998.
    • (1998)
    • Sommerville, I.1    Kotenya, G.2
  • 95
    • 0003917832 scopus 로고    scopus 로고
    • Requirements Engineering: A Good Practice Guide
    • Wiley
    • Sommerville, I., and Sawyer, P. Requirements Engineering: A Good Practice Guide, Wiley, 1997.
    • (1997)
    • Sommerville, I.1    Sawyer, P.2
  • 96
    • 0003902724 scopus 로고    scopus 로고
    • Software Product-Line Engineering: A Family-based Software Development Process
    • 1999
    • Weiss, M. D., Lai, R. T. C. (1999). Software Product-Line Engineering: A Family-based Software Development Process, 1999.
    • (1999)
    • Weiss, M.D.1    Lai, R.T.C.2
  • 97
    • 84892085731 scopus 로고    scopus 로고
    • Commonality Analysis: A Systematic Process for Defining Families
    • Second International Workshop on Development and Evolution of Software Architectures for Product Families, February 1998
    • Weiss, M.D. (1998). Commonality Analysis: A Systematic Process for Defining Families. Second International Workshop on Development and Evolution of Software Architectures for Product Families, February 1998.
    • (1998)
    • Weiss, M.D.1
  • 98
    • 49049107220 scopus 로고    scopus 로고
    • Software Security Assurance
    • State-of-the-Art Report (SOAR) July 31, 2007, Published by IATAC and DACS
    • Goertzel, K. M. et al. (2007) Software Security Assurance, State-of-the-Art Report (SOAR) July 31, 2007, Published by IATAC and DACS.
    • (2007)
    • Goertzel, K.M.1
  • 99
    • 12444319221 scopus 로고    scopus 로고
    • Software quality assurance
    • Pearson
    • Galin, D. (2004) Software quality assurance, Pearson.
    • (2004)
    • Galin, D.1
  • 100
    • 33846988559 scopus 로고    scopus 로고
    • Structured Assurance Cases: Three Common Standards
    • Proceedings of the Ninth IEEE International Symposium on High-Assurance Systems Engineering (HASE'05)
    • Ankrum, T. S. and Kromholz, A. H. (2005) Structured Assurance Cases: Three Common Standards, Proceedings of the Ninth IEEE International Symposium on High-Assurance Systems Engineering (HASE'05).
    • (2005)
    • Ankrum, T.S.1    Kromholz, A.H.2
  • 101
    • 84892096406 scopus 로고    scopus 로고
    • Creating a Software Assurance Body of Knowledge
    • October
    • Redwine, S. T. (2005) Creating a Software Assurance Body of Knowledge, www.stsc.hill.af.mil, October.
    • (2005)
    • Redwine, S.T.1
  • 103
    • 84955516854 scopus 로고    scopus 로고
    • Metrics That Matter: Quantifying Software Security Risk
    • February. As part of the ASE 2005 conference, Long Beach, California, USA
    • Chess, B. (2006) Metrics That Matter: Quantifying Software Security Risk, NIST Proceedings of Workshop on Software Security Assurance Tools, Techniques, and Metrics (SSATTM'05), February. As part of the ASE 2005 conference, Long Beach, California, USA, http://hissa. nist.gov/~black/Papers/NIST%20SP%20500-265.pdf.
    • (2006) NIST Proceedings of Workshop on Software Security Assurance Tools, Techniques, and Metrics (SSATTM'05)
    • Chess, B.1
  • 104
    • 84892053774 scopus 로고    scopus 로고
    • Resilient software, CrossTalk
    • Crasstalk, Sept/Oct
    • Crasstalk (2009) Resilient software, CrossTalk, The Journal of Defense Software Engineering, 22:6, Sept/Oct.
    • (2009) The Journal of Defense Software Engineering , vol.22 , Issue.6
  • 105
    • 84891981745 scopus 로고    scopus 로고
    • CERT Resiliency Engineering Framework
    • SEI, CMU report
    • White, D. (2007) CERT Resiliency Engineering Framework, SEI, CMU report.
    • (2007)
    • White, D.1
  • 107
    • 84892104958 scopus 로고    scopus 로고
    • Security Assurance during the Software Development Cycle
    • International Conference on Computer Systems and Technologies - CompSysTech'09
    • Agudo, I. et al. (2009) Security Assurance during the Software Development Cycle, International Conference on Computer Systems and Technologies - CompSysTech'09.
    • (2009)
    • Agudo, I.1
  • 108
    • 2342548557 scopus 로고    scopus 로고
    • The Art of Deception: Controlling the Human Element of Security
    • Wiley
    • Mitnick, K. and Simon, W. L. (2003) The Art of Deception: Controlling the Human Element of Security, Wiley. http://www.social-engineer.org/seresources/.
    • (2003)
    • Mitnick, K.1    Simon, W.L.2
  • 109
    • 37249037465 scopus 로고    scopus 로고
    • Security Metrics: replacing fear, uncertainty, and doubt
    • Addison Wesley, 2007
    • Jaquith, A. (2007) Security Metrics: replacing fear, uncertainty, and doubt, Addison Wesley, 2007.
    • (2007)
    • Jaquith, A.1
  • 110
    • 0003885423 scopus 로고    scopus 로고
    • Software Engineering
    • 9th Edition, Pearson
    • Sommerville, I. (2011) Software Engineering, 9th Edition, Pearson.
    • (2011)
    • Sommerville, I.1
  • 111
    • 0003625739 scopus 로고    scopus 로고
    • Software Engineering: Practitioner's Approach
    • 7th edition, McGraw Hill
    • Pressman, R. (2009) Software Engineering: Practitioner's Approach, 7th edition, McGraw Hill.
    • (2009)
    • Pressman, R.1
  • 112
    • 84892095254 scopus 로고    scopus 로고
    • Source Code Analysis Tools - Overview
    • Michael, C. and Lavenhar, S. R. (2005) Source Code Analysis Tools - Overview, https://buildsecurityin.us-cert.gov/bsi/articles/tools/code/263- BSI.html.
    • (2005)
    • Michael, C.1    Lavenhar, S.R.2
  • 113
    • 84891985621 scopus 로고    scopus 로고
    • SAMATE project at NIST-Software Assurance Metrics And Tool Evaluation
    • SAMATE
    • SAMATE (2005) SAMATE project at NIST-Software Assurance Metrics And Tool Evaluation, Source Code Security Analyzers, http://samate.nist.gov/index.php/Source_Code_Security_Analyzers.html.
    • (2005) Source Code Security Analyzers
  • 114
    • 84891976499 scopus 로고    scopus 로고
    • The use of formal social engineering techniques to identify weaknesses during a computer vulnerability competition
    • CCSC: Rocky Mountain Conference 2010
    • Kvedar, D. et al. (2010) The use of formal social engineering techniques to identify weaknesses during a computer vulnerability competition, CCSC: Rocky Mountain Conference 2010.
