메뉴 건너뛰기




Volumn , Issue , 2006, Pages 107-126

A methodology to develop secure systems using patterns

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84899175349     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-59904-147-6.ch005     Document Type: Chapter
Times cited : (74)

References (55)
  • 2
    • 84899204780 scopus 로고    scopus 로고
    • CERT Coordination Center Statistics
    • CERT Coordination Center Statistics. (2005). http://www.cert.org/stats/cert_stats.html
    • (2005)
  • 3
    • 84899225062 scopus 로고    scopus 로고
    • Software security testing: Let's get back to basics
    • October, Retrieved from
    • Curphey, M. (2004, October). Software security testing: Let's get back to basics. Software Magazine. Retrieved from http://www.softwaremag.com/L.cfm?Doc=2004-09software-security-testing
    • (2004) Software Magazine
    • Curphey, M.1
  • 6
    • 84860080088 scopus 로고    scopus 로고
    • Layers and non-functional patterns
    • May 10-15, Phoenix, AZ. Retrieved from
    • Fernandez, E. B. (2003, May 10-15). Layers and non-functional patterns. Proceedings of ChiliPLoP, 2003. Phoenix, AZ. Retrieved from http://hillside.net/chiliplop/2003/
    • (2003) Proceedings of ChiliPLoP, 2003
    • Fernandez, E.B.1
  • 12
    • 33744905133 scopus 로고    scopus 로고
    • A pattern language for security models
    • Retrieved from
    • Fernandez, E. B., & Pan, R. (2001). A pattern language for security models. Proceedings of PLoP 2001. Retrieved from http://jerry.cs.uiuc.edu/~plop/plop2001/accepted_submissions
    • (2001) Proceedings of PLoP 2001
    • Fernandez, E.B.1    Pan, R.2
  • 15
    • 78651459564 scopus 로고    scopus 로고
    • An analysis pattern for reservation and use of entities
    • Retrieved from
    • Fernandez, E. B., & Yuan, X. (1999). An analysis pattern for reservation and use of entities. Proceedings of PLoP99. Retrieved from http://st-www.cs.uiuc.edu/~plop/plop99
    • (1999) Proceedings of PLoP99
    • Fernandez, E.B.1    Yuan, X.2
  • 19
    • 84899188427 scopus 로고    scopus 로고
    • Gramm-Leach-Bliley Act, November, Retrieved from
    • Gramm-Leach-Bliley Act. (1999, November). Senate Banking Committee. Retrieved from http://www.senate.gov/~banking/conf/fincon.pdf
    • (1999) Senate Banking Committee
  • 23
    • 84899378029 scopus 로고    scopus 로고
    • HIPAA
    • HIPAA. http://www.hipaa.org
  • 28
    • 0035049246 scopus 로고    scopus 로고
    • Security challenges for Enterprise Java in an e-business environment
    • Koved, L., Nadalin, A., Nagarathan, N., Pistoia, M., & Schrader, T. (2001). Security challenges for Enterprise Java in an e-business environment. IBM Systems Journal, 40(1), 130-152.
    • (2001) IBM Systems Journal , vol.40 , Issue.1 , pp. 130-152
    • Koved, L.1    Nadalin, A.2    Nagarathan, N.3    Pistoia, M.4    Schrader, T.5
  • 34
    • 8444240069 scopus 로고    scopus 로고
    • Using security attack scenarios to analise security during information systems design
    • Mouratidis, H., Giorgini, P., & Manson, G. (2004). Using security attack scenarios to analise security during information systems design. Proceedings of ICEIS 2004.
    • (2004) Proceedings of ICEIS 2004
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.3
  • 35
    • 84976766543 scopus 로고
    • The role of software engineering
    • May
    • Neumann, P. G. (1993, May). The role of software engineering. Communications of the ACM, 36(5), 114.
    • (1993) Communications of the ACM , vol.36 , Issue.5 , pp. 114
    • Neumann, P.G.1
  • 36
    • 84899317731 scopus 로고    scopus 로고
    • The OWASP Testing Project, Retrieved from
