References
- 정보보호시스템 평가/인증 가이드 한국정보보호진흥원
- Common Criteria for Information Technology Security Evaluation(version2.1) CCIMB-99-031 CC
- Common Evaluation Methodology(version1.0) CEM-99/045 CC
- Final Interpretations
- CCRA(Arrangement on the Recongnition of Common Criteria Certificates)
- UML in a Nutshell, O'Reilly S.Alhir
- Object-Oriented Software Engineering:A Use Case Driven Approach I.Jacobson(et al.)
- Proc. TOOLS-USA'99 Use Case Pitfalls:Top 10 Problems from Real Projects Using Use Cases S.Lilly
- Proc. 14th Norwegian Informatics Conference(NIK'2001) Capturing Security Requirements through Misuse Cases G.Sindre;A.L.Opdahl
- Proc. 7th International Workshop on Requirements Engineering:Foundation of Software Quality(REFSQ'2001) Templates for Misuse Case Description G.Sindre;A.L.Opdahl
- IEEE Software v.20 no.1 Misuse Cases-Use Cases with Hostile Intent I.Alexander https://doi.org/10.1109/MS.2003.1159030
- Computing and Control Engineering v.14 no.1 Misuse Cases Help to Elicit Non-Functional Requirements I.Alexander https://doi.org/10.1049/cce:20030108
- Proc. 8th International Workshop on Requirements Engineering:Foundation for Software Quality(REFSQ'02) Modeling the Interplay of Conflicting Goals with Use and Misuse Cases I.Alexander
- Proc. 37th Technology of Object-Oriented Lanauages and Systems(TOOLS-37 Pacific 2000) Eliciting Security Requirements by Misuse Cases J.McDermott
- Proc. Annual Computer Security Applications Conference(ACSAC'99) Using Abuse Case Models for Security Requirements Analysis J.McDermott;C.Fox
- Proc. 17th Annual Computer Security Applications Conference(ACSAC'01) Abuse Case Based Assurance Arguments J.McDermott
- Journal of Object Technology(JOT) v.2 no.3 Security Use Cases Donald,G.Firesmith https://doi.org/10.5381/jot.2003.2.3.c6
- 한국전자거래학회지 v.8 no.3 PP의 보안환경을 위한 위협문장 생성방법 고정호;이강수
- ISO/IEC PDTR 15446, Draft Information technology-Security techniques-Guide for the production of protection profiles and security targets
- CC Profiling Knowledge base Report List of Threat, Attack, Policy, Assumption, and Environment Statement Attribute NIAP
- PP-008, DBMS Protection Profile,EAL3, Issue 2.1 Oracle
- Oracle 8, Security Targer, Release 8.0.5.