메뉴 건너뛰기




Volumn 685 LNCS, Issue , 1993, Pages 234-251

Dealing with security requirements during the development of information systems

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; SYSTEMS ENGINEERING;

EID: 84979855000     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (59)

References (49)
  • 1
    • 0026904804 scopus 로고
    • Threats and Countermeasures
    • Aug
    • J. A. Adam, “Threats and Countermeasures,” IEEE Spectrum, vol. 29, no. 8, Aug. 1992, pp. 21-28.
    • (1992) IEEE Spectrum , vol.29 , Issue.8 , pp. 21-28
    • Adam, J.A.1
  • 4
    • 0024884419 scopus 로고
    • Developing Trusted Systems Using DOD-STD-2167A
    • Tucson, Arizona, Dec. 4-8
    • T. C. Vickers Benzel, “Developing Trusted Systems Using DOD-STD-2167A,” 5th Annual Computer Security Appl. Conf., Tucson, Arizona, Dec. 4-8, 1989, pp. 166-176.
    • (1989) 5th Annual Computer Security Appl. Conf. , pp. 166-176
    • Vickers Benzel, T.C.1
  • 5
    • 0001968281 scopus 로고
    • A Spiral Model of Software Development and Enhancement
    • Aug.
    • B. W. Boehm, “A Spiral Model of Software Development and Enhancement”, Vol. 11, No. 4, ACM Software Eng. Notes, Aug. 1986.
    • (1986) ACM Software Eng. Notes , vol.11 , Issue.4
    • Boehm, B.W.1
  • 6
    • 0023327666 scopus 로고
    • Cost-Effective Modeling for a Decision Support System in Computer Security
    • Apr
    • T. Bui and T. R. Sivasankaran, “Cost-Effective Modeling for a Decision Support System in Computer Security,” Computers & Security, vol. 6, no. 2, Apr. 1987, pp. 139-151.
    • (1987) Computers & Security , vol.6 , Issue.2 , pp. 139-151
    • Bui, T.1    Sivasankaran, T.R.2
  • 9
    • 84976742023 scopus 로고
    • Representation and Utilization of Non-Functional Requirements for Information System Design.
    • In R. Anderson, J. A. Bubenko, Jr., A. Sølvberg (Eds.),, Proc, 3rd Int. Conf. CAiSE '91, Trondheim, Norway, May 13-15, 1991. Berlin: Springer-Verlag
    • L. Chung, “Representation and Utilization of Non-Functional Requirements for Information System Design.” In R. Anderson, J. A. Bubenko, Jr., A. Sølvberg (Eds.), Advanced Information Systems Eng., Proc, 3rd Int. Conf. CAiSE '91, Trondheim, Norway, May 13-15, 1991. Berlin: Springer-Verlag, 1991, pp. 5-30.
    • (1991) Advanced Information Systems Eng. , pp. 5-30
    • Chung, L.1
  • 11
    • 0023266943 scopus 로고
    • A Comparison of Commercial and Military Computer Security Policies
    • D. D. Clark and D. R. Wilson, “A Comparison of Commercial and Military Computer Security Policies,” Proc. IEEE Symp. Security and Privacy, 1987, pp. 184-194.
    • (1987) Proc. IEEE Symp. Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 12
    • 0024915716 scopus 로고
    • Software Methodology for Development of a Trusted BMS: Identification of Critical Problems
    • Tucson, Arizona, Dec. 4-8
    • S. D. Crocker, “Software Methodology for Development of a Trusted BMS: Identification of Critical Problems,” 5th Annual Computer Security Appl. Conf., Tucson, Arizona, Dec. 4-8, 1989, pp. 148-165.
    • (1989) 5th Annual Computer Security Appl. Conf. , pp. 148-165
    • Crocker, S.D.1
  • 18
    • 0026155024 scopus 로고
    • Teamwork Support in a Knowledge-Based Information Systems Environment
    • May
    • U. Hahn, M. Jarke and T. Rose, “Teamwork Support in a Knowledge-Based Information Systems Environment,” IEEE Trans. Software Eng., vol. 17, no. 5, May 1991, pp. 467-482
    • (1991) IEEE Trans. Software Eng. , vol.17 , Issue.5 , pp. 467-482
    • Hahn, U.1    Jarke, M.2    Rose, T.3
  • 19
    • 0017215271 scopus 로고
    • Full Protection Specification in the Semantic Model for Database Protection Languages
    • Houston, TX, Oct
    • H. R. Hartson and D. K. Hsiao, “Full Protection Specification in the Semantic Model for Database Protection Languages,” Proc. ACM Annual Conf., Houston, TX, Oct. 1976, pp. 90-95.
    • (1976) Proc. ACM Annual Conf. , pp. 90-95
    • Hartson, H.R.1    Hsiao, D.K.2
  • 28
    • 0022593664 scopus 로고
    • Another Look at the Use of Noise Addition for Database Security
    • N. S. Matloff, “Another Look at the Use of Noise Addition for Database Security,” Proc. IEEE Symp. Security and Privacy, 1986, pp. 173-180.
    • (1986) Proc. IEEE Symp. Security and Privacy , pp. 173-180
    • Matloff, N.S.1
  • 29
    • 53349099913 scopus 로고
    • The Pareto Principle Applied to Software Quality Assurance
    • In G. Gordon Schulmeyer and James I. McManus (Eds.),, New York: Van Nostrand Reinhold