    • The OWASP Testing Project. (2004). Retrieved from http://www.modsecurity.org/archive/OWASPTesting_phaseOne.pdf
    • (2004)
  • 39
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Retrieved from
    • Saltzer J. H., & Schroeder, M. D. (1975). The protection of information in computer systems. Proceedings of the IEEE, 63(9), 1278-1308. Retrieved from http://web.mit.edu/Saltzer/www/publications/protection/index.html
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 40
    • 84899213066 scopus 로고    scopus 로고
    • Sarbanes-Oxley Act of 2002, January, Retrieved from
    • Sarbanes-Oxley Act of 2002. (2002, January). One Hundred Seventh Congress of the United States of America. Retrieved from http://news.findlaw.com/hdocs/docs/gwbush/sarbanesoxley072302.pdf
    • (2002) One Hundred Seventh Congress of the United States of America
  • 41
  • 42
    • 33646188481 scopus 로고    scopus 로고
    • PhD Thesis, Lecture Notes in Computer Science. LNCS 2754. Springer-Verlag
    • Schumacher, M. (2003). Security engineering with patterns. PhD Thesis, Lecture Notes in Computer Science. LNCS 2754. Springer-Verlag.
    • (2003) Security Engineering With Patterns
    • Schumacher, M.1
  • 45
    • 84888267181 scopus 로고    scopus 로고
    • Analysis patterns for patient treatment
    • Retrieved from
    • Sorgente, T., & Fernandez, E. B. (2004). Analysis patterns for patient treatment. Proceedings of PLoP 2004. Retrieved from http://jerry.cs.uiuc.cs.uiuc.edu/~plop/plop2004/accepted_submissions
    • (2004) Proceedings of PLoP 2004
    • Sorgente, T.1    Fernandez, E.B.2
  • 46
    • 0036038515 scopus 로고    scopus 로고
    • Collaborative attack modeling
    • Madrid, Spain. Retrieved from
    • Steffan J., & Schumacher, M. (2002). Collaborative attack modeling. Proceedings of SAC 2002, Madrid, Spain. Retrieved from http://www.ito.tu-darmstadt.de/publs/pdf/sac2002.pdf
    • (2002) Proceedings of SAC 2002
    • Steffan, J.1    Schumacher, M.2
  • 47
    • 84899226193 scopus 로고    scopus 로고
    • Trusted Computing Group, Infrastrcure Work Group. Retrieved from
    • Trusted Computing Group, Infrastrcure Work Group. Retrieved from https://www.trustedcomputinggroup.org/groups/infrastructure
  • 49
    • 0038348212 scopus 로고    scopus 로고
    • Secure systems development based on the common criteria: The PaIME project
    • November, 2002/FSE-10
    • Vetterling, M., & Wimmel, G. (2002, November) Secure systems development based on the common criteria: The PaIME project. Proceedings of ACM SIGSOFT 2002/FSE-10.
    • (2002) Proceedings of ACM SIGSOFT
    • Vetterling, M.1    Wimmel, G.2
  • 53
    • 0034816038 scopus 로고    scopus 로고
    • A method for designing secure solutions
    • Retrieved from
    • Whitmore, J. J. (2001). A method for designing secure solutions. IBM Systems Journal, 40(3), 747-768. Retrieved from http://www.research.ibm.com/journal.sj
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 747-768
    • Whitmore, J.J.1
  • 54
    • 84899295444 scopus 로고    scopus 로고
    • An analysis pattern for course management
    • Retrieved from
    • Yuan, X., & Fernandez, E. B. (2003). An analysis pattern for course management. Proceedings of EuroPLoP 2003. Retrieved from http://hillside.net/europlop
    • (2003) Proceedings of EuroPLoP 2003
    • Yuan, X.1    Fernandez, E.B.2
  • 55
    • 1242263785 scopus 로고    scopus 로고
    • Holistic security requirement engineering for electronic commerce
    • Zuccato, A. (2004). Holistic security requirement engineering for electronic commerce. Computers & Security, 23, 63-76.
    • (2004) Computers & Security , vol.23 , pp. 63-76
    • Zuccato, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.