메뉴 건너뛰기




Volumn , Issue , 2014, Pages 152-161

SecDSVL: A domain-specific visual language to support enterprise security modelling

Author keywords

Domain Specific Visual Language; model based security management; visual modelling tools

Indexed keywords

INDUSTRIAL MANAGEMENT; VISUAL LANGUAGES;

EID: 84903533948     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ASWEC.2014.18     Document Type: Conference Paper
Times cited : (21)

References (19)
  • 1
    • 84903534674 scopus 로고    scopus 로고
    • ISO/iec 27000-information technology-security techniques-information security management systems-overview and vocabulary
    • International Organization for Standardization (ISO)
    • International Organization for Standardization (ISO), "ISO/IEC 27000-Information technology-Security techniques-Information security management systems-Overview and vocabulary," ISO/IEC 27001:2005(E), 2009.
    • (2009) ISO/IEC 27001:2005(E)
  • 3
    • 84944220091 scopus 로고    scopus 로고
    • Towards development of secure systems using umlsec
    • Ed: Springer Berlin Heidelberg
    • J. Jürjens, "Towards Development of Secure Systems Using UMLsec," in Fundamental Approaches to Software Engineering. vol. 2029, ed: Springer Berlin Heidelberg, 2001, pp. 187-200.
    • (2001) Fundamental Approaches to Software Engineering. , vol.2029 , pp. 187-200
    • Jürjens, J.1
  • 6
    • 33746038490 scopus 로고    scopus 로고
    • Towards a comprehensive framework for secure systems development
    • E. Dubois and K. Pohl, Eds., ed: Springer Berlin / Heidelberg
    • H. Mouratidis, J. Jürjens, and J. Fox, "Towards a Comprehensive Framework for Secure Systems Development," in Advanced Information Systems Engineering. vol. 4001, E. Dubois and K. Pohl, Eds., ed: Springer Berlin / Heidelberg, 2006, pp. 48-62.
    • (2006) Advanced Information Systems Engineering. , vol.4001 , pp. 48-62
    • Mouratidis, H.1    Jürjens, J.2    Fox, J.3
  • 8
    • 84903553635 scopus 로고    scopus 로고
    • National Institute of standards and technology (NIST), Washington: U. S. Government Printing 2002, Accessed on August
    • National Institute of standards and technology (NIST), "The Federal Information Security Management Act (FISMA)," Washington: U. S. Government Printing2002, http://csrc. nist. gov/ drivers/documents/FISMA-final. pdf, Accessed on August 2012.
    • (2012) The Federal Information Security Management Act (FISMA)
  • 12
    • 4143084933 scopus 로고    scopus 로고
    • The coras framework for a model-based risk management process
    • S. Anderson, M. Felici, and S. Bologna, Eds., ed: Springer Berlin / Heidelberg
    • R. Fredriksen, M. Kristiansen, B. Gran, and K. Stølen, "The CORAS Framework for a Model-Based Risk Management Process," in Computer Safety, Reliability and Security. vol. 2434, S. Anderson, M. Felici, and S. Bologna, Eds., ed: Springer Berlin / Heidelberg, 2002, pp. 39-53.
    • (2002) Computer Safety, Reliability and Security. , vol.2434 , pp. 39-53
    • Fredriksen, R.1    Kristiansen, M.2    Gran, B.3    Stølen, K.4
  • 14
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • G. Sindre, and A. Opdahl, "Eliciting security requirements with misuse cases," Requir. Eng., vol. 10, pp. 34-44, 2005.
    • (2005) Requir. Eng. , vol.10 , pp. 34-44
    • Sindre, G.1    Opdahl, A.2
  • 15
    • 77950520810 scopus 로고    scopus 로고
    • A vulnerabilitycentric requirements engineering framework: Analyzing security attacks, countermeasures, and requirements based on vulnerabilities
    • G. Elahi, E. Yu, and N. Zannone, "A vulnerabilitycentric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities," Requir. Eng., vol. 15, pp. 41-62, 2010.
    • (2010) Requir. Eng. , vol.15 , pp. 41-62
    • Elahi, G.1    Yu, E.2    Zannone, N.3
  • 16
    • 84903541442 scopus 로고    scopus 로고
    • Adaptable, model-driven security engineering for saas cloud-based applications
    • M. Almorsy, J. Grundy, and A. S. Ibrahim, "Adaptable, Model-driven Security Engineering for SaaS Cloud-based Applications," Automated Software Engineering Journal, vol. 29, 2013, pp1-38.
    • (2013) Automated Software Engineering Journal , vol.29 , pp. 1-38
    • Almorsy, M.1    Grundy, J.2    Ibrahim, A.S.3
  • 17
    • 84903548669 scopus 로고    scopus 로고
    • Common Criteria for Information Technology Security Evaluation, Accessed on August
    • Common Criteria for Information Technology Security Evaluation, "Part 1: Introduction and general model, Version 3. 1," 2006, http://www. commoncriteriaportal. org/files/ccfiles/CC PART1V3. 1R1. pdf, Accessed on August 2013.
    • (2013) Part 1: Introduction and General Model, Version 3. 1 2006
  • 18
    • 73449140991 scopus 로고    scopus 로고
    • The physics" of notations: Toward a scientific basis for constructing visual notations in software engineering
    • D. Moody, "The "Physics" of Notations: Toward a Scientific Basis for Constructing Visual Notations in Software Engineering," IEEE Transactions on Software Engineering, vol. 35, pp. 756-779, 2009.
    • (2009) IEEE Transactions on Software Engineering , vol.35 , pp. 756-779
    • Moody, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.