    • (2010)
    • Kvedar, D.1
  • 115
    • 0013080980 scopus 로고    scopus 로고
    • Computer security: art and science
    • Addison-Wesley
    • Bishop, M. (2003) computer security: art and science, Addison-Wesley.
    • (2003)
    • Bishop, M.1
  • 116
    • 0003563348 scopus 로고
    • Building a secure computer system
    • van Nostrand Reinhold New York Co
    • Gasser, M. (1988) Building a secure computer system, van Nostrand Reinhold New York Co.
    • (1988)
    • Gasser, M.1
  • 117
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer, J. H., and Schoeder, M. D. (1975) The protection of information in computer systems, Proceedings of the IEEE 63 (9): 1278-308.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schoeder, M.D.2
  • 118
    • 84891996022 scopus 로고    scopus 로고
    • The architecture tradeoff analysis method (ATAM)
    • ATAM, SEI
    • ATAM (2011) The architecture tradeoff analysis method (ATAM), SEI www.sei.cmu.edu/architecture/ata_method.html.
    • (2011)
  • 119
    • 25644452499 scopus 로고    scopus 로고
    • Architecture description markup language (ADML) creating open market for IT architecture tools
    • The open group, white paper
    • Spencer, J. (2000) Architecture description markup language (ADML) creating open market for IT architecture tools, The open group, white paper.
    • (2000)
    • Spencer, J.1
  • 120
    • 68349109439 scopus 로고    scopus 로고
    • Software architecture review: the state of practice
    • July
    • Babar, A. M. and Gorton, I. (2009) Software architecture review: the state of practice, IEEE Computer, Vol 42 No 7, July.
    • (2009) IEEE Computer , vol.42 , Issue.7
    • Babar, A.M.1    Gorton, I.2
  • 121
    • 70349441583 scopus 로고    scopus 로고
    • Software Architecture: Foundations, theory, and practice
    • Wiley, USA
    • Taylor, R., Medividovic, N., Dashofy, E. M. (2010) Software Architecture: Foundations, theory, and practice, Wiley, USA.
    • (2010)
    • Taylor, R.1    Medividovic, N.2    Dashofy, E.M.3
  • 122
    • 84891975346 scopus 로고    scopus 로고
    • Goodness of fit on software architecture
    • IEEE Software, Nov/Dec
    • Booch, G. (2006) Goodness of fit on software architecture, IEEE Software, Nov/Dec.
    • (2006)
    • Booch, G.1
  • 123
    • 57649151414 scopus 로고    scopus 로고
    • Software security engineering: a guide for project managers
    • Addison Wesley, 2008
    • Allen, J. H. et al. (2008) Software security engineering: a guide for project managers, Addison Wesley, 2008.
    • (2008)
    • Allen, J.H.1
  • 124
    • 0003885423 scopus 로고    scopus 로고
    • Software Engineering
    • 9th Edition, Pearson
    • Sommerville, I. (2011) Software Engineering, 9th Edition, Pearson.
    • (2011)
    • Sommerville, I.1
  • 125
    • 0003625739 scopus 로고    scopus 로고
    • Software Engineering: Practitioner's Approach
    • 7th edition, McGraw Hill
    • Pressman, R. (2009) Software Engineering: Practitioner's Approach, 7th edition, McGraw Hill.
    • (2009)
    • Pressman, R.1
  • 126
    • 70849083494 scopus 로고    scopus 로고
    • Activity and Artifact Views of a Secure Software Development Process
    • International Conference on Computational Science and Engineering
    • Umair, M., Kan, A., and Zulkernine, M. (2009) Activity and Artifact Views of a Secure Software Development Process, International Conference on Computational Science and Engineering.
    • (2009)
    • Umair, M.1    Kan, A.2    Zulkernine, M.3
  • 127
    • 84932090691 scopus 로고    scopus 로고
    • Software Components: Guidelines and Applications
    • Nova Scientific Publishers, NY, USA
    • Ramachandran, M. (2008) Software Components: Guidelines and Applications, Nova Scientific Publishers, NY, USA.
    • (2008)
    • Ramachandran, M.1
  • 128
    • 84892040866 scopus 로고    scopus 로고
    • Clusters and Security: Distributed Security for Distributed Systems
    • Open Systems Laboratory-Ericsson Research, National Center for Supercomputing Applications (NCSA) Presentation Slides
    • Pourzandi, M. et al. (2007) Clusters and Security: Distributed Security for Distributed Systems, Open Systems Laboratory-Ericsson Research, National Center for Supercomputing Applications (NCSA) Presentation Slides.
    • (2007)
    • Pourzandi, M.1
  • 129
    • 0010380353 scopus 로고    scopus 로고
    • Internet and intranet security
    • Artech House, Inc
    • Oppliger, R. (2002) Internet and intranet security, Artech House, Inc.
    • (2002)
    • Oppliger, R.1
  • 130
    • 0008390875 scopus 로고    scopus 로고
    • Hack attacks denied-a complete guide to network lockdown
    • John Wiley and Sons, Inc
    • Chirillo, J. (2001) Hack attacks denied-a complete guide to network lockdown, John Wiley and Sons, Inc.
    • (2001)
    • Chirillo, J.1
  • 131
    • 0003507850 scopus 로고    scopus 로고
    • Network security essentials-applications and standards
    • 2nd edition, Pearson Education, Inc
    • Stallings, W. (2003) Network security essentials-applications and standards, 2nd edition, Pearson Education, Inc.
    • (2003)
    • Stallings, W.1
  • 132
    • 84892132133 scopus 로고    scopus 로고
    • Web services: mostly secured already
    • Slide presentation
    • Dick, K. (2008) Web services: mostly secured already, Slide presentation http://www.webservicessummit.com/SDSIC/KSDSDSICSlides_files/frame.ht m.
    • (2008)
    • Dick, K.1
  • 133
    • 33947392597 scopus 로고    scopus 로고
    • Designing an integrated architecture for network content security gateways
    • IEEE Computer, Special Issue on Grid Computing and Web Services, November 2006
    • Lin, Y-D. et al. (2006) Designing an integrated architecture for network content security gateways, IEEE Computer, Special Issue on Grid Computing and Web Services, November 2006.
    • (2006)
    • Lin, Y.-D.1
  • 134
    • 39449099894 scopus 로고    scopus 로고
    • Security requirements for rest of us: a survey
    • Special Issue on Security and Agile requirement engineering methods, January/February
    • Tondel, I. A. et al. (2008) Security requirements for rest of us: a survey, IEEE Software, Special Issue on Security and Agile requirement engineering methods, January/February.
    • (2008) IEEE Software
    • Tondel, I.A.1
  • 135
    • 2342469291 scopus 로고    scopus 로고
    • Software Security: Building Security
    • March/April
    • McGraw, G. (2004) Software Security: Building Security In, IEEE Security and Privacy, March/April.
    • (2004) IEEE Security and Privacy
    • McGraw, G.1
  • 136
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre, G. and A. L. Opdahl (2005) Eliciting security requirements with misuse cases, Requirements Eng (2005) 10: 34-44.
