메뉴 건너뛰기




Volumn , Issue , 2006, Pages 44-69

Identifying security requirements using the security quality requirements engineering (SQUARE) method

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84899324292     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-59904-147-6.ch003     Document Type: Chapter
Times cited : (18)

References (48)
  • 1
    • 33847713115 scopus 로고    scopus 로고
    • Considering operational security risks during systems development
    • Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University
    • Alberts, C., Dorofee, A., & Woody, C. (2004). Considering operational security risks during systems development. Proceedings of the Software Engineering Process Group 2004 Conference. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University.
    • (2004) Proceedings of the Software Engineering Process Group 2004 Conference
    • Alberts, C.1    Dorofee, A.2    Woody, C.3
  • 2
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases: Use cases with hostile intent
    • Alexander, I. (2003). Misuse cases: Use cases with hostile intent. IEEE Software, 20, 58-66.
    • (2003) IEEE Software , vol.20 , pp. 58-66
    • Alexander, I.1
  • 4
    • 84899177295 scopus 로고    scopus 로고
    • How to fake a rational design process using the SCR method
    • Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University
    • Bharadwaj, R. (2003). How to fake a rational design process using the SCR method. SEHAS'03 International Workshop on Software Engineering for High Assurance Systems. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University.
    • (2003) SEHAS'03 International Workshop On Software Engineering For High Assurance Systems
    • Bharadwaj, R.1
  • 6
    • 0041954816 scopus 로고
    • An application of soft systems methodology
    • New York: John Wiley & Sons
    • Checkland, P. (1989). An application of soft systems methodology. In Rational Analysis for a Problematic World (pp. 101-119). New York: John Wiley & Sons.
    • (1989) Rational Analysis For a Problematic World , pp. 101-119
    • Checkland, P.1
  • 14
    • 0018918712 scopus 로고
    • Specifying software requirements for complex systems: New techniques and their application
    • Heninger, K. L. (1980). Specifying software requirements for complex systems: New techniques and their application. IEEE Transactions on Software Engineering SE-6, 2-13.
    • (1980) IEEE Transactions On Software Engineering SE-6 , pp. 2-13
    • Heninger, K.L.1
  • 15
    • 0033683937 scopus 로고    scopus 로고
    • An assessment of the relative efficiency of a facilitator-driven requirements collection process with respect to the conventional interview method
    • Hubbard, R., Schroeder, C. N., & Mead, N. (2000). An assessment of the relative efficiency of a facilitator-driven requirements collection process with respect to the conventional interview method. ICRE 2000, 178-188.
    • (2000) ICRE , vol.2000 , pp. 178-188
    • Hubbard, R.1    Schroeder, C.N.2    Mead, N.3
  • 16
    • 84899191728 scopus 로고    scopus 로고
    • INFOSEC Assessment Methodology, Retrieved November 9, 2005, from
    • INFOSEC Assessment Methodology. (2004). INFOSEC assurance training and rating program. Retrieved November 9, 2005, from http://www.iatrp.com/iam.cfm
    • (2004) INFOSEC Assurance Training and Rating Program
  • 17
    • 0003512056 scopus 로고
    • (Rep. No. CMU/SEI-90-TR-021, ADA235785). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from
    • Kang, K. C., Cohen, S. G., Hess, J. A., Novak, W. E., & Peterson, A. S. (1990). Featureoriented domain analysis (FODA) feasibility study (Rep. No. CMU/SEI-90-TR-021, ADA235785). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from http://www.sei.cmu.edu/publications/documents/90.reports/90.tr.021.html
    • (1990) Featureoriented Domain Analysis (FODA) Feasibility Study
    • Kang, K.C.1    Cohen, S.G.2    Hess, J.A.3    Novak, W.E.4    Peterson, A.S.5
  • 26
    • 84873155281 scopus 로고    scopus 로고
    • Retrieved November 9, 2005, from
    • Mead, N. R. (2002). Survivable systems analysis method. Retrieved November 9, 2005, from http://www.cert.org/archive/html/analysis-method.html
    • (2002) Survivable Systems Analysis Method
    • Mead, N.R.1
  • 27
    • 70349532335 scopus 로고    scopus 로고
    • (Rep. No. CMU/SEI-2003-TN-013). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from
    • Mead, N. R. (2003). Requirements engineering for survivable systems (Rep. No. CMU/SEI-2003-TN-013). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from http://www.sei.cmu.edu/publications/documents/03.reports/03tn013.html
    • (2003) Requirements Engineering For Survivable Systems
    • Mead, N.R.1
  • 28
    • 33750131444 scopus 로고    scopus 로고
    • (Rep. No. CMU/SEI-2005-TR-009). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from
