메뉴 건너뛰기




Volumn , Issue , 2006, Pages 16-43

Arguing satisfaction of security requirements

Author keywords

[No Author keywords available]

Indexed keywords

ENGINEERING; INDUSTRIAL ENGINEERING;

EID: 84899251780     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-59904-147-6.ch002     Document Type: Chapter
Times cited : (12)

References (48)
  • 4
    • 4243980729 scopus 로고    scopus 로고
    • Strategies for developing policies and requirements for secure e-commerce systems
    • In A. K. Ghosh (Ed.), Kluwer Academic Publishers
    • Antón, A. I., & Earp, J. B. (2001). Strategies for developing policies and requirements for secure e-commerce systems. In A. K. Ghosh (Ed.), E-commerce security and privacy (Vol. 2, pp. 29-46). Kluwer Academic Publishers.
    • (2001) E-commerce Security and Privacy , vol.2 , pp. 29-46
    • Antón, A.I.1    Earp, J.B.2
  • 7
    • 25444462095 scopus 로고    scopus 로고
    • The roots of computer supported argument visualization
    • In P. A. Kirschner, S. J. Buckingham Shum, & C. S. Carr (Eds.), London: Springer-Verlag
    • Buckingham Shum, S. J. (2003). The roots of computer supported argument visualization. In P. A. Kirschner, S. J. Buckingham Shum, & C. S. Carr (Eds.), Visualizing argumentation: Software tools for collaborative and educational sense-making (pp. 3-24). London: Springer-Verlag.
    • (2003) Visualizing Argumentation: Software Tools For Collaborative and Educational Sense-making , pp. 3-24
    • Buckingham Shum, S.J.1
  • 8
    • 32044473027 scopus 로고    scopus 로고
    • An integrated approach for software design checking using design rationale
    • In J. S. Gero (Ed.), Cambridge, MA: Kluwer Academic Press
    • Burge, J. E., & Brown, D. C. (2004). An integrated approach for software design checking using design rationale. In J. S. Gero (Ed.), Proceedings of the 1st International Conference on Design Computing and Cognition (pp. 557-576). Cambridge, MA: Kluwer Academic Press.
    • (2004) Proceedings of the 1st International Conference On Design Computing and Cognition , pp. 557-576
    • Burge, J.E.1    Brown, D.C.2
  • 9
    • 84899276996 scopus 로고    scopus 로고
    • Retrieved November 9, 2005, from
    • Christensen, D. (2005). DC proof. Retrieved November 9, 2005, from http://www.dcproof.com/
    • (2005) DC Proof
    • Christensen, D.1
  • 11
    • 84899218208 scopus 로고    scopus 로고
    • Compendium Institute, Retrieved from
    • Compendium Institute. (2005). Compendium. Retrieved from http://www.compendiuminstitute.org/
    • (2005) Compendium
  • 12
    • 84970947585 scopus 로고    scopus 로고
    • Software engineering for security: A roadmap
    • In A. Finkelstein (Ed.), ACM Press
    • Devanbu, P., & Stubblebine, S. (2000). Software engineering for security: A roadmap. In A. Finkelstein (Ed.), The future of software engineering. ACM Press.
    • (2000) The Future of Software Engineering
    • Devanbu, P.1    Stubblebine, S.2
  • 14
    • 0003224879 scopus 로고    scopus 로고
    • Making argumentation serve design
    • In T. Moran & J. Carroll (Eds.), Lawrence Erlbaum and Associates
    • Fischer, G., Lemke, A. C., McCall, R., & Morch, A. (1996). Making argumentation serve design. In T. Moran & J. Carroll (Eds.), Design rationale concepts, techniques, and use (pp. 267-293). Lawrence Erlbaum and Associates.
    • (1996) Design Rationale Concepts, Techniques, and Use , pp. 267-293
    • Fischer, G.1    Lemke, A.C.2    McCall, R.3    Morch, A.4
  • 21
    • 84899245451 scopus 로고    scopus 로고
    • Retrieved November 9, 2005, from
    • Howitt, C. (2005). BlobLogic. Retrieved November 9, 2005, from http://users.ox.ac.uk/~univ0675/blob/blobSplash.html
    • (2005) BlobLogic
    • Howitt, C.1
  • 26
    • 0026386194 scopus 로고
    • What's in design rationale? Human-Computer Interaction
    • Lee, J., & Lai, K. Y. (1991). What's in design rationale? Human-Computer Interaction, Special Issue on Design Rationale, 6(3-4), 251-280.
    • (1991) Special Issue On Design Rationale , vol.6 , Issue.3-4 , pp. 251-280
    • Lee, J.1    Lai, K.Y.2
  • 27
    • 0036305007 scopus 로고    scopus 로고
    • Integrating software lifecycle process standards with security engineering
    • Lee, Y., Lee, J., & Lee, Z. (2002). Integrating software lifecycle process standards with security engineering. Computers and Security, 21(4), 345-355.
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 345-355
    • Lee, Y.1    Lee, J.2    Lee, Z.3
  • 30
    • 32044433021 scopus 로고    scopus 로고
    • (Technical Report No. 2004/23). Milton Keynes UK: Department of Computing, The Open University
    • Moffett, J. D., Haley, C. B., & Nuseibeh, B. (2004). Core security requirements artefacts (Technical Report No. 2004/23). Milton Keynes UK: Department of Computing, The Open University.
    • (2004) Core Security Requirements Artefacts
    • Moffett, J.D.1    Haley, C.B.2    Nuseibeh, B.3
  • 35
    • 85008523798 scopus 로고    scopus 로고
    • Weaving together requirements and architectures
    • Nuseibeh, B. (2001). Weaving together requirements and architectures. Computer (IEEE), 34(3), 115-117.
    • (2001) Computer (IEEE) , vol.34 , Issue.3 , pp. 115-117
    • Nuseibeh, B.1
  • 37
    • 0026882989 scopus 로고
    • Supporting systems development by capturing deliberations during requirements engineering
    • Ramesh, B., & Dhar, V. (1992). Supporting systems development by capturing deliberations during requirements engineering. IEEE Transactions on Software Engineering, 18(6), 498-510.
    • (1992) IEEE Transactions On Software Engineering , vol.18 , Issue.6 , pp. 498-510
    • Ramesh, B.1    Dhar, V.2
  • 38
    • 33847292131 scopus 로고    scopus 로고
    • Retrieved from
    • Reed, C. (2005). Araucaria. Retrieved from http://araucaria.computing.dundee.ac.uk/
    • (2005) Araucaria
    • Reed, C.1
  • 42
    • 0030706923 scopus 로고    scopus 로고
    • Information security embedded in the design of telematics systems
    • Tettero, O., Out, D. J., Franken, H. M., & Schot, J. (1997). Information security embedded in the design of telematics systems. Computers and Security, 16(2), 145-164.
    • (1997) Computers and Security , vol.16 , Issue.2 , pp. 145-164
    • Tettero, O.1    Out, D.J.2    Franken, H.M.3    Schot, J.4
  • 43
    • 0004096846 scopus 로고
    • Cambridge, Cambridge University Press
    • Toulmin, S. E. (1958). The uses of argument. Cambridge: Cambridge University Press.
    • (1958) The Uses of Argument
    • Toulmin, S.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.