메뉴 건너뛰기




Volumn , Issue , 2006, Pages 70-105

A social ontology for integrating security and software engineering

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84899311212     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-59904-147-6.ch004     Document Type: Chapter
Times cited : (19)

References (67)
  • 3
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases: Use cases with hostile intent
    • January
    • Alexander, I. (2003, January). Misuse cases: Use cases with hostile intent. IEEE Software, 20(1), 58-66.
    • (2003) IEEE Software , vol.20 , Issue.1 , pp. 58-66
    • Alexander, I.1
  • 5
    • 21344459955 scopus 로고    scopus 로고
    • Structures of responsibilities and security of information systems
    • Backhouse, J., & Dhillon, G. (1996). Structures of responsibilities and security of information systems. European Journal of Information Systems, 5(1), 2-10.
    • (1996) European Journal of Information Systems , vol.5 , Issue.1 , pp. 2-10
    • Backhouse, J.1    Dhillon, G.2
  • 6
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • Baskerville, R. (1993). Information systems security design methods: Implications for information systems development. Computing Surveys, 25(4), 375-414.
    • (1993) Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 7
    • 0024012763 scopus 로고
    • A spiral model of software development and enhancement
    • Boehm, B. W. (1988). A spiral model of software development and enhancement. IEEE Computer, 21(5), 61-72.
    • (1988) IEEE Computer , vol.21 , Issue.5 , pp. 61-72
    • Boehm, B.W.1
  • 11
    • 0036721855 scopus 로고    scopus 로고
    • Towards requirements driven information systems engineering: The Tropos project
    • Castro, J., Kolp, M., & Mylopoulos, J. (2002). Towards requirements driven information systems engineering: The Tropos project. Information Systems, 27(6), 365-389.
    • (2002) Information Systems , vol.27 , Issue.6 , pp. 365-389
    • Castro, J.1    Kolp, M.2    Mylopoulos, J.3
  • 14
    • 84899367311 scopus 로고    scopus 로고
    • CRAMM - CCTA (Central Computer and Telecommunications Agency, UK), Retrieved from
    • CRAMM - CCTA (Central Computer and Telecommunications Agency, UK). Risk analysis and management method. Retrieved from http://www.cramm.com/cramm.htm
    • Risk Analysis and Management Method
  • 17
    • 24944464331 scopus 로고    scopus 로고
    • National Computer Systems Security Award Acceptance Speech. Retrieved October 18, 1999, from
    • Denning, D. E. (1998). The limits of formal security models. National Computer Systems Security Award Acceptance Speech. Retrieved October 18, 1999, from www.cs.georgetown.edu/~denning/infosec/award.html
    • (1998) The Limits of Formal Security Models
    • Denning, D.E.1
  • 18
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Toward socio-organizational perspectives
    • Dhillon, G., & Backhouse, J. (2001). Current directions in IS security research: Toward socio-organizational perspectives. Information Systems Journal, 11(2), 127-154.
    • (2001) Information Systems Journal , vol.11 , Issue.2 , pp. 127-154
    • Dhillon, G.1    Backhouse, J.2
  • 20
    • 35248852381 scopus 로고    scopus 로고
    • Modelling component dependencies to inform their selection
    • February 10-13, Lecture Notes in Computer Science 2580. Ottawa, Canada: Springer
    • nd International Conference, (ICCBSS 2003) (pp. 81-91). Lecture Notes in Computer Science 2580. Ottawa, Canada: Springer.
    • (2003) nd International Conference, (ICCBSS 2003) , pp. 81-91
    • Franch, X.1    Maiden, N.A.M.2
  • 25
    • 15944398393 scopus 로고    scopus 로고
    • A software fault tree approach to requirements analysis of an intrusion detection system
    • In P. Loucopoulos & J. Mylopoulos (Ed.), Requirements Engineering
    • Helmer, G., Wong, J., Slagell, M., Honavar, V., Miller, L., & Lutz, R. (2002). A software fault tree approach to requirements analysis of an intrusion detection system. In P. Loucopoulos & J. Mylopoulos (Ed.), Special Issue on Requirements Engineering for Information Security. Requirements Engineering (Vol. 7, No. 4, pp. 177-220).