    • (2005) Requirements Eng , vol.10 , Issue.2005 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 137
    • 57649151414 scopus 로고    scopus 로고
    • Software security engineering: A guide for project managers
    • Addison Wesley, SEI series, USA
    • Allen, J. et al. (2008) Software security engineering: A guide for project managers, Addison Wesley, SEI series, USA.
    • (2008)
    • Allen, J.1
  • 138
    • 33144456824 scopus 로고    scopus 로고
    • Software security: building security
    • in, Addison Wesley, USA
    • McGraw, G. (2006) Software security: building security in, Addison Wesley, USA.
    • (2006)
    • McGraw, G.1
  • 139
    • 49049087976 scopus 로고    scopus 로고
    • Analysis and Component-based Realization of Security Requirements
    • The Third International Conference on Availability, Reliability and Security, IEEE CS Press
    • Hatebur, D. Heisel, M. Schmidt, H. (2008) Analysis and Component-based Realization of Security Requirements, The Third International Conference on Availability, Reliability and Security, IEEE CS Press.
    • (2008)
    • Heisel, H.D.1    Schmidt, M.H.2
  • 140
    • 0003920373 scopus 로고    scopus 로고
    • UML Components
    • Addison Wesley
    • Cheesman, J. and Daniels, J. (2000) UML Components, Addison Wesley.
    • (2000)
    • Cheesman, J.1    Daniels, J.2
  • 141
    • 0003854752 scopus 로고    scopus 로고
    • Objects, components and frameworks with UML
    • Addison Wesley
    • D'Souza and Wills (1999) Objects, components and frameworks with UML, Addison Wesley.
    • (1999)
    • D'Souza1    Wills2
  • 142
    • 0004181453 scopus 로고    scopus 로고
    • Component-Based Software Engineering
    • Addison Wesley
    • Heineman, G. T. and Councill, W. T. (2001) Component-Based Software Engineering, Addison Wesley.
    • (2001)
    • Heineman, G.T.1    Councill, W.T.2
  • 143
    • 84892054192 scopus 로고    scopus 로고
    • Special issue on Software components
    • IEEE SW, IEEE Software, September 1998
    • IEEE SW (1998) Special issue on Software components, IEEE Software, September 1998.
    • (1998)
  • 144
    • 84891963074 scopus 로고    scopus 로고
    • Reuse of off-the-shelf components: 9th international conference on software reuse
    • ICSR 2006, Turin, Italy, June 12-15, 2006, Springer Verlog Lecture Notes
    • Morisio, M. (2006) (ed.). Reuse of off-the-shelf components: 9th international conference on software reuse, ICSR 2006, Turin, Italy, June 12-15, 2006, Springer Verlog Lecture Notes.
    • (2006)
    • Morisio, M.1
  • 145
    • 84892120108 scopus 로고    scopus 로고
    • SE, 6th Edition
    • Pressman, McGraw Hill
    • Pressman (2005) SE, 6th Edition, McGraw Hill.
    • (2005)
  • 146
    • 0003885423 scopus 로고    scopus 로고
    • Software Engineering
    • 7th Edition, Addison Wesley
    • Sommerville, I. (2005) Software Engineering, 7th Edition, Addison Wesley.
    • (2005)
    • Sommerville, I.1
  • 147
    • 0004142101 scopus 로고    scopus 로고
    • Component Software
    • Addison Wesley
    • Szyperski, C. (1998) Component Software, Addison Wesley.
    • (1998)
    • Szyperski, C.1
  • 148
    • 84932090691 scopus 로고    scopus 로고
    • Software Components: Guidelines and Applications
    • Nova Scientific Publishers, NY, USA
    • Ramachandran, M. (2008) Software Components: Guidelines and Applications, Nova Scientific Publishers, NY, USA.
    • (2008)
    • Ramachandran, M.1
  • 149
    • 84892016273 scopus 로고
    • Good program design
    • 1979, Prentice-Hall
    • Parnas, L. (1979) Good program design, 1979, Prentice-Hall.
    • (1979)
    • Parnas, L.1
  • 150
    • 84892064928 scopus 로고
    • Selected writings on computing: a personal perspective
    • ACM Classic Books Series, 1982
    • Dijkstra, E. W. (1979) Selected writings on computing: a personal perspective, ACM Classic Books Series, 1982.
    • (1979)
    • Dijkstra, E.W.1
  • 151
    • 0004085484 scopus 로고    scopus 로고
    • COM and DCOM
    • Wiley
    • Sessions, R. (1998) COM and DCOM, Wiley.
    • (1998)
    • Sessions, R.1
  • 152
    • 0003885423 scopus 로고    scopus 로고
    • Software Engineering
    • 7th Edition, Addison Wesley
    • Sommerville, I. (2005) Software Engineering, 7th Edition, Addison Wesley.
    • (2005)
    • Sommerville, I.1
  • 153
    • 84891983746 scopus 로고
    • Software reuse assessment
    • First Intl. workshop on software reuse, Germany
    • Ramachandran, M. and Sommerville (1992) Software reuse assessment, First Intl. workshop on software reuse, Germany.
    • (1992)
    • Ramachandran, M.1    Sommerville2
  • 154
    • 2442503135 scopus 로고    scopus 로고
    • A Handbook of Software and Systems Engineering
    • Addison Wesley
    • Endres, A. and Rombach, D. (2003) A Handbook of Software and Systems Engineering, Addison Wesley.
    • (2003)
    • Endres, A.1    Rombach, D.2
  • 155
    • 84892003013 scopus 로고
    • Concurrent programs
    • Prentice-Hall
    • Hoare, T. (1979) Concurrent programs, Prentice-Hall.
    • (1979)
    • Hoare, T.1
  • 156
    • 0003917832 scopus 로고    scopus 로고
    • Requirements Engineering: Good Practice Guidelines
    • Wiley
    • Sommerville, I. and Sawyer, P. (1995) Requirements Engineering: Good Practice Guidelines, Wiley.
    • (1995)
    • Sommerville, I.1    Sawyer, P.2
  • 157
    • 49049087976 scopus 로고    scopus 로고
    • Analysis and Component-based Realization of Security Requirements
    • The Third International Conference on Availability, Reliability and Security (ARES'08), IEEE CS Press
    • Hatebur, D., Heisel, M., Schmidt, H. (2008) Analysis and Component-based Realization of Security Requirements, The Third International Conference on Availability, Reliability and Security (ARES'08), IEEE CS Press.
    • (2008)
    • Hatebur, D.1    Heisel, M.2    Schmidt, H.3
  • 159
    • 0007863633 scopus 로고    scopus 로고
    • A Framework for an Active Interface to Characterize Compositional Security Contracts of Software Components
    • Proceedings of the 13th Australian Software Engineering Conference (ASWEC'01)
    • Khan, K., Han, J. and Zheng, Y. (2001) A Framework for an Active Interface to Characterize Compositional Security Contracts of Software Components, Proceedings of the 13th Australian Software Engineering Conference (ASWEC'01).
