Presentation 2014/5/15
Study of security request / requirement acquisition technique of Web application renewal time
MUTSUO NOGUCHI, TAKAO OKUBO, HIDEHIKO TANAKA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Recently, the Web site that is exposed to the Internet, unauthorized access is routinely performed. Along with it, the importance of information security measures has increased. However, that there are situations in which the purchaser is left to the discretion of the contractor security measures, measures that takes into account the security from the most upstream of the development process is not performed, have contributed to produce a vulnerability. Assuming confirmation of acceptance test, in order to reduce as much as possible the security knowledge that is required, we have considered an approach that extends the feature-based system security pattern. Thus, it is expected that it is possible to derive the security requirements in the ordering party. In this paper, we introduce the technique under consideration, shows the situation on the study approach for obtaining a security request / requirements for the Web application renewal time.
Keyword(in Japanese) (See Japanese page)
Keyword(in English)
Paper # Vol.2014-CSEC-65 No.4,Vol.2014-IOT-25 No.4
Date of Issue

Conference Information
Committee ICM
Conference Date 2014/5/15(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information and Communication Management(ICM)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Study of security request / requirement acquisition technique of Web application renewal time
Sub Title (in English)
Keyword(1)
1st Author's Name MUTSUO NOGUCHI
1st Author's Affiliation Institute of Information Security()
2nd Author's Name TAKAO OKUBO
2nd Author's Affiliation Institute of Information Security
3rd Author's Name HIDEHIKO TANAKA
3rd Author's Affiliation Institute of Information Security
Date 2014/5/15
Paper # Vol.2014-CSEC-65 No.4,Vol.2014-IOT-25 No.4
Volume (vol) vol.114
Number (no) 43
Page pp.pp.-
#Pages 4
Date of Issue