Engineering, International Conference on Software
Engineering, pp. 227-239. ACM Press.
Dittrich, K., Tombros, D., Geppert, A., 2000. Databases in
Software Engineering: A Roadmap. In Proceedings of
the Conference on The Future of Software
Engineering, International Conference on Software
Engineering, pp. 291-302. ACM Press.
Finkelstein, A., Kramer, J., 2000. Software Engineering: A
Roadmap. In Proceedings of the Conference on The
Future of Software Engineering, International
Conference on Software Engineering, pp. 3-22. ACM
Press.
Harrison, W., Ossher, H., Tarr, P., 2000. Software
Engineering Tools and Environments: A Roadmap. In
Proceedings of the Conference on The Future of
Software Engineering, International Conference on
Software Engineering, pp. 261-277. ACM Press.
Horie, D., Morimoto, S., Azimah, N., Goto, Y., Cheng, J.,
2008. ISEDS: An Information Security Engineering
Database System Based on ISO Standards. In
Proceedings of the 3rd International Conference on
Availability, Reliability and Security, pp. 1219-1225.
IEEE Computer Society Press.
Horie, D., Yajima, Kasahara, T., Goto, Y., Cheng, J.,
2009. A New Model of Software Life Cycle Processes
for Consistent Design, Development, Management,
and Maintenance of Secure Information Systems. In
Proceedings of the 8th IEEE/ACIS International
Conference on Computer and Information Science, to
appear, IEEE Computer Society Press.
Horie, D., Yajima, K., Azimah, N., Goto, Y., Cheng, J.,
2009. GEST: A Generator of ISO/IEC 15408 Security
Target Templates. Studies in Computational
Intelligence, to appear, Springer-Verlag.
IEEE Computer Society, 1990. IEEE Standard 610: IEEE
Standard Computer Dictionary – A Compilation of
IEEE Standard Computer Glossaries. IEEE Computer
Society Press.
IEEE Computer Society, 1990. IEEE Standard 610.12-
1990: IEEE Standard Glossary of Software
Engineering Terminology. IEEE Computer Society
Press.
ISO/IEC, 2005. ISO/IEC 15408-1:2005: Information
Technology - Security Techniques - Evaluation
Criteria for IT Security.
ISO/IEC, 2005. ISO/IEC 27001: Information technology -
Security techniques - Information security
management systems.
ISO/IEC, 2005. ISO/IEC 27002: Information technology -
Security techniques - Code of practice for information
security management.
ISO/IEC, 2007. ISO/IEC 27006: Information technology -
Security techniques - Requirements for bodies
providing audit and certification of Information
Security Management Systems.
ISO/IEC, 2008. ISO/IEC 12207: Systems and Software
Engineering Software Life Cycle Processes.
ISO/IEC, 2008. ISO/IEC 27000: Information technology -
Security techniques - information security
management systems - Overview and vocabulary.
ISO/IEC, 2008. ISO/IEC 27005: Information technology -
Security techniques - Information security risk
management.
Morimoto, S., Shigematsu, S., Goto, Y., Cheng, J., 2007.
Formal Verification of Security Specifications with
Common Criteria. In Proceedings of the 22nd Annual
ACM Symposium on Applied Computing, pp. 1506–
1512. ACM Press.
Morimoto, S., Shigematsu, S., Goto, Y., Cheng, J., 2008.
Classification, Formalization and Verification of
Security Functional Requirements. In V. Geffert et al.
(Eds.), SOFSEM 2008: Theory and Practice of
Computer Science, 34th Conference on Current
Trends in Theory and Practice of Computer Science,
Novy Smokovec, High Tatras, Slovakia, January 19-
25, 2008, Proceedings. Lecture Notes in Computer
Science, Vol. 4910, pp. 622-633. Springer-Verlag.
Naur, P., Randell, B., (Eds.), 1969. Software Engineering:
Report of a conference sponsored by the NATO
Science Committee, Garmisch, Germany, 7-11 Oct.
1968. NATO.
Yajima, K., Morimoto, S., Horie, D., Azreen, N. S., Goto,
Y., Cheng, J., 2009. FORVEST: A Formal
Verification Support Tool of Security Specifications
with ISO/IEC 15408. In Proceedings of the 4th
International Conference on Availability, Reliability
and Security, pp. 624-629. IEEE Computer Society
Press.
SECRYPT 2009 - International Conference on Security and Cryptography
400