    • (2001)
    • Khan, K.1    Han, J.2    Zheng, Y.3
  • 160
    • 78650865094 scopus 로고    scopus 로고
    • A Comprehensive Interface Definition Framework for Software Components
    • IEEE Proceedings of the 1998 Asia-Pacific Software Engineering Conference, Taipei, December
    • Han, J. (1998) A Comprehensive Interface Definition Framework for Software Components, IEEE Proceedings of the 1998 Asia-Pacific Software Engineering Conference, Taipei, December.
    • (1998)
    • Han, J.1
  • 161
    • 33747259074 scopus 로고    scopus 로고
    • The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software
    • Microsoft Press
    • Howard, M. and Lipner, S. (2006) The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software, Microsoft Press.
    • (2006)
    • Howard, M.1    Lipner, S.2
  • 162
    • 0003416497 scopus 로고    scopus 로고
    • Securing Java: getting down to business with mobile code
    • John Wiley and Sons, USA
    • McGraw, G. and Felton, E. W. (1999) Securing Java: getting down to business with mobile code, John Wiley and Sons, USA.
    • (1999)
    • McGraw, G.1    Felton, E.W.2
  • 163
    • 35348824361 scopus 로고    scopus 로고
    • The art of software security assessment: Identifying and preventing software vulnerabilities
    • Addison Wesley
    • Dowd, M., McDonald, J., and Schuh, J. (2007) The art of software security assessment: Identifying and preventing software vulnerabilities, Addison Wesley.
    • (2007)
    • Dowd, M.1    McDonald, J.2    Schuh, J.3
  • 164
    • 84932090691 scopus 로고    scopus 로고
    • Software Components: Guidelines and Applications
    • Nova Scientific Publishers, NY, USA
    • Ramachandran, M. (2008) Software Components: Guidelines and Applications, Nova Scientific Publishers, NY, USA.
    • (2008)
    • Ramachandran, M.1
  • 165
    • 84892094711 scopus 로고    scopus 로고
    • Architecture and security design principles
    • ASP.NET, accessed on 12th February
    • ASP.NET (2011) architecture and security design principles http://msdn. microsoft.com/en-us/library/yedba920.aspx, accessed on 12th February
    • (2011)
  • 166
    • 84891978048 scopus 로고    scopus 로고
    • Web-services Security: What's Required To Secure A Service- Oriented Architecture
    • Oracle
    • Oracle (2010) Web-services Security: What's Required To Secure A Service- Oriented Architecture.
    • (2010)
  • 167
    • 84892138341 scopus 로고    scopus 로고
    • Software Development Guidelines
    • Hyde, R. (2000) Software Development Guidelines, http://webster.cs.ucr.edu/ Page_softeng/softDevGuide_contents.html.
    • (2000)
    • Hyde, R.1
  • 168
    • 84891991729 scopus 로고    scopus 로고
    • Secure Coding Guidelines for the Java Programming Language, Version 3.0
    • SecureJava, accessed on February 14th
    • SecureJava (2011) Secure Coding Guidelines for the Java Programming Language, Version 3.0, http://www.oracle.com/technetwork/java/seccode guide-139067.html, accessed on February 14th.
    • (2011)
  • 169
    • 0003925663 scopus 로고    scopus 로고
    • Building Secure Software: How to Avoid Security Problems the Right Way
    • Boston: Addison-Wesley
    • Viega, J. and McGraw, G. (2002) Building Secure Software: How to Avoid Security Problems the Right Way, Boston: Addison-Wesley.
    • (2002)
    • Viega, J.1    McGraw, G.2
  • 170
    • 0004104224 scopus 로고    scopus 로고
    • Effective Java Programming Language Guide
    • 2nd ed, Addison-Wesley Professional
    • Bloch, J. (2008) Effective Java Programming Language Guide, 2nd ed, Addison-Wesley Professional.
    • (2008)
    • Bloch, J.1
  • 171
    • 35348829230 scopus 로고    scopus 로고
    • The art of software security testing
    • Addison Wesley
    • Wysopal, C. et al. (2007) The art of software security testing, Addison Wesley.
    • (2007)
    • Wysopal, C.1
  • 172
    • 34548730452 scopus 로고    scopus 로고
    • Software Testing and Analysis-Process, Principles, and Techniques
    • John Wiley and Sons, USA
    • Pezze, M. and Young, M. (2008) Software Testing and Analysis-Process, Principles, and Techniques, John Wiley and Sons, USA.
    • (2008)
    • Pezze, M.1    Young, M.2
  • 173
    • 35348829230 scopus 로고    scopus 로고
    • The art of software security testing
    • Addison Wesley
    • Wysopal, C. et al. (2007) The art of software security testing, Addison Wesley.
    • (2007)
    • Wysopal, C.1
  • 174
    • 84892028186 scopus 로고    scopus 로고
    • Junit with Jtest, Parasoft tools
    • Ellswork, C. and Dunlop, C. (2009) Junit with Jtest, Parasoft tools, http://www.devx.com/Java/Article/15625/0/page/2.
    • (2009)
    • Ellswork, C.1    Dunlop, C.2
  • 175
    • 84892072552 scopus 로고    scopus 로고
    • Jtest
    • Jtest (2011) http://www.parasoft.com/jsp/products/jtest.jsp;jsessionid=aaa5Jg ObObp7fo?redname=java_staticanalysis_unittestingandreferred=java_stati canalysis_unittesting.
    • (2011)
  • 176
    • 0003580125 scopus 로고    scopus 로고
    • Software Reuse: Architecture, Process and Organization for Business Success
    • Addison Wesley
    • Jacobson, I. et al. (1997) Software Reuse: Architecture, Process and Organization for Business Success, Addison Wesley.
    • (1997)
    • Jacobson, I.1
  • 177
    • 84892081326 scopus 로고    scopus 로고
    • The Most Important Design Guideline? IEEE Software
    • July/August 2004
    • Meyers, S. (2004) The Most Important Design Guideline? IEEE Software, July/August 2004.
    • (2004)
    • Meyers, S.1
  • 178
    • 1542376923 scopus 로고    scopus 로고
    • Use Case-based Testing of Product Lines
    • ACM SIGSOFT Software Engineering Notes, September 2003
    • Bertolino, A., Gnesi, S. (2003) Use Case-based Testing of Product Lines, ACM SIGSOFT Software Engineering Notes, September 2003.
    • (2003)
    • Bertolino, A.1    Gnesi, S.2
  • 179
    • 49049107220 scopus 로고    scopus 로고
    • Software Security Assurance
    • State-of-the-Art Report (SOAR) July 31, 2007, Published by IATAC and DACS
    • Goertzel, K. M. et al. (2007) Software Security Assurance, State-of-the-Art Report (SOAR) July 31, 2007, Published by IATAC and DACS.
    • (2007)
    • Goertzel, K.M.1
  • 180
    • 0004097670 scopus 로고
    • Software Testing Techniques
    • Van Nost. Reinhold; 2 edition (Jun 1990)
    • Beizer, B. (1990) Software Testing Techniques, Van Nost. Reinhold; 2 edition (Jun 1990).
