Presentation | 2014/5/15 Study of security request / requirement acquisition technique of Web application renewal time MUTSUO NOGUCHI, TAKAO OKUBO, HIDEHIKO TANAKA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Recently, the Web site that is exposed to the Internet, unauthorized access is routinely performed. Along with it, the importance of information security measures has increased. However, that there are situations in which the purchaser is left to the discretion of the contractor security measures, measures that takes into account the security from the most upstream of the development process is not performed, have contributed to produce a vulnerability. Assuming confirmation of acceptance test, in order to reduce as much as possible the security knowledge that is required, we have considered an approach that extends the feature-based system security pattern. Thus, it is expected that it is possible to derive the security requirements in the ordering party. In this paper, we introduce the technique under consideration, shows the situation on the study approach for obtaining a security request / requirements for the Web application renewal time. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | |
Paper # | Vol.2014-CSEC-65 No.4,Vol.2014-IOT-25 No.4 |
Date of Issue |
Conference Information | |
Committee | ICM |
---|---|
Conference Date | 2014/5/15(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information and Communication Management(ICM) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Study of security request / requirement acquisition technique of Web application renewal time |
Sub Title (in English) | |
Keyword(1) | |
1st Author's Name | MUTSUO NOGUCHI |
1st Author's Affiliation | Institute of Information Security() |
2nd Author's Name | TAKAO OKUBO |
2nd Author's Affiliation | Institute of Information Security |
3rd Author's Name | HIDEHIKO TANAKA |
3rd Author's Affiliation | Institute of Information Security |
Date | 2014/5/15 |
Paper # | Vol.2014-CSEC-65 No.4,Vol.2014-IOT-25 No.4 |
Volume (vol) | vol.114 |
Number (no) | 43 |
Page | pp.pp.- |
#Pages | 4 |
Date of Issue |