    • T. J. McCabe and G. G. Schulmeyer, “The Pareto Principle Applied to Software Quality Assurance,” In G. Gordon Schulmeyer and James I. McManus (Eds.), Handbook of Software Quality Assurance, New York: Van Nostrand Reinhold, 1987, pp. 178-210.
    • (1987) Handbook of Software Quality Assurance , pp. 178-210
    • McCabe, T.J.1    Schulmeyer, G.G.2
  • 30
    • 0023965320 scopus 로고
    • The Source of Authority for Commercial Access Control
    • Feb
    • J. D. Moffett and M. S. Sloman, “The Source of Authority for Commercial Access Control,” IEEE Computer, vol. 21, no. 2, Feb. 1988, pp. 59-69.
    • (1988) IEEE Computer , vol.21 , Issue.2 , pp. 59-69
    • Moffett, J.D.1    Sloman, M.S.2
  • 32
    • 0026883734 scopus 로고
    • Representing and Using Non-Functional Requirements: A Process-Oriented Approach
    • June
    • J. Mylopoulos, L. Chung and B. Nixon, “Representing and Using Non-Functional Requirements: A Process-Oriented Approach,” IEEE Trans. Software Eng., vol. 18, no. 6, June 1992, pp. 483-497.
    • (1992) IEEE Trans. Software Eng. , vol.18 , Issue.6 , pp. 483-497
    • Mylopoulos, J.1    Chung, L.2    Nixon, B.3
  • 33
    • 2142703299 scopus 로고
    • On Hierarchical Designs of Computer Systems for Critical Applications
    • SE-12, no. 9, Sept
    • P. G. Neumann, “On Hierarchical Designs of Computer Systems for Critical Applications,” IEEE Trans. Software Eng., SE-12, no. 9, Sept. 1986, pp. 905-920.
    • (1986) IEEE Trans. Software Eng. , pp. 905-920
    • Neumann, P.G.1
  • 34
    • 45949101714 scopus 로고
    • Illustrative Risks to the Public in the Use of Computer Systems and Related Technology
    • Jan
    • P. G. Neumann (compiler), “Illustrative Risks to the Public in the Use of Computer Systems and Related Technology,” ACM Software Eng. Notes, vol. 16, no. 1, Jan. 1991, pp. 2-9.
    • (1991) ACM Software Eng. Notes , vol.16 , Issue.1 , pp. 2-9
    • Neumann, P.G.1
  • 36
    • 33749909775 scopus 로고
    • Dealing with Performance Requirements During the Development of Information Systems
    • Jan
    • B. Nixon, “Dealing with Performance Requirements During the Development of Information Systems”, IEEE Int. Symp. Requirements Eng., Jan. 1993, pp. 42-49.
    • (1993) IEEE Int. Symp. Requirements Eng. , pp. 42-49
    • Nixon, B.1
  • 37
    • 0021425587 scopus 로고
    • The Many Faces of Data Vulnerability
    • May
    • D. B. Parker, “The Many Faces of Data Vulnerability,” IEEE Spectrum, vol. 21, no. 5, May 1984, pp. 46-49.
    • (1984) IEEE Spectrum , vol.21 , Issue.5 , pp. 46-49
    • Parker, D.B.1
  • 39
    • 0021425586 scopus 로고
    • Can Computer Crime be Stopped?
    • May
    • T. S. Perry and P. Wallich, “Can Computer Crime be Stopped?", IEEE Spectrum, Vol. 21, No. 5, May 1984, pp. 34-45.
    • (1984) IEEE Spectrum , vol.21 , Issue.5 , pp. 34-45
    • Perry, T.S.1    Wallich, P.2
  • 43
    • 0024908746 scopus 로고
    • Multilevel Secure Database Design: A Practical Application
    • Tucson, Arizona, Dec. 4-8
    • G. W. Smith, “Multilevel Secure Database Design: A Practical Application,” 5th Annual Computer Security Appl. Conf., Tucson, Arizona, Dec. 4-8, 1989, pp. 314- 321.
    • (1989) 5th Annual Computer Security Appl. Conf. , pp. 314-321
    • Smith, G.W.1
  • 44
    • 85028877311 scopus 로고
    • Design Aspects of Access Control in a Knowledge Base System
    • Paris, March
    • G. Steinke, “Design Aspects of Access Control in a Knowledge Base System,” SECURICOM '90, Paris, March, 1990.
    • (1990) SECURICOM '90
    • Steinke, G.1
  • 46
    • 0009708727 scopus 로고
    • Integrating Security Activities Into the Software Development Life Cycle and the Software Quality Assurance Process
    • Sept
    • F. G. Tompkins and R. Rice, “Integrating Security Activities Into the Software Development Life Cycle and the Software Quality Assurance Process,” Computers & Security, vol. 5, no. 3, Sept. 1986, pp. 218-242.
    • (1986) Computers & Security , vol.5 , Issue.3 , pp. 218-242
    • Tompkins, F.G.1    Rice, R.2
  • 49
    • 0019145446 scopus 로고
    • Data Base Security: Requirements, Policies, and Models
    • C. Wood, E. B. Fernandez and R. C. Summers, “Data Base Security: Requirements, Policies, and Models,” IBM Syst. J., vol. 19, no. 2, 1980, pp. 229-252.
    • (1980) IBM Syst. J. , vol.19 , Issue.2 , pp. 229-252
    • Wood, C.1    Fernandez, E.B.2    Summers, R.C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.