메뉴 건너뛰기




Volumn 18, Issue 8, 2005, Pages 763-793

Computer and network security risk management: Theory, challenges, and countermeasures

Author keywords

Risk analysis; Risk management; Security countermeasures

Indexed keywords

INFORMATION SYSTEMS; INFRASTRUCTURES; RISK ANALYSIS; SECURITY COUNTERMEASURES;

EID: 26644436729     PISSN: 10745351     EISSN: None     Source Type: Journal    
DOI: 10.1002/dac.729     Document Type: Article
Times cited : (29)

References (25)
  • 2
    • 0018294853 scopus 로고
    • A modular approach to computer security risk management
    • Campbell RP. A modular approach to computer security risk management. Proceedings of the AFIPS Conference, vol. 48. 1979; 293-304.
    • (1979) Proceedings of the AFIPS Conference , vol.48 , pp. 293-304
    • Campbell, R.P.1
  • 7
    • 33751072193 scopus 로고    scopus 로고
    • Risk analysis and assessment
    • Chapter 15 (4th edn). Auerbach Publications, October ISBN: 0849398290
    • Ozier W. Risk analysis and assessment. Handbook of Information Security, Chapter 15 (4th edn). Auerbach Publications, October 1999; 247-285, ISBN: 0849398290.
    • (1999) Handbook of Information Security , pp. 247-285
    • Ozier, W.1
  • 10
    • 0034270432 scopus 로고    scopus 로고
    • Statically scanning Java code: Finding security vulnerabilities
    • Viega J, Mutdosch T, McGraw G. Statically scanning Java code: finding security vulnerabilities. IEEE Software 2000; 17(5):68-74.
    • (2000) IEEE Software , vol.17 , Issue.5 , pp. 68-74
    • Viega, J.1    Mutdosch, T.2    McGraw, G.3
  • 11
    • 26644438038 scopus 로고    scopus 로고
    • Towards analyzing security-critical software during development
    • RST Corporation, December
    • Ghosh AK, McGraw GE, Charron FH, Schatz MA. Towards analyzing security-critical software during development. Technical Report RSTR-96-023-01, RST Corporation, December 1996.
    • (1996) Technical Report , vol.RSTR-96-023-01
    • Ghosh, A.K.1    McGraw, G.E.2    Charron, F.H.3    Ma, S.4
  • 15
    • 0038226150 scopus 로고    scopus 로고
    • Attack modeling for information security and survivability
    • March
    • Moore AP, Ellison RJ, Linger RC. Attack modeling for information security and survivability. CMU/SEI Technical Report, CMU/SEI-2001-TN-01, March 2001, available at: http://www.sei.cmu.edu/about/website/indexes/siteIndex/ siteIndexTR.html
    • (2001) CMU/SEI Technical Report, CMU/SEI-2001-TN-01
    • Moore, A.P.1    Ellison, R.J.2    Linger, R.C.3
  • 16
    • 0034593376 scopus 로고    scopus 로고
    • Attack net penetration testing
    • Ballycotton, Country Cork, Ireland, September
    • Me Dermott J. Attack net penetration testing. The 2000 New Security Paradigms Workshop, Ballycotton, Country Cork, Ireland, September 2000.
    • (2000) The 2000 New Security Paradigms Workshop
    • Me Dermott, J.1
  • 25
    • 84902485551 scopus 로고    scopus 로고
    • An abstract reduction model for computer security risk
    • WCC-SEC, Toulouse, France
    • Hamdi M, Boudriga N. An abstract reduction model for computer security risk. IFIP World Computer Congress, WCC-SEC, Toulouse, France, 2004.
    • (2004) IFIP World Computer Congress
    • Hamdi, M.1    Boudriga, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.