    • (1990)
    • Beizer, B.1
  • 181
    • 0013347631 scopus 로고    scopus 로고
    • Common Vulnerabilities and Exposures (CVE) List
    • Mitre Corporation, Retrieved. November 22, accessible at
    • Mitre Corporation (2004) Common Vulnerabilities and Exposures (CVE) List. Retrieved. November 22, accessible at http://www.cve.mitre.org/cve/downloads/.
    • (2004)
  • 182
    • 40449092394 scopus 로고    scopus 로고
    • Applying Formal Methods to a Certifiably Secure Software System
    • JANUARY/FEBRUARY
    • Heitmeyer, C. L. et al. (2008) Applying Formal Methods to a Certifiably Secure Software System, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 34, NO. 1, JANUARY/FEBRUARY.
    • (2008) IEEE TRANSACTIONS ON SOFTWARE ENGINEERING , vol.34 , Issue.1
    • Heitmeyer, C.L.1
  • 183
    • 33846230206 scopus 로고    scopus 로고
    • Application of Lightweight Formal Methods to Software Security
    • Proceedings of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)
    • Gilliam, P. D. et al. (2005) Application of Lightweight Formal Methods to Software Security, Proceedings of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).
    • (2005)
    • Gilliam, P.D.1
  • 184
    • 62349084005 scopus 로고    scopus 로고
    • An Attack Scenario-based Approach for Software Security Testing at Design Stage
    • International Symposium on Computer Science and Computational Technology, IEEE CS Press
    • He, K. et al. (2008) An Attack Scenario-based Approach for Software Security Testing at Design Stage, International Symposium on Computer Science and Computational Technology, IEEE CS Press.
    • (2008)
    • He, K.1
  • 185
    • 84892033891 scopus 로고    scopus 로고
    • Developing Secure Applications: Best Practices for Writing Secure Code
    • Boca Raton, Fla.: Auerbach, ISBN 0849319900
    • Trocino, D. P. (2004) Developing Secure Applications: Best Practices for Writing Secure Code. Boca Raton, Fla.: Auerbach, ISBN 0849319900.
    • (2004)
    • Trocino, D.P.1
  • 186
    • 84892076566 scopus 로고    scopus 로고
    • Secure programmer: Developing secure programs
    • August 21, 2003
    • Wheeler, D. A. (2003) Secure programmer: Developing secure programs (August 21, 2003).
    • (2003)
    • Wheeler, D.A.1
  • 187
    • 84892115995 scopus 로고    scopus 로고
    • Secure Software Development and Code Analysis Tools
    • GIAC Certification: Practical Assignment v1.4b, Option 1, SANS Institute
    • La, T. (2003) Secure Software Development and Code Analysis Tools. GIAC Certification: Practical Assignment v1.4b, Option 1, SANS Institute.
    • (2003)
    • La, T.1
  • 188
    • 84891990490 scopus 로고    scopus 로고
    • Testing Code Security
    • Auerbach Publications
    • Linden, van der, M. A. (2007) Testing Code Security, Auerbach Publications.
    • (2007)
    • Linden van der, M.A.1
  • 189
    • 84892097705 scopus 로고    scopus 로고
    • Penetration Testing
    • MSDN Magazine, May
    • Whittaker, A. J. (2008) Penetration Testing, http://msdn.microsoft.com/enus/magazine/cc507646.aspx, MSDN Magazine, May.
    • (2008)
    • Whittaker, A.J.1
  • 190
    • 72349095448 scopus 로고    scopus 로고
    • A Penetration Testing Method for E-Commerce Authentication System Security
    • International Conference on Management of e-Commerce and e-Government, Nanchang, China
    • Pan, W. and Li, W. (2009) A Penetration Testing Method for E-Commerce Authentication System Security, International Conference on Management of e-Commerce and e-Government, Nanchang, China.
    • (2009)
    • Pan, W.1    Li, W.2
  • 191
    • 35348824361 scopus 로고    scopus 로고
    • The Art of Software Security Assessment-Identifying and Preventing Software Vulnerabilities
    • Addison Wesley
    • Dowd, M., McDonald, J., and Schuh, J. (2006) The Art of Software Security Assessment-Identifying and Preventing Software Vulnerabilities, Addison Wesley.
    • (2006)
    • Dowd, M.1    McDonald, J.2    Schuh, J.3
  • 192
    • 84892083504 scopus 로고    scopus 로고
    • Software security testing, special issue on building security
    • September/October
    • Potter, B., Hamilton, B. A., and McGraw, G. (2004) Software security testing, special issue on building security in, IEEE Security and Privacy, September/October.
    • (2004) IEEE Security and Privacy
    • Potter, B.1    Hamilton, B.A.2    McGraw, G.3
  • 193
    • 48749099042 scopus 로고    scopus 로고
    • Development of a Software Security Assessment Instrument to Reduce Software Security Risk
    • Proceedings of the 10th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'01)
    • Gilliam, P. D. et al. (2001) Development of a Software Security Assessment Instrument to Reduce Software Security Risk, Proceedings of the 10th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'01).
    • (2001)
    • Gilliam, P.D.1
  • 194
    • 49249107627 scopus 로고    scopus 로고
    • Architectural Risk Analysis of Software Systems Based on Security Patterns
    • JULY-SEPTEMBER
    • Halkidis, S. T. (2008) Architectural Risk Analysis of Software Systems Based on Security Patterns, IEEE Transactions On Dependable And Secure Computing, VOL. 5, NO. 3, JULY-SEPTEMBER.
    • (2008) IEEE Transactions On Dependable And Secure Computing , vol.5 , Issue.3
    • Halkidis, S.T.1
  • 195
    • 84892081112 scopus 로고    scopus 로고
    • Network Mapper Tool for scanning network ports for security
    • Nmap
    • Nmap (2011) Network Mapper Tool for scanning network ports for security, http://nmap.org/.
    • (2011)
  • 197
    • 84898587672 scopus 로고    scopus 로고
    • APC Legendary Reliability Physical Security of Data Centers and network Rooms
    • Christopher, L. (2005) APC Legendary Reliability Physical Security of Data Centers and network Rooms. Fundamental Principles of Network Security, pp.4-10.
    • (2005) Fundamental Principles of Network Security , pp. 4-10
    • Christopher, L.1
  • 198
    • 0347542044 scopus 로고    scopus 로고
    • Introduction to Network security
    • Curtin, M. (1997) Introduction to Network security, http://www.interhack. net/pubs/network-security/.
    • (1997)
    • Curtin, M.1
  • 199
    • 84891967965 scopus 로고    scopus 로고
    • House of Lords Science and Technology Committee
    • House of Lords, August
    • House of Lords (2007) House of Lords Science and Technology Committee, Personal Internet Security, vol.1, August, pp.13-27. http://www. publications.parliament.uk/pa/ld200607/ldselect/ldsctech/165/165i.pdf. http://www.iss.net/documents/whitepapers/ISS_Preemptive_Host_Protection_ Whitepaper.pdf.
