메뉴 건너뛰기




Volumn , Issue , 2010, Pages 155-191

Balancing security and performance properties during system architectural design

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84899315800     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-61520-837-1.ch006     Document Type: Chapter
Times cited : (8)

References (45)
  • 1
    • 84899218867 scopus 로고    scopus 로고
    • Alloy, Retrieved from
    • Alloy (2008). Alloy. Retrieved from .
    • (2008) Alloy
  • 5
    • 0001094070 scopus 로고
    • The use of the CCTA risk analysis and management methodology CRAMM in health information systems
    • In K.C. Lun, P. Degoulet, T.E. Piemme, & O. Rienhoff (editors), North Holland Publishing Co, Amsterdam
    • Barber, B., & Davey, J. (1992). The Use of the CCTA Risk Analysis and Management Methodology CRAMM in Health Information Systems. In K.C. Lun, P. Degoulet, T.E. Piemme, & O. Rienhoff (editors): Proceedings of MEDINFO'92, North Holland Publishing Co, Amsterdam, pp. 1589-1593.
    • (1992) Proceedings of MEDINFO'92 , pp. 1589-1593
    • Barber, B.1    Davey, J.2
  • 7
    • 77953123038 scopus 로고    scopus 로고
    • CORAS, Retrieved from
    • CORAS. (2003). IST-2000-25031. Retrieved from http://sourceforge.net/projects/coras.
    • (2003) IST-2000-25031
  • 9
    • 38349123642 scopus 로고    scopus 로고
    • A goal oriented approach for modeling and analyzing security tradeoffs
    • Springer-Verlag
    • Elahi, G., & Yu, E. (2007). A goal oriented approach for modeling and analyzing security tradeoffs. In ER 2007. In Lecture Notes in Computer Science (Vol. 4801, pp. 375-390). Springer-Verlag.
    • (2007) In ER 2007. in Lecture Notes in Computer Science , vol.4801 , pp. 375-390
    • Elahi, G.1    Yu, E.2
  • 12
    • 5744230994 scopus 로고    scopus 로고
    • Aspect-oriented approach to design modeling
    • (2004-1), doi:10.1049/ip-sen:20040920
    • France, R. B., Ray, I., Georg, G., & Ghosh, S. (2004). (2004-1). Aspect-Oriented Approach to Design Modeling. IEE Proceedings. Software, 4(151), 173-185. doi:10.1049/ip-sen:20040920
    • (2004) IEE Proceedings. Software , vol.4 , Issue.151 , pp. 173-185
    • France, R.B.1    Ray, I.2    Georg, G.3    Ghosh, S.4
  • 15
    • 77955420733 scopus 로고    scopus 로고
    • Estimating impact and frequency of risks to safety and mission critical systems using CVSS
    • 11 November 2008, Seattle, US. IEEE CS Conference Proceedings. IEEE Computer Society Press
    • Houmb, S. H., Franqueira, V. N. L., & Engum, E. A. (2008). Estimating Impact and Frequency of Risks to Safety and Mission Critical Systems Using CVSS. In ISSRE 2008 Supplemental Proceedings: 1st Workshop on Dependable Software Engineering, 11 November 2008, Seattle, US. IEEE CS Conference Proceedings. IEEE Computer Society Press.
    • (2008) In ISSRE 2008 Supplemental Proceedings: 1st Workshop on Dependable Software Engineering
    • Houmb, S.H.1    Franqueira, V.N.L.2    Engum, E.A.3
  • 17
    • 84899177670 scopus 로고    scopus 로고
    • An integrated security verification and security solution trade-off analysis
    • In Mouratidis, H., & Giorgini, P. (Eds.), Hershey, PA: Idea Group
    • Houmb, S. H., Georg, G., Jürjens, J., & France, R. B. (2007). An Integrated Security Verification and Security Solution Trade-Off Analysis. In Mouratidis, H., & Giorgini, P. (Eds.), Integrating Security and Software Engineering: Advances and Future Vision. (pp. 190-219). Hershey, PA: Idea Group.
    • (2007) Integrating Security and Software Engineering: Advances and Future Vision , pp. 190-219
    • Houmb, S.H.1    Georg, G.2    Jürjens, J.3    France, R.B.4
  • 26
    • 62649108656 scopus 로고    scopus 로고
    • Lite Version, H. U. G. I. N. 6.8, A/S, Alborg, Denmark, April 19 2007
