Misuse Case 모델을 이용한 CC기반의 보안요구사항 분식 및 명제 방법론
Vol. 14, No. 3, pp. 85-100,
6월.
2004
10.13089/JKIISC.2004.14.3.85, Full Text:
Keywords: Security requirement, Misuse Case Model, Common Criteria
Abstract Statistics
Cite this article
10.13089/JKIISC.2004.14.3.85, Full Text:
Keywords: Security requirement, Misuse Case Model, Common Criteria
Abstract Statistics
Cite this article
[IEEE Style]
최상수, 장세진, 최명길, 이강수, "A Methodology for CC-based Security Requirements Analysis and Specification by using Misuse Case Model," Journal of The Korea Institute of Information Security and Cryptology, vol. 14, no. 3, pp. 85-100, 2004. DOI: 10.13089/JKIISC.2004.14.3.85.
[ACM Style]
최상수, 장세진, 최명길, and 이강수. 2004. A Methodology for CC-based Security Requirements Analysis and Specification by using Misuse Case Model. Journal of The Korea Institute of Information Security and Cryptology, 14, 3, (2004), 85-100. DOI: 10.13089/JKIISC.2004.14.3.85.