{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:45:37Z","timestamp":1759092337358,"version":"3.30.1"},"reference-count":23,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2002,8,1]],"date-time":"2002-08-01T00:00:00Z","timestamp":1028160000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2002,8]]},"DOI":"10.1016\/s0167-4048(02)00413-3","type":"journal-article","created":{"date-parts":[[2002,10,11]],"date-time":"2002-10-11T16:45:26Z","timestamp":1034354726000},"page":"345-355","source":"Crossref","is-referenced-by-count":11,"title":["Integrating Software Lifecycle Process Standards with Security Engineering"],"prefix":"10.1016","volume":"21","author":[{"given":"Younghwa","family":"Lee","sequence":"first","affiliation":[]},{"given":"Jintae","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Zoonky","family":"Lee","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(02)00413-3_BIB1","doi-asserted-by":"crossref","unstructured":"Friedman, B., Kahn, P. H. Jr, and Howe, D.C. \u201cTrust online\u201d Communications of the ACM, Vol. 43(12), pp. 34\u201340, 2000.","DOI":"10.1145\/355112.355120"},{"key":"10.1016\/S0167-4048(02)00413-3_BIB2","doi-asserted-by":"crossref","unstructured":"Hinde, S., \u201cPrivacy and security \u2014 The drivers for growth of E-commerce\u201d, Computers & Security, Vol. 17(6), pp.475\u2013478, 1998.","DOI":"10.1016\/S0167-4048(98)80069-2"},{"key":"10.1016\/S0167-4048(02)00413-3_BIB3","doi-asserted-by":"crossref","unstructured":"Talwatte, G \u201cE-commerce is key to global competitiveness \u2014 but is there anyone you can trust in the online world?\u201d Business Information Review, Vol. 17(2), pp. 78\u201381, 2000.","DOI":"10.1177\/0266382004237557"},{"key":"10.1016\/S0167-4048(02)00413-3_BIB4","unstructured":"Baskerville, R., \u201cThe Developmental Duality of Information Systems Security,\u201d Journal of Management Systems, Vol. 4(1), pp. 1\u201312, 1992."},{"key":"10.1016\/S0167-4048(02)00413-3_BIB5","doi-asserted-by":"crossref","unstructured":"Baskerville, R., \u201cInformation Systems Security Design Methods: Implications for Information Systems Development,\u201d ACM Computing Surveys, Vol. 25(4), pp. 375\u2013414, 1993.","DOI":"10.1145\/162124.162127"},{"key":"10.1016\/S0167-4048(02)00413-3_BIB6","unstructured":"SSE-CMM Project, Systems SE Capability Maturity Model-Version 2.0, April 1999, http:\/\/www.sse-cmm.org\/Papers\/SSECMMv2Final.pdf."},{"key":"10.1016\/S0167-4048(02)00413-3_BIB7","doi-asserted-by":"crossref","unstructured":"Higginbotham, M. D., Maley, J., Milheizler, A.J., and Suskie, B.J., \u201cIntegrating Information SE with System Engineering with System Engineering Tools,\u201d Proceedings of 7th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 320\u2013326, 1998.","DOI":"10.1109\/ENABL.1998.725712"},{"key":"10.1016\/S0167-4048(02)00413-3_BIB8","unstructured":"Lee, Y., Lee, C., and Lee, Z. \u201cA Study of Integrating the Security Engineering Process into the Software Lifecycle Process Standard (IEEE\/EIA 12207),\u201d Proceedings of the Annual Meeting of the Association for Information Systems, Long Beach, CA, 2000."},{"key":"10.1016\/S0167-4048(02)00413-3_BIB9","unstructured":"IEEE, IEEE\/EIA 12207 \u2014 Industry Implementation of International Standard ISO\/IEC 12207, 1998."},{"key":"10.1016\/S0167-4048(02)00413-3_BIB10","unstructured":"Moore, J.W., IEEE\/EIA 12207 as the foundation for enterprise software processes,\u201d Proceedings of 16th Annual Pacific Northwest Software Quality Conference, pp.326\u2013333."},{"key":"10.1016\/S0167-4048(02)00413-3_BIB11","unstructured":"DoD, Trusted Computer System Evaluation Criteria, DoD-Std-5200.28, 1985."