    • Lite Version, H. U. G. I. N. 6.8 (2007). Hugin Expert A/S, Alborg, Denmark. http://www.hugin.com.Downloaded April 19 2007.
    • (2007) Hugin Expert
  • 27
    • 0038043216 scopus 로고    scopus 로고
    • Security performance
    • doi:10.1109/MIC.2003.1200305
    • Menascé, D. (2003). Security Performance. IEEE Internet Computing, 7(3), 84-87. doi:10.1109/MIC.2003.1200305
    • (2003) IEEE Internet Computing , vol.7 , Issue.3 , pp. 84-87
    • Menascé, D.1
  • 30
    • 84899390340 scopus 로고    scopus 로고
    • UML profile for modeling and analysis of real-time embedded systems (MARTE)
    • OMG MARTE
    • OMG MARTE. (2008). UML Profile for Modeling and Analysis of Real-Time Embedded systems (MARTE). BETA Bulletin of Experimental Treatments for AIDS, 2, http://www.omg.org/docs/ptc/08-06-08.pdf.
    • (2008) BETA Bulletin of Experimental Treatments for AIDS , vol.2
  • 32
    • 35048864881 scopus 로고    scopus 로고
    • A metamodel for generating performance models from UML designs
    • Springer
    • Petriu, D. B., & Woodside, C. M. (2004). A Metamodel for Generating Performance Models from UML Designs. in Proc UML 2004, LNCS 3273, pp. 41-53, Springer.
    • (2004) Proc UML 2004, LNCS 3273 , pp. 41-53
    • Petriu, D.B.1    Woodside, C.M.2
  • 33
    • 36549027488 scopus 로고    scopus 로고
    • Performance analysis of aspect-oriented UML models
    • doi:10.1007/s10270-007-0053-0
    • Petriu, D. C., Shen, H., & Sabetta, A. (2007). Performance Analysis of Aspect-Oriented UML Models. Software and Systems Modeling, 6(4), 453-471. doi:10.1007/s10270-007-0053-0
    • (2007) Software and Systems Modeling , vol.6 , Issue.4 , pp. 453-471
    • Petriu, D.C.1    Shen, H.2    Sabetta, A.3
  • 35
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • doi:10.1007/s00766-004-0194-4
    • Sindre, G., & Opdahl, A. L. (2005). Eliciting security requirements with misuse cases. Requirements Engineering Journal, 10(1), 34-44. doi:10.1007/s00766-004-0194-4
    • (2005) Requirements Engineering Journal , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 40
    • 0005195459 scopus 로고    scopus 로고
    • TLSWG, Retrieved from
    • TLSWG. (1996). SSL 3.0 Specification. Retrieved from http://www.mozilla.org/projects/security/pki/nss/ssl/draft302.txt
    • (1996) SSL 3.0 Specification
  • 41
    • 84899168806 scopus 로고    scopus 로고
    • UML2Alloy, website
    • UML2Alloy (2005). UML2Alloy website: http://www.cs.bham.ac.uk/~bxb/UML2Alloy.html
    • (2005) UML2Alloy
  • 44
    • 55249114157 scopus 로고    scopus 로고
    • Performance analysis of security aspects by weaving scenarios extracted from UML models
    • a,Bieman, J. M., Houmb, S. H. & Jürjens, J. (2009), doi:10.1016/j.jss.2008.03.067
    • Woodside, C. M., Petriu, D. C., Petriu, D. B., Xu, J., Israr, T., Georg, G., & France, R. B. (2009). a,Bieman, J. M., Houmb, S. H. & Jürjens, J. (2009). Performance Analysis of Security Aspects by Weaving Scenarios Extracted from UML Models. Journal of Systems and Software, 82, 56-74. doi:10.1016/j.jss.2008.03.067
    • (2009) Journal of Systems and Software , vol.82 , pp. 56-74
    • Woodside, C.M.1    Petriu, D.C.2    Petriu, D.B.3    Xu, J.4    Israr, T.5    Georg, G.6    France, R.B.7
  • 45
    • 0030781944 scopus 로고    scopus 로고
    • Towards modelling and reasoning support for early-phase requirements engineering
    • Jan. 6-8, 1997, Washington D.C., USA
    • Yu, E. (1997). Towards Modelling and Reasoning Support for Early-Phase Requirements Engineering. In Proc of the 3rd IEEE Int. Symposium. on Requirements Engineering (RE'97) Jan. 6-8, 1997, Washington D.C., USA. pp. 226-235.
    • (1997) In Proc of the 3rd IEEE Int. Symposium. on Requirements Engineering (RE'97) , pp. 226-235
    • Yu, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.