Verifying Security-Control Requirements and Validating their Effectiveness

被引:0
|
作者
Hunter, Bruce
机构
关键词
D O I
10.1002/inst.201316245
中图分类号
学科分类号
摘要
引用
收藏
页码:45 / 48
相关论文
共 50 条
  • [1] VERIFYING AND VALIDATING SOFTWARE REQUIREMENTS AND DESIGN SPECIFICATIONS
    BOEHM, BW
    IEEE SOFTWARE, 1984, 1 (01) : 75 - 88
  • [2] Formal methods for specifying, validating, and verifying requirements
    Heitmeyer, Constance L.
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2007, 13 (05) : 607 - 618
  • [3] FORMALIZING AND VALIDATING COMPLEX SECURITY REQUIREMENTS
    MORRIS, P
    MCDERMID, J
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1993, 21 : 113 - 124
  • [4] Decision Support for Security-Control Identification Using Machine Learning
    Bettaieb, Seifeddine
    Shin, Seung Yeob
    Sabetzadeh, Mehrdad
    Briand, Lionel
    Nou, Gregory
    Garceau, Michael
    REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY (REFSQ 2019), 2019, 11412 : 3 - 20
  • [5] SECURITY-CONTROL METHODS FOR STATISTICAL DATABASES - A COMPARATIVE-STUDY
    ADAM, NR
    WORTMANN, JC
    COMPUTING SURVEYS, 1989, 21 (04) : 515 - 556
  • [6] The SCR method for formally specifying, verifying, and validating requirements: Tool support
    Heitmeyer, C
    Kirby, J
    Labaw, B
    PROCEEDINGS OF THE 1997 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 1997, : 610 - 611
  • [7] Validating Security Policy Conformance with WS-Security Requirements
    Satoh, Fumiko
    Uramoto, Naohiko
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2010, 6434 : 133 - 148
  • [8] Validating and verifying the requirements and design of a haemodialysis machine using the Rodin toolset
    Thai Son Hoang
    Snook, Colin
    Salehi, Asieh
    Butler, Michael
    Ladenberger, Lukas
    SCIENCE OF COMPUTER PROGRAMMING, 2018, 158 : 122 - 147
  • [9] Validating Safety and Security Requirements for Partitioned Architectures
    Delange, Julien
    Pautet, Laurent
    Feiler, Petet
    RELIABLE SOFTWARE TECHNOLOGIES - ADA-EUROPE 2009, 2009, 5570 : 30 - +
  • [10] Security Guidelines: Requirements Engineering for Verifying Code Quality
    Zhioua, Zeineb
    Roudier, Yves
    Short, Stuart
    Ameur, Rabea Boulifa
    2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW), 2016, : 80 - 85