메뉴 건너뛰기




Volumn 22, Issue 3, 2003, Pages 256-264

Fault trees for security system design and analysis

Author keywords

Fault tree analysis; Security

Indexed keywords

FAULT TREE ANALYSIS; LOGIC CIRCUITS; PUBLIC KEY CRYPTOGRAPHY; SYSTEMS ANALYSIS;

EID: 0037903638     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(03)00313-4     Document Type: Article
Times cited : (82)

References (15)
  • 1
    • 85031178384 scopus 로고
    • US Nuclear Regulatory Commission, Fault Tree Handbook, NUREG-0492 (January).
    • US Nuclear Regulatory Commission, Fault Tree Handbook, NUREG-0492 (January 1981).
    • (1981)
  • 2
    • 0003702671 scopus 로고    scopus 로고
    • Fault tree analysis programs
    • materials and Engineering Department, University of Maryland.
    • Fault tree analysis programs, http://www.enre.umd.edu/ftap.htm, materials and Engineering Department, University of Maryland.
  • 6
    • 0038226150 scopus 로고    scopus 로고
    • Attack modeling for information security and survivability
    • Tech. Rep., Carnegie Mellon Software Engineering Institute (2001)
    • Moore, A., Ellison, R. and Linger, R., 2001. Attack modeling for information security and survivability. Tech. Rep., Carnegie Mellon Software Engineering Institute (2001).
    • (2001)
    • Moore, A.1    Ellison, R.2    Linger, R.3
  • 9
    • 85045573601 scopus 로고    scopus 로고
    • Using abuse case models for security requirements analysis
    • McDermott, J. and Fox, C., 1999. Using abuse case models for security requirements analysis. Proc. COMPSAC 1999, 1999.
    • (1999) Proc. COMPSAC 1999
    • McDermott, J.1    Fox, C.2
  • 11
    • 0034497420 scopus 로고    scopus 로고
    • Eliciting security requirements by miuse cases
    • IEEE Press, 2000
    • Sindre, G. and Opdahl, A., 2000. Eliciting security requirements by miuse cases. Proc. TOOLS Pacific 2000, IEEE Press, 2000.
    • (2000) Proc. TOOLS Pacific 2000
    • Sindre, G.1    Opdahl, A.2
  • 12
    • 0036037169 scopus 로고    scopus 로고
    • Using UMLsec and goal trees for secure systems development
    • ACM Press, 2002
    • Jurgens, J., 2002. Using UMLsec and goal trees for secure systems development. Proc. Symposium on Applied Computing (SAC) 2002, ACM Press, 2002.
    • (2002) Proc. Symposium on Applied Computing (SAC) 2002
    • Jurgens, J.1
  • 14
    • 35848959071 scopus 로고    scopus 로고
    • Using CSP to detect errors in the TMN protocol
    • Lowe, G. and Roscoe, B., 1997. Using CSP to detect errors in the TMN protocol. IEEE Transactions on Software Engineering, Vol. 23 (10), 1997, pp. 659-669.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.10 , pp. 659-669
    • Lowe, G.1    Roscoe, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.