    • Mead, N. R., Hough, E., & Stehney, T. (2005a). Security quality requirements engineering (SQUARE) methodology (Rep. No. CMU/SEI-2005-TR-009). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from http://www.sei.cmu.edu/publications/documents/05.reports/05tr009.html
    • (2005) Security Quality Requirements Engineering (SQUARE) Methodology
    • Mead, N.R.1    Hough, E.2    Stehney, T.3
  • 29
    • 85088409477 scopus 로고    scopus 로고
    • Paper presented at the meeting of the Software Engineering for Secure Systems (SESS05), ICSE 2005 International Workshop on Requirements for High Assurance Systems, St. Louis, MO
    • Mead, N. R., & Stehney, T. (2005b). Security quality requirements engineering (SQUARE) methodology. Paper presented at the meeting of the Software Engineering for Secure Systems (SESS05), ICSE 2005 International Workshop on Requirements for High Assurance Systems, St. Louis, MO.
    • (2005) Security Quality Requirements Engineering (SQUARE) Methodology
    • Mead, N.R.1    Stehney, T.2
  • 30
    • 0038226150 scopus 로고    scopus 로고
    • (Rep. No. CMU/SEI-2001-TN-001, ADA388771), Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from
    • Moore, A. P., Ellison, R. J., & Linger, R. C. (2001). Attack modeling for information security and survivability (Rep. No. CMU/SEI-2001-TN-001, ADA388771). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved from http://www.sei.cmu.edu/publications/documents/01.reports/01tn001.html
    • (2001) Attack Modeling For Information Security and Survivability
    • Moore, A.P.1    Ellison, R.J.2    Linger, R.C.3
  • 32
    • 28344437756 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST), Rep. No. NIST 2002-10, Gaithersburg: National Institute of Standards and Technology. Retrieved November 9, 2005, from
    • National Institute of Standards and Technology (NIST). (2002). Software errors cost U.S. economy $59.5 billion annually (Rep. No. NIST 2002-10). Gaithersburg: National Institute of Standards and Technology. Retrieved November 9, 2005, from http://www.nist.gov/public_affairs/releases/n02-10.htm
    • (2002) Software Errors Cost U.S. Economy $59.5 Billion Annually
  • 34
    • 34249848744 scopus 로고    scopus 로고
    • QFD Institute, Retrieved November 9, 2005, from
    • QFD Institute. (2005). Frequently asked questions about QFD. Retrieved November 9, 2005, from http://www.qfdi.org/what_is_qfd/faqs_about_qfd.htm
    • (2005) Frequently Asked Questions About QFD
  • 35
    • 84958057954 scopus 로고    scopus 로고
    • The use of the B formal method for the design and validation of the transaction mechanism for smart card applications
    • Berlin: Springer-Verlag
    • Sabatier, D., & Lartigue, P. (1999). The use of the B formal method for the design and validation of the transaction mechanism for smart card applications. In FM '99: World Congress on Formal Methods (Vol. 1, pp. 348-368). Berlin: Springer-Verlag.
    • (1999) FM '99: World Congress On Formal Methods , vol.1 , pp. 348-368
    • Sabatier, D.1    Lartigue, P.2
  • 38
    • 0034497420 scopus 로고    scopus 로고
    • Eliciting security requirements by misuse cases
    • Los Alamitos: IEEE Computer Society Press
    • Sindre, G., & Opdahl, A. (2000). Eliciting security requirements by misuse cases. Proceedings of TOOLS Pacific 2000 (pp. 120-130). Los Alamitos: IEEE Computer Society Press.
    • (2000) Proceedings of TOOLS Pacific 2000 , pp. 120-130
    • Sindre, G.1    Opdahl, A.2
  • 42
    • 1842829828 scopus 로고    scopus 로고
    • Rep. No. 800-30, Gaithersburg: National Institute of Standards and Technology. Retrieved November 9, 2005, from
    • Stoneburner, G., Goguen, A., & Feringa, A. (2002). Risk management guide for information technology systems (Rep. No. 800-30). Gaithersburg: National Institute of Standards and Technology. Retrieved November 9, 2005, from http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf
    • (2002) Risk Management Guide For Information Technology Systems
    • Stoneburner, G.1    Goguen, A.2    Feringa, A.3
  • 43
    • 84899274516 scopus 로고
    • CORE: The method
    • Systems Designers Scientific, Camberley: Pembroke House
    • Systems Designers Scientific. (1985). CORE: The method. In CORE Manual, 1.0. Camberley: Pembroke House.
    • (1985) CORE Manual, 1.0
  • 46
    • 77953800669 scopus 로고    scopus 로고
    • (Rep. No. CMU/SEI-2005-TN-010). Pittsburgh, PA: Software Engineering Inst., Carnegie Mellon University. Retrieved from
    • Woody, C. (2005). Eliciting and analyzing quality requirements: Management influences on software quality requirements (Rep. No. CMU/SEI-2005-TN-010). Pittsburgh, PA: Software Engineering Inst., Carnegie Mellon University. Retrieved from http://www.sei.cmu.edu/publications/documents/05.reports/05tn010.html
    • (2005) Eliciting and Analyzing Quality Requirements: Management Influences On Software Quality Requirements
    • Woody, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.