CIA-Level 기반 보안내재화 개발 프레임워크

논문상세정보
' CIA-Level 기반 보안내재화 개발 프레임워크' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • SDL(Security Development Lifecycle)
  • SDLC(Software Development Life Cycle)
  • Secure SDLC(Secure Software Development Life Cycle)
  • Security Engineering
  • Security by Design
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
21 0

0.0%

' CIA-Level 기반 보안내재화 개발 프레임워크' 의 참고문헌

  • US Government computer penetration programs and the implications for cyberwar
  • Trustworthiness
  • Towards the Integration of Security Practices in the Software Implementation Process of ISO/IEC 29110: A Mapping
  • Towards security requirements management for software product lines: A security domain requirements engineering process
  • Towards ensuring security by design in cyber-physical systems engineering processes
  • Threat analysis and modeling during a software development lifecycle of a software application
  • The trustworthy computing security development lifecycle
  • The practice of secure software development in SDLC: an investigation through existing model and a case study
  • The information technology security evaluation criteria (ITSEC)
  • The challenges of privacy by design
  • The canadian trusted computer product evaluation criteria(CTCPEC)
  • The Department of Defense cyber strategy
  • Testing for security during development: why we should scrap penetrate-and-patch
  • Standards and Standardization:Concepts, Methodologies, Tools, and Applications
  • Springer
  • Software Assurance Maturity Model 2.0 – A guide to building
  • Security-by –design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications
  • Security risk identification in a secure software lifecycle
  • Security in the software development lifecycle
    Viega, Jon [2005]
  • Security configuration lifecycle account protection for minors
  • Security by Design Framework version 1.0
    CSA [2017]
  • Security by Design
  • Security Development Lifecycle - SDL Process Guidance Version 5.2
    Microsoft [2012]
  • Secure software lifecycle knowledge area
  • Secure device state apparatus and method and lifecycle management
  • SecSDM: a model for integrating security into the software development life cycle
  • Scopus
  • Privacy and security by design: An enterprise architecture approach
  • Pattern and Security Requirements
  • Overview of the 2nd Edition of ISO 26262: Functional Safety–Road Vehicles
  • On the secure software development process:CLASP, SDL and Touchpoints compared
  • Navigating the information security landscape: Mapping the relationship between ISO 15408: 1999 and ISO 17799: 2000
  • National Information Assurance Certification and Accreditation Process (NIACAP)
  • NIST Special Publication 800-37 Revision 2 – Risk Management Framework for Information Systems and Organizations
  • NIST SP 800-64 Revision 2 – Security Considerations in the System Development Life Cycle
  • Microsoft Vulnerabilities Report
  • Mapping the field of software life cycle security metrics
  • Integrating software lifecycle process standards with security engineering
    Lee [2002]
  • Information security management: a new paradigm
  • Implementing information security best practices on software lifecycle processes: The ISO/IEC 15504Security Extension
  • ISO/IEC 27701, Security techniques -Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management (PIMS)
  • ISO/IEC 27001, Information Security Management(ISMS)
  • ISO/IEC 15408, Information technology - Security techniques - Evaluation criteria for IT security(CC)
  • IEEE
  • Google Scholar
  • Fundamental Practices for Secure Software Development 2nd Edition
  • Fesr: A framework for eliciting security requirements based on integration of common criteria and weakness detection formal model
    Li, Hongbo [2017]
  • Exploring software security approaches in software development lifecycle: A systematic mapping study
  • Evidencebased software engineering
  • Evidence-based software engineering for practitioners
    Dyba, Tore [2005]
  • Evidence-Based Security and Privacy Assurance in Cloud Ecosystems
  • Enhanced lifecycle management of security module
  • Engineering secure future internet services and systems
  • Elsevier
  • Draft Cyber Security Regulation- final clean version (2020)
  • DoD's Information Assurance Certification & Accreditation Process
  • DoD Information Technology Security Certification and Accreditation Process (DITSCAP)
  • DoD Information Assurance Certification and Accreditation Process (DIACAP)
  • Development of an Integrated, Risk-based Platform for Information and E-services Security
  • Designing security into software during the development lifecycle
  • Department of defense trusted computer system evaluation criteria
  • Defining an adaptive software security metric from a dynamic software failure tolerance measure
  • Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
  • Cyber Resiliency Level
  • Connected Vehicle Cybersecurity Volvo Group Trucks Technology
    Volve [2018]
  • Computer security technology planning study
  • Comprehensive, Lightweight Application Security Process
  • Complex Systems Design & Management Asia
  • Comparison of SDL and Touchpoints
  • Building Security in Maturity Model 1.0
  • Building Secure Software: How to Avoid Security Problems the Right Way
    Viega, John [2011]
  • Basic concepts and taxonomy of dependable and secure computing
  • Automated lifecycle management of a computer implemented service
  • An integrated approach to safety and security based on systems theory
  • An evidence-based risk-oriented V-model methodology to develop ambient intelligent medical software
  • An Approach for Software Security Evaluation Based on ISO/IEC 15408 in the ISMS Implementation
    Nayerifard [2013]
  • ACM
  • A systematic review of security requirements engineering
  • A survey of approaches combining safety and security for industrial control systems
  • A practical guide to security engineering and information assurance
  • A novel method of security requirements development integrated common criteria
    Yin, Lei [2010]
  • A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach
  • A common criteria based security requirements engineering process for the development of secure information systems
  • A best practice approach for integration of ITIL and ISO/IEC 27001 services for information security management