Proceedings of ICECCS '96: 2nd IEEE International Conference on Engineering of Complex Computer Systems (Held Jointly With 6th
DOI: 10.1109/iceccs.1996.558413
|View full text |Cite
|
Sign up to set email alerts
|

Application of security principles to integration of enterprise, system and software engineering methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…A review of the literature certainly indicates this position is shared by others, as the use of a security engineering methodology during system development has been advocated for quite some time (Davis, 2004;Grance, Hash, & Stevens, 2004;Jei, Bae, Choi, & Lee, 2006;Levine, 2002;Lim & Carastan, 2004;McAllister, 2002;Singleton, 2007;Snyder, 2002;Stoneburner, Hayden, & Feringa, 2004;Weiss, Moore, & Robbins, 1996). Davis (2004), for example, states the case for ISSE as follows:…”
Section: Isse Processmentioning
confidence: 99%
“…A review of the literature certainly indicates this position is shared by others, as the use of a security engineering methodology during system development has been advocated for quite some time (Davis, 2004;Grance, Hash, & Stevens, 2004;Jei, Bae, Choi, & Lee, 2006;Levine, 2002;Lim & Carastan, 2004;McAllister, 2002;Singleton, 2007;Snyder, 2002;Stoneburner, Hayden, & Feringa, 2004;Weiss, Moore, & Robbins, 1996). Davis (2004), for example, states the case for ISSE as follows:…”
Section: Isse Processmentioning
confidence: 99%