    • (2002) Special Issue On Requirements Engineering For Information Security , vol.7 , Issue.4 , pp. 177-220
    • Helmer, G.1    Wong, J.2    Slagell, M.3    Honavar, V.4    Miller, L.5    Lutz, R.6
  • 26
    • 0039372661 scopus 로고    scopus 로고
    • Viewing business-process security from different perspectives
    • Herrmann, G., & Pernul, G. (1999). Viewing business-process security from different perspectives. International Journal of Electronic Commerce, 3(3), 89-103.
    • (1999) International Journal of Electronic Commerce , vol.3 , Issue.3 , pp. 89-103
    • Herrmann, G.1    Pernul, G.2
  • 29
    • 0942288555 scopus 로고    scopus 로고
    • Designing information systems in social context: A goal and scenario modelling approach
    • Liu, L., & Yu, E. (2003). Designing information systems in social context: A goal and scenario modelling approach. Information Systems, 29(2), 187-203.
    • (2003) Information Systems , vol.29 , Issue.2 , pp. 187-203
    • Liu, L.1    Yu, E.2
  • 41
    • 85023549755 scopus 로고
    • Security constraint processing in multilevel secure AMAC schemata
    • November 23-25, Toulouse, France. Lecture Notes in Computer Science 648. Springer
    • nd European Symposium on Research in Computer Security (ESORICS 1992) (pp. 349-370). Toulouse, France. Lecture Notes in Computer Science 648. Springer.
    • (1992) nd European Symposium On Research In Computer Security (ESORICS 1992) , pp. 349-370
    • Pernul, G.1
  • 46
    • 0037252218 scopus 로고    scopus 로고
    • January/February). Good enough security: Towards a business driven discipline
    • Sandhu, R. (2003, January/February). Good enough security: Towards a business driven discipline. IEEE Internet Computing, 7(1), 66-68.
    • (2003) IEEE Internet Computing , vol.7 , Issue.1 , pp. 66-68
    • Sandhu, R.1
  • 48
    • 0006964066 scopus 로고    scopus 로고
    • Dr. Dobb's Journal, December. Retrieved from
    • Schneier, B. (1999). Attack trees modelling security threats. Dr. Dobb's Journal, December. Retrieved from http://www.counterpane.com/attacktrees-ddj-ft.html
    • (1999) Attack Trees Modelling Security Threats
    • Schneier, B.1
  • 54
    • 84904255922 scopus 로고    scopus 로고
    • A new paradigm for adding security into IS development methods
    • In J. Eloff, L. Labuschagne, R. von Solms, & G. Dhillon (Eds.), Boston: Kluwer Academic Publishers
    • Siponen, M. T., & Baskerville, R. (2001). A new paradigm for adding security into IS development methods. In J. Eloff, L. Labuschagne, R. von Solms, & G. Dhillon (Eds.), Advances in information security management & small systems security (pp. 99-111). Boston: Kluwer Academic Publishers.
    • (2001) Advances In Information Security Management & Small Systems Security , pp. 99-111
    • Siponen, M.T.1    Baskerville, R.2
  • 55
    • 0028384062 scopus 로고
    • Responsibility modelling as a technique for requirements definition
    • Strens, M. R., & Dobson, J. E. (1994). Responsibility modelling as a technique for requirements definition. IEEE, 3(1), 20-26.
    • (1994) IEEE , vol.3 , Issue.1 , pp. 20-26
    • Strens, M.R.1    Dobson, J.E.2
  • 62
    • 0003696369 scopus 로고    scopus 로고
    • Agent orientation as a modelling paradigm
    • April
    • Yu, E. (2001a, April). Agent orientation as a modelling paradigm. Wirtschaftsinformatik, 43(2), 123-132.
    • (2001) Wirtschaftsinformatik , vol.43 , Issue.2 , pp. 123-132
    • Yu, E.1
  • 66
    • 84942921136 scopus 로고    scopus 로고
    • Modelling trust for system design using the i* strategic actors framework
    • In R. Falcone, M. Singh, & Y. H. Tan (Eds.), LNAI-2246. Springer
    • Yu, E., & Liu, L.(2001). Modelling trust for system design using the i* strategic actors framework. In R. Falcone, M. Singh, & Y. H. Tan (Eds.), Trust in cyber-societies--integrating the human and artificial perspectives (pp. 175-194). LNAI-2246. Springer.
    • (2001) Trust In Cyber-societies--integrating the Human and Artificial Perspectives , pp. 175-194
    • Yu, E.1    Liu, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.