    • (2007) Personal Internet Security , vol.1 , pp. 13-27
  • 201
    • 84892109313 scopus 로고
    • Internet Firewall and Network Security
    • New Riders Publishing
    • Karanjit, S. and Chris, H. (1994) Internet Firewall and Network Security. New Riders Publishing.
    • (1994)
    • Karanjit, S.1    Chris, H.2
  • 202
    • 77957814219 scopus 로고    scopus 로고
    • A Guide to Computer Network Security
    • Springer, London
    • Kizza, J. M. (2009) A Guide to Computer Network Security, Springer, London.
    • (2009)
    • Kizza, J.M.1
  • 203
    • 1542298711 scopus 로고    scopus 로고
    • Wireless Security
    • Merritt, M. and David, P. (2002) Wireless Security.
    • (2002)
    • Merritt, M.1    David, P.2
  • 204
    • 84892002596 scopus 로고    scopus 로고
    • The Future of Internet (2009)
    • Papadimitriou, D. et al. (2009) The Future of Internet (2009) http://www.future-internet.eu/fileadmin/documents/reports/Cross- ETPs_FI_Vision_ Document_v1_0.pdf.
    • (2009)
    • Papadimitriou, D.1
  • 205
    • 1642405101 scopus 로고    scopus 로고
    • Wireless security Model Threads Solutions
    • McGraw-Hill Telecom
    • Randall, N. K. and L., C., Panos (2002) Wireless security Model Threads Solutions. McGraw-Hill Telecom.
    • (2002)
    • Randall, N.K.1    Panos, L.C.2
  • 206
    • 11144331510 scopus 로고    scopus 로고
    • Incident Response: Computer Forensics Toolkit
    • Wiley, USA
    • Schweitzer, D. (2003) Incident Response: Computer Forensics Toolkit, Wiley, USA.
    • (2003)
    • Schweitzer, D.1
  • 207
    • 0003945978 scopus 로고    scopus 로고
    • SNMP, SNMPv2, SNMPv3, and RMON 1 and 2/William Stallings
    • Harlow, Addison Wesley
    • Stallings, W. (1999) SNMP, SNMPv2, SNMPv3, and RMON 1 and 2/William Stallings. Harlow, Addison Wesley.
    • (1999)
    • Stallings, W.1
  • 208
    • 0003507850 scopus 로고    scopus 로고
    • Network Security Essentials
    • 2nded. Pearson Education INC
    • Stallings, W. (2003) Network Security Essentials. 2nded. Pearson Education INC.
    • (2003)
    • Stallings, W.1
  • 209
    • 84892040866 scopus 로고    scopus 로고
    • Clusters and Security: Distributed Security for Distributed Systems
    • Open Systems Laboratory-Ericsson Research, National Center for Supercomputing Applications (NCSA) Presentation Slides
    • Pourzandi, M. et al. (2007) Clusters and Security: Distributed Security for Distributed Systems, Open Systems Laboratory-Ericsson Research, National Center for Supercomputing Applications (NCSA) Presentation Slides.
    • (2007)
    • Pourzandi, M.1
  • 210
    • 0010380353 scopus 로고    scopus 로고
    • Internet and intranet security
    • Artech House, Inc
    • Oppliger, R. (2002) Internet and intranet security, Artech House, Inc.
    • (2002)
    • Oppliger, R.1
  • 211
    • 0008390875 scopus 로고    scopus 로고
    • Hack attacks denied-a complete guide to network lockdown
    • John Wiley and Sons, Inc
    • Chirillo, J. (2001) Hack attacks denied-a complete guide to network lockdown, John Wiley and Sons, Inc.
    • (2001)
    • Chirillo, J.1
  • 212
    • 0003507850 scopus 로고    scopus 로고
    • Network security essentials-applications and standards
    • 2nd edition, Pearson Education, Inc
    • Stallings, W. (2003) Network security essentials-applications and standards, 2nd edition, Pearson Education, Inc.
    • (2003)
    • Stallings, W.1
  • 213
    • 84892008340 scopus 로고    scopus 로고
    • Web services: mostly secured already, Slide presentation
    • Dick, K. (2008) Web services: mostly secured already, Slide presentation. http://www.webservicessummit.com/SDSIC/KSDSDSICSlides_files/frame.htm.
    • (2008)
    • Dick, K.1
  • 214
    • 33947392597 scopus 로고    scopus 로고
    • Designing an integrated architecture for network content security gateways
    • IEEE Computer, Special Issue on Grid Computing and Web Services, November 2006
    • Lin, Y-D. et al. (2006) Designing an integrated architecture for network content security gateways, IEEE Computer, Special Issue on Grid Computing and Web Services, November 2006.
    • (2006)
    • Lin, Y.-D.1
  • 215
    • 84892054439 scopus 로고    scopus 로고
    • The Security of Web Services as Software, CrossTalk
    • September
    • Goertzel, K. M. (2007) The Security of Web Services as Software, CrossTalk, September, http://www.stsc.hill.af.mil/crossTalk/2007/09/0709Goertzel. html.
    • (2007)
    • Goertzel, K.M.1
  • 216
    • 65949084989 scopus 로고    scopus 로고
    • Web-Services Engineering: Promises and Challenges
    • ICSE'02, May 19-25, Orlando, Florida, USA
    • Aoyama, M. et al. (2002) Web-Services Engineering: Promises and Challenges, ICSE'02, May 19-25, Orlando, Florida, USA.
    • (2002)
    • Aoyama, M.1
  • 217
    • 33750108824 scopus 로고    scopus 로고
    • Audition of web services for testing conformance to open specified protocols
    • J. Stafford et al., eds, Springer, 2006
    • Bertolino, A. et al. (2006) Audition of web services for testing conformance to open specified protocols, J. Stafford et al., eds., Architecting systems with trustworthy components, Springer, 2006.
    • (2006) Architecting systems with trustworthy components
    • Bertolino, A.1
  • 218
    • 84892001317 scopus 로고    scopus 로고
    • Cloud Expo Article, Cloud Computing: Understanding Infrastructure as a Service
    • January
    • Bias, R. (2009), Cloud Expo Article, Cloud Computing: Understanding Infrastructure as a Service, Cloud computing journal, http://cloudcomputing.sys-con.com/node/807481, January.
    • (2009) Cloud computing journal
    • Bias, R.1
  • 219
    • 58549100358 scopus 로고    scopus 로고
    • A research manifesto for services science, Special Issue on Services Science
    • CACM, July 2006
    • Chesbrough, H., and Spohrer, J. (2006) A research manifesto for services science, Special Issue on Services Science, CACM, July 2006, Vol.49/No. 7.
    • (2006) , vol.49 , Issue.7
    • Chesbrough, H.1    Spohrer, J.2
  • 220
    • 84892045672 scopus 로고    scopus 로고
    • Cobweb
    • Cobweb (2009) http://www.cobweb.com/.
