메뉴 건너뛰기




Volumn , Issue , 2010, Pages 289-306

A systematic approach to define the domain of information system security risk management

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84892326872     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-3-642-12544-7_16     Document Type: Chapter
Times cited : (117)

References (57)
  • 3
    • 0003669844 scopus 로고    scopus 로고
    • AS/NZS 4360, SAI Global
    • AS/NZS 4360 (2004) Risk management. SAI Global
    • (2004) Risk Management
  • 6
    • 84892226914 scopus 로고    scopus 로고
    • Accessed 21 Feb. 2010
    • CLUSIF (2007) MEHARI 2007: concepts and mechanisms. http://www.clusif. asso.fr/fr/production/ouvrages/pdf/CLUSIF-risk-management.pdf. Last Accessed 21 Feb. 2010
    • (2007) MEHARI 2007: Concepts and Mechanisms.
  • 7
    • 0004272739 scopus 로고    scopus 로고
    • Addison-Wesley Longman Publishing Co., Boston, MA, USA
    • Cockburn A (2001) Writing effective use cases. Addison-Wesley Longman Publishing Co., Boston, MA, USA
    • (2001) Writing Effective use Cases
    • Cockburn, A.1
  • 12
    • 77950520810 scopus 로고    scopus 로고
    • A vulnerability-centric requirements engineering framework: Analyzing security attacks, countermeasures, and requirements based on vulnerabilities
    • Elahi G, Yu E, Zannone N (2010) A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities.. Reqs Eng Journal 15(1):41-62
    • (2010) Reqs Eng Journal , vol.15 , Issue.1 , pp. 41-62
    • Elahi, G.1    Yu, E.2    Zannone, N.3
  • 13
    • 84870382271 scopus 로고    scopus 로고
    • Accessed 21 Feb. 2010
    • ENISA (European Network and Information Security Agency) (2006) Inventory of risk assessment and risk management methods. http://www.enisa.europa.eu/act/ rm/files/deliverables/inventory-of-risk-assessment-and-risk-management-methods. Last Accessed 21 Feb. 2010
    • (2006) Inventory of Risk Assessment and Risk Management Methods.
  • 18
    • 40449096402 scopus 로고    scopus 로고
    • Security requirements engineering: A framework for representation and analysis
    • Haley CB, Laney RC, Moffett JD, Nuseibeh B (2008) Security requirements engineering: a framework for representation and analysis. IEEE Trans Softw Eng 34:133-153
    • (2008) IEEE Trans Softw Eng , vol.34 , pp. 133-153
    • Haley, C.B.1    Laney, R.C.2    Moffett, J.D.3    Nuseibeh, B.4
  • 20
    • 7244261750 scopus 로고    scopus 로고
    • Meaningful modeling: What's the semantics of "semantics"?
    • Harel D, Rumpe B (2004) Meaningful modeling: what's the semantics of "semantics"? Computer 37:64-72
    • (2004) Computer , vol.37 , pp. 64-72
    • Harel, D.1    Rumpe, B.2
  • 24
    • 84892322842 scopus 로고    scopus 로고
    • Environmental management systems - Requirements with guidance for use
    • ISO 14001, Geneva
    • ISO 14001 (2004) Environmental management systems - requirements with guidance for use. International Organization for Standardization, Geneva
    • (2004) International Organization for Standardization
  • 30
    • 0034291619 scopus 로고    scopus 로고
    • Handling obstacles in goal-oriented requirements engineering
    • van Lamsweerde A, Letier E (2000) Handling obstacles in goal-oriented requirements engineering. IEEE Trans Softw Eng 26:978-1005
    • (2000) IEEE Trans Softw Eng , vol.26 , pp. 978-1005
    • Van Lamsweerde, A.1    Letier, E.2
  • 43
    • 33750131444 scopus 로고    scopus 로고
    • Security quality requirements engineering (SQUARE) methodology
    • ESC-TR-2005-009Carnegie Mellon University - Software Engineering Institute, Pittsburgh, PA
    • Mead NR, Hough ED, Stehney TR (2005) Security quality requirements engineering (SQUARE) methodology. Technical report CMU/SEI-2005-TR-009, ESC-TR-2005-009Carnegie Mellon University - Software Engineering Institute, Pittsburgh, PA
    • (2005) Technical Report CMU/SEI-2005-TR-009
    • Mead, N.R.1    Hough, E.D.2    Stehney, T.R.3
  • 45
    • 73449140991 scopus 로고    scopus 로고
    • Evidence-based notation design: Towards a scientific basis for constructing visual notations in software engineering
    • Moody DL (2009) Evidence-based notation design: towards a scientific basis for constructing visual notations in software engineering.. IEEE Trans Softw Eng 35(6):756-779
    • (2009) IEEE Trans Softw Eng , vol.35 , Issue.6 , pp. 756-779
    • Moody, D.L.1
  • 46
    • 84892265795 scopus 로고    scopus 로고
    • Extending I and tropos to model security
    • Yu E, Giorgini P, Maiden N, Mylopoulos J eds, MIT in press, Cambridge, Massachusetts USA
    • Mouratidis H, Giorgini P (2010) Extending i. and tropos to model security. In: Yu E, Giorgini P, Maiden N, Mylopoulos J (eds) Social modeling for requirements engineering. MIT (in press), Cambridge, Massachusetts (USA)
    • (2010) Social Modeling for Requirements Engineering
    • Mouratidis, H.1    Giorgini, P.2
  • 51
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre G, Opdahl AL (2004) Eliciting security requirements with misuse cases. Reqs Eng J 10(1):34-44
    • (2004) Reqs Eng J , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 56


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.