Zhendong Ma, Christian Wagner, Arndt Bonitz, Thomas Bleier, Robert Woitsch, Markus Nichterl
언어
영어(ENG)
URL
https://www.earticle.net/Article/A210080
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
원문정보
초록
영어
Building security into software development lifecycles and doing it right is hard. To address the challenge, several prominent organizations have published process-oriented se- curity guidelines to bring security activities into a structured way. Although these eorts contribute to measurable improvements in software and system security, they are often too verbose and fuzzy to be implementable in a development lifecycle involving people (e.g., security experts, developers, and managers) with dierent skillsets. In this paper, we pro- pose the model-driven secure development lifecycle (MD-SDL), an approach that leverages on modeling methods and the advances in model-driven security to simplify the process of eciently integrating security into development lifecycles for the development of security- critical software and systems.
목차
Abstract 1 Introduction 2 Approaches to security in development lifecycle 3 Model-driven secure development lifecycle 3.1 Model architecture 3.2 Realization 4 Conclusion Acknowledgment References
저자
Zhendong Ma [ Safety & Security Department, Austrian Institute of Technology ]
Christian Wagner [ Safety & Security Department, Austrian Institute of Technology ]
Arndt Bonitz [ Safety & Security Department, Austrian Institute of Technology ]
Thomas Bleier [ Safety & Security Department, Austrian Institute of Technology ]
보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
설립연도
2006
분야
공학>컴퓨터학
소개
1. 보안공학에 대한 각종 조사 및 연구
2. 보안공학에 대한 응용기술 연구 및 발표
3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최
4. 보안공학 기술의 상호 협조 및 정보교환
5. 보안공학에 관한 표준화 사업 및 규격의 제정
6. 보안공학에 관한 산학연 협동의 증진
7. 국제적 학술 교류 및 기술 협력
8. 보안공학에 관한 논문지 발간
9. 기타 본 회 목적 달성에 필요한 사업
간행물
간행물명
International Journal of Security and Its Applications
간기
격월간
pISSN
1738-9976
수록기간
2008~2016
등재여부
SCOPUS
십진분류
KDC 505DDC 605
이 권호 내 다른 논문 / International Journal of Security and Its Applications Vol.6 No.2