    • (2009)
  • 222
    • 4644300495 scopus 로고    scopus 로고
    • Service-oriented architecture: concepts, technology, and design
    • Prentice Hall
    • Erl, T. (2005) Service-oriented architecture: concepts, technology, and design, Prentice Hall.
    • (2005)
    • Erl, T.1
  • 223
    • 84891982892 scopus 로고    scopus 로고
    • What are web services?
    • Special Issue, CACM, June, V46/N6. For Software Testing, International Journal of Computer Science and Information Security (IJCSIS)
    • Farrell, J., and Ferris, C. (2003), What are web services? Special Issue, CACM, June, V46/N6. For Software Testing, International Journal of Computer Science and Information Security (IJCSIS), Vol. 7, No. 3, 2010.
    • (2003) , vol.7 , Issue.3
    • Farrell, J.1    Ferris, C.2
  • 224
    • 84892009533 scopus 로고    scopus 로고
    • Creating business value through flexible IT architecture, Special Issue on Service-oriented Computing
    • November 2007
    • Helbig, J. (2007) Creating business value through flexible IT architecture, Special Issue on Service-oriented Computing, IEEE Computer, V.40, No.11, November 2007.
    • (2007) IEEE Computer , vol.40 , Issue.11
    • Helbig, J.1
  • 225
    • 84892128755 scopus 로고    scopus 로고
    • Cloud computing world forum
    • IaaS
    • IaaS (2010) Cloud computing world forum, http://www.cloudwf.com/iaas.html.
    • (2010)
  • 226
    • 84891979110 scopus 로고    scopus 로고
    • Video whitepaper
    • IThound
    • IThound (2010) Video whitepaper http://images.vnunet.com/video_ WP/V4.htm.
    • (2010)
  • 227
    • 84892127084 scopus 로고    scopus 로고
    • Interoperable security service standards for web services
    • IT pro, IEEE CS Press, December
    • Lakshminarayanan, S. (2010) Interoperable security service standards for web services, IT pro, IEEE CS Press, December.
    • (2010)
    • Lakshminarayanan, S.1
  • 228
    • 84902323044 scopus 로고    scopus 로고
    • Realizing service-centric software systems
    • Special issue on SoC, IEEE Software, November/December 2007
    • Nano, O. and Zisman, A. (2007) Realizing service-centric software systems, Special issue on SoC, IEEE Software, November/December 2007.
    • (2007)
    • Nano, O.1    Zisman, A.2
  • 229
    • 69949114230 scopus 로고    scopus 로고
    • Computer in the cloud, technology review
    • Naone, E. (2007) Computer in the cloud, technology review, http://www.technologyreview.com/Infotech/19397/?a=f.
    • (2007)
    • Naone, E.1
  • 230
    • 84892101758 scopus 로고    scopus 로고
    • NIST
    • NIST (2009) http://csrc.nist.gov/groups/SNS/cloud-computing/index.html.
    • (2009)
  • 231
    • 84891998831 scopus 로고    scopus 로고
    • Types of PaaS solutions
    • PaaS
    • PaaS (2010) Types of PaaS solutions http://www.salesforce.com/uk/paas/paassolutions/.
    • (2010)
  • 232
    • 36749060136 scopus 로고    scopus 로고
    • Service-oriented computing: state-of-the-art and research challenges, Special Issue on Service-oriented Computing
    • November 2007
    • Papazoglou, P. M. et al. (2007) Service-oriented computing: state-of-the-art and research challenges, Special Issue on Service-oriented Computing, IEEE Computer, V.40, No.11, November 2007.
    • (2007) IEEE Computer , vol.40 , Issue.11
    • Papazoglou, P.M.1
  • 233
    • 84932090691 scopus 로고    scopus 로고
    • Software components: guidelines and applications
    • Nova Publishers, NY
    • Ramachandran, M. (2008) Software components: guidelines and applications, Nova Publishers, NY.
    • (2008)
    • Ramachandran, M.1
  • 234
    • 84891977745 scopus 로고    scopus 로고
    • SaaS
    • SaaS
    • SaaS (2009) SaaS http://www.saas.co.uk/.
    • (2009)
  • 235
    • 84892122410 scopus 로고    scopus 로고
    • 2020 Science Group: Toward 2020 science
    • Science Group, tech.report, Microsoft, 2006
    • Science Group (2006), 2020 Science Group: Toward 2020 science, tech.report, Microsoft, 2006; http://research.microsoft.com/towards2020 science/downloads/T2020S_Report.pdf.
    • (2006)
  • 236
    • 84891980214 scopus 로고    scopus 로고
    • Self-organization: paradigms and applications, engineering self-organizing systems: Nature-Inspired approaches to software engineering
    • Springer, 2004
    • Serugendo, G., et al. (2004) Self-organization: paradigms and applications, engineering self-organizing systems: Nature-Inspired approaches to software engineering, Springer, 2004.
    • (2004)
    • Serugendo, G.1
  • 237
    • 70449475268 scopus 로고    scopus 로고
    • A Flexible Business Process Customization Framework for SaaS
    • WASE International Conference on Information Engineering, July, China
    • Taiyuan, S. (2009) A Flexible Business Process Customization Framework for SaaS, WASE International Conference on Information Engineering, July, China.
    • (2009)
    • Taiyuan, S.1
  • 238
    • 70849101026 scopus 로고    scopus 로고
    • RESTful web services
    • Tyagi, S. (2006) RESTful web services, http://www.oracle.com/technetwork/articles/javase/index-137171.html.
    • (2006)
    • Tyagi, S.1
  • 239
    • 84892133310 scopus 로고    scopus 로고
    • A Model of Cloud-based Application Environment
    • Venkataraman, T. et al. (2010) A Model of Cloud-based Application Environment.
    • (2010)
    • Venkataraman, T.1
  • 240
    • 84892129078 scopus 로고    scopus 로고
    • Verizon, October
    • Verizon (2010), http://www.zdnet.co.uk/news/cloud/2010/10/08/the-cloudlessons- from-history-40090471/, October.
    • (2010)
  • 242
    • 84892018599 scopus 로고    scopus 로고
    • Microsoft Office as a Platform for Software + Services
    • Wilson, C., and Josephson, A. (2007) Microsoft Office as a Platform for Software + Services, The Architecture Journal, No.13, www. architecturejournal.net.
    • (2007) The Architecture Journal , Issue.13
    • Wilson, C.1    Josephson, A.2
  • 243
    • 77952710722 scopus 로고    scopus 로고
    • Scientific Cloud Computing: Early Definition and Experience
    • Wang, L., and Laszewski, V. G (2008) Scientific Cloud Computing: Early Definition and Experience, http://cyberaide.googlecode.com/svn/trunk/papers/08-cloud/vonLaszewski-08-cloud.pdf.
    • (2008)
    • Wang, L.1    Laszewski, V.G.2
  • 244
    • 4243114029 scopus 로고    scopus 로고
    • Web-service componentization
    • CACM, October Vol 46/N 10
    • Yang, J. (2003) Web-service componentization, CACM, October Vol 46/N 10.