},{"key":"10.1016\/S0167-4048(02)00413-3_BIB12","doi-asserted-by":"crossref","unstructured":"Tompkins, F.G. and Rice, R., \u201cIntegrating Security Activities into the Software Development Lifecycle and the Software Quality Assurance Process,\u201d Computers & Security, Vol. 5, pp.218\u2013242, 1986.","DOI":"10.1016\/0167-4048(86)90014-3"},{"key":"10.1016\/S0167-4048(02)00413-3_BIB13","doi-asserted-by":"crossref","unstructured":"Badenhorst, K.P. and Eloff, J.H.P. \u201cFramework of a Methodology for the Lifecycle of Computer Security in an Organization,\u201d Computers & Security, Vol. 8, pp.432\u2013442, 1989.","DOI":"10.1016\/0167-4048(89)90025-4"},{"key":"10.1016\/S0167-4048(02)00413-3_BIB14","unstructured":"Weiss J., \u201cA System SE Process,\u201d Proceedings of the 14th National Computer Security Conference, pp. 572\u2013581, 1991."},{"key":"10.1016\/S0167-4048(02)00413-3_BIB15","doi-asserted-by":"crossref","unstructured":"Bodeau, D.J. \u201cSystems-of-Systems Security Engineering,\u201d Proceedings of the 10th Annual Computer Security Applications Conference, pp. 228\u2013235, 1994.","DOI":"10.1109\/CSAC.1994.367304"},{"key":"10.1016\/S0167-4048(02)00413-3_BIB16","unstructured":"Marshall D. A., Jajodia, S., and Podell, H. J. Security Engineering, IEEE Computer Society Press, pp.330\u2013349, 1995."},{"key":"10.1016\/S0167-4048(02)00413-3_BIB17","doi-asserted-by":"crossref","unstructured":"Booysen, H.A.S. and Eloff, J.H.P., \u201cA Methodology for the Development of Secure Application Systems,\u201d In Information Security-The Next Decade: Proc. of IFIP Information Security, Chapman & Hall, pp.255\u2013269, 1995.","DOI":"10.1007\/978-0-387-34873-5_20"},{"key":"10.1016\/S0167-4048(02)00413-3_BIB18","doi-asserted-by":"crossref","unstructured":"Tettero, O., Out, D.J., Franken, H.M. and Schot, J. \u201cInformation Security Embedded in the Design of Telematics Systems,\u201d Computers & Security, Vol. 16(2), pp.145\u2013164, 1997.","DOI":"10.1016\/S0167-4048(97)00003-5"},{"key":"10.1016\/S0167-4048(02)00413-3_BIB19","unstructured":"The Common Criteria Implementation Board (CCIB), Common Criteria for Information Technology Security Evaluation ver.2.1, http:\/\/csrc.nist.gov\/cc\/ccv20\/ccv2list.htm#CCV21, 2000."},{"key":"10.1016\/S0167-4048(02)00413-3_BIB20","doi-asserted-by":"crossref","unstructured":"Boehm, B.W. \u201cA Spiral Model of Software Development and Enhancement,\u201d Computer, Vol. 21(5), pp. 61\u201372, 1988.","DOI":"10.1109\/2.59"},{"key":"10.1016\/S0167-4048(02)00413-3_BIB21","doi-asserted-by":"crossref","unstructured":"Shimeall, T. J. and John J. McDermott \u201cSoftware Security in an Internet World: An Executive Summary,\u201d IEEE Software, pp.58\u201362, 1999.","DOI":"10.1109\/52.776950"},{"key":"10.1016\/S0167-4048(02)00413-3_BIB22","doi-asserted-by":"crossref","unstructured":"Mostert, D.N.J. and Solms, S.H., \u201c A Methodology to Include Computer Security, Safety and Resilience Requirement as Part of the User Requirement,\u201d Computers & Security, Vol. 13(4), pp. 349\u2013364, 1994.","DOI":"10.1016\/0167-4048(94)90025-6"},{"key":"10.1016\/S0167-4048(02)00413-3_BIB23","doi-asserted-by":"crossref","unstructured":"James, H. L., \u201cManaging Information Systems Security: A Soft Approach,\u201d Proceedings of Information Systems Conference of New Zealand, IEEE Software Press, pp. 10\u201320,1996.","DOI":"10.1109\/ISCNZ.1996.554947"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404802004133?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404802004133?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T02:03:44Z","timestamp":1733709824000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404802004133"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,8]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2002,8]]}},"alternative-id":["S0167404802004133"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(02)00413-3","relation":{},"ISSN":["0167-4048"],"issn-type":[{"type":"print","value":"0167-4048"}],"subject":[],"published":{"date-parts":[[2002,8]]}}}