    • (2003)
    • Yang, J.1
  • 245
    • 70449464802 scopus 로고    scopus 로고
    • CCOA: Cloud Computing Open Architecture
    • IEEE International Conference on Web Services
    • Zhang, L-J., and Zhou, Q (2009) CCOA: Cloud Computing Open Architecture, IEEE International Conference on Web Services.
    • (2009)
    • Zhang, L.-J.1    Zhou, Q.2
  • 246
    • 84892081501 scopus 로고    scopus 로고
    • Architecture-Centered ERP Systems in the Manufacturing Domain
    • Nivot, USA
    • Alleman, G. B. (2002) Architecture-Centered ERP Systems in the Manufacturing Domain, Nivot, USA.
    • (2002)
    • Alleman, G.B.1
  • 247
    • 84892034895 scopus 로고    scopus 로고
    • Amr
    • Amr (2008) www.amrresearch.com.
    • (2008)
  • 248
    • 84892042304 scopus 로고    scopus 로고
    • Implementation issues in ERP
    • 1st Intl. Conference on Systems Thinking in Management
    • Appuswamy, R. (2000) Implementation issues in ERP, 1st Intl. Conference on Systems Thinking in Management.
    • (2000)
    • Appuswamy, R.1
  • 249
    • 0007308675 scopus 로고    scopus 로고
    • The Current state of CBSE
    • September/October 1998
    • Brown, A. W. and Wallnau, K. C. (1998) The Current state of CBSE, September/October 1998.
    • (1998)
    • Brown, A.W.1    Wallnau, K.C.2
  • 250
    • 0003920373 scopus 로고    scopus 로고
    • UML Components
    • Addison Wesley
    • Cheesman, J. and Daniels, J. (2000) UML Components, Addison Wesley.
    • (2000)
    • Cheesman, J.1    Daniels, J.2
  • 251
    • 84892016464 scopus 로고    scopus 로고
    • Component-Based Software Development Lifecycles
    • Karlstad University, Institution for Information technology, Sweden
    • Christiansson, B. and Jacobsson, L. Component-Based Software Development Lifecycles, Karlstad University, Institution for Information technology, Sweden, 1999.
    • (1999)
    • Christiansson, B.1    Jacobsson, L.2
  • 252
    • 0003854752 scopus 로고    scopus 로고
    • Objects, components and frameworks with UML
    • Addison Wesley
    • D'Souza and Wills (1999) Objects, components and frameworks with UML, Addison Wesley.
    • (1999)
    • D'Souza1    Wills2
  • 253
    • 0032112063 scopus 로고    scopus 로고
    • Putting the enterprise into the enterprise system
    • July-August
    • Davenport, T. H. (1998) Putting the enterprise into the enterprise system, Harvard Business Review, pp. 121-131, July-August.
    • (1998) Harvard Business Review , pp. 121-131
    • Davenport, T.H.1
  • 254
    • 84892079462 scopus 로고    scopus 로고
    • A Three-tier Software Architecture for Manufacturing Activity Control in ERP Concept
    • International Conference on Computer Systems and Technologies- CompSysTech' 2005
    • Dumbrava, S., Panescu, D. and Costin, M. (2005) A Three-tier Software Architecture for Manufacturing Activity Control in ERP Concept, International Conference on Computer Systems and Technologies- CompSysTech' 2005.
    • (2005)
    • Dumbrava, S.1    Panescu, D.2    Costin, M.3
  • 255
    • 0003923066 scopus 로고    scopus 로고
    • Software Metrics: Establishing a Companywide program
    • Prentice Hall
    • Grady, R. and Caswell, D. (1999) Software Metrics: Establishing a Companywide program, Prentice Hall.
    • (1999)
    • Grady, R.1    Caswell, D.2
  • 256
    • 0032628083 scopus 로고    scopus 로고
    • A Critical success factor model for ERP implementation
    • May/June
    • Holland, C. P. and Light, B. (1999) A Critical success factor model for ERP implementation, IEEE Software, pp. 30-36, May/June.
    • (1999) IEEE Software , pp. 30-36
    • Holland, C.P.1    Light, B.2
  • 257
    • 0004010083 scopus 로고
    • Managing the software process
    • Addison-Wesley
    • Humphrey, W. (1989) Managing the software process, Addison-Wesley.
    • (1989)
    • Humphrey, W.1
  • 258
    • 84892125159 scopus 로고    scopus 로고
    • A component-based design approach to ERP design in a distributed object environment
    • IACIS 01
    • Kim, B-O., Lockwood, D. (2001) A component-based design approach to ERP design in a distributed object environment, IACIS 01.
    • (2001)
    • Kim, B.-O.1    Lockwood, D.2
  • 259
    • 70849122468 scopus 로고    scopus 로고
    • Building a Service-Oriented ERP from an Open Source Software
    • Fourth International Conference on Software Engineering Advances, IEEE CS Press
    • Kouamou, G. E. (2009) Building a Service-Oriented ERP from an Open Source Software, Fourth International Conference on Software Engineering Advances, IEEE CS Press.
    • (2009)
    • Kouamou, G.E.1
  • 260
    • 0003955218 scopus 로고    scopus 로고
    • Corporate Information Systems Management: Text and Cases
    • 5th edition, McGraw- Hill
    • Applegate, L.M., McFarlan, F. W. and McKenney, J. L. (1999) Corporate Information Systems Management: Text and Cases, 5th edition, McGraw- Hill.
    • (1999)
    • Applegate, L.M.1    McFarlan, F.W.2    McKenney, J.L.3
  • 261
    • 84892127507 scopus 로고    scopus 로고
    • Component-based ERP systems
    • Master thesis, Mid Sweden University, Sundsvall
    • Malm, B. (2001) Component-based ERP systems, Master thesis, Mid Sweden University, Sundsvall.
    • (2001)
    • Malm, B.1
  • 262
    • 55949120171 scopus 로고    scopus 로고
    • Requirements Engineering Method and Maturity Model for ERP Projects
    • Intl. J. of Enterprise Information Systems (IJEIS), IGI Publishers, Oct-Dec
    • Parthasarathy, S. and Ramachandran, M. (2008) Requirements Engineering Method and Maturity Model for ERP Projects, Intl. J. of Enterprise Information Systems (IJEIS), IGI Publishers, Vol. 4, No. 4, Oct-Dec.
    • (2008) , vol.4 , Issue.4
    • Parthasarathy, S.1    Ramachandran, M.2
  • 263
    • 84932090691 scopus 로고    scopus 로고
    • Software components: guidelines and applications
    • Nova Publishers, NY
    • Ramachandran, M. (2008) Software components: guidelines and applications, Nova Publishers, NY.
    • (2008)
    • Ramachandran, M.1
  • 266
    • 0004142101 scopus 로고    scopus 로고
    • Component Software
    • Addison Wesley
    • Szyperski, C. (1998) Component Software, Addison Wesley
    • (1998)
    • Szyperski, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.