메뉴 건너뛰기




Volumn , Issue , 2005, Pages 195-204

Cost-benefit trade-off analysis using BBN for aspect-oriented risk-driven development

Author keywords

Aspect Oriented Modeling (AOM); Bayesian Belief Networks (BBN); Risk Driven Development (RDD); Trade off analysis

Indexed keywords

COST EFFECTIVENESS; RISK MANAGEMENT; SECURITY SYSTEMS;

EID: 27144534308     PISSN: 27708527     EISSN: 27708535     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (35)

References (28)
  • 1
    • 27144551930 scopus 로고    scopus 로고
    • EP-27046-ACTIVE, D4.2.2, Ver. 2.0, 2001-02-22
    • EP-27046-ACTIVE, Final Prototype and User Manual, D4.2.2, Ver. 2.0, 2001-02-22., 2001.
    • (2001) Final Prototype and User Manual
  • 6
  • 14
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker behavior
    • April
    • E. Jonsson and T. Olovsson. A quantitative model of the security intrusion process based on attacker behavior. IEEE Trans. Software Eng., 4(25):235, April 1997.
    • (1997) IEEE Trans. Software Eng. , vol.4 , Issue.25 , pp. 235
    • Jonsson, E.1    Olovsson, T.2
  • 16
    • 23944491305 scopus 로고    scopus 로고
    • Tools for critical systems development with UML
    • N. Jardin Nunes, B. Selic, A. Silva, and A. Toval, editors, UML Modeling Languages and Applications. UML 2004 Satellite Activities, Lisbon, Portugal, October 11-15, 2004, Revised Selected Papers. Springer
    • J. Jürjens and P. Shabalin. Tools for Critical Systems Development with UML. In N. Jardin Nunes, B. Selic, A. Silva, and A. Toval, editors, UML Modeling Languages and Applications. UML 2004 Satellite Activities, Lisbon, Portugal, October 11-15, 2004, Revised Selected Papers, volume 3297 of LNCS. Springer, 2004.
    • (2004) LNCS , vol.3297
    • Jürjens, J.1    Shabalin, P.2
  • 17
    • 0001006209 scopus 로고
    • Local computations with probabilities on graphical structures and their application to expert systems
    • S. L. Lauritzen and D. J. Spiegelhalter. Local computations with probabilities on graphical structures and their application to expert systems (with discussion). Journal of the Royal Statistical Society, Series B 50(2): 157-224, 1988.
    • (1988) Journal of the Royal Statistical Society, Series B , vol.50 , Issue.2 , pp. 157-224
    • Lauritzen, S.L.1    Spiegelhalter, D.J.2
  • 20
    • 84858276007 scopus 로고    scopus 로고
    • Handbook for performing expert judgment
    • SINTEF
    • K. Øien and P. R. Hokstad. Handbook for performing expert judgment. Technical report, SINTEF, 1998.
    • (1998) Technical Report
    • Øien, K.1    Hokstad, P.R.2
  • 21
    • 0033325475 scopus 로고    scopus 로고
    • Experiments with quantitative evaluation tools for monitoring operational security
    • Sept/Oct
    • R. Ortalo and Y. Deswarte. Experiments with quantitative evaluation tools for monitoring operational security. IEEE Trans. Software Eng., 5(25):633-650, Sept/Oct 1999.
    • (1999) IEEE Trans. Software Eng. , vol.5 , Issue.25 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2
  • 24
    • 84867376694 scopus 로고    scopus 로고
    • SERENE: Safety and risk evaluation using bayesian nets
    • SERENE: Safety and Risk Evaluation using Bayesian Nets. ESPIRIT Framework IV nr. 22187, 1999. http://www.hugin.dk/serene/.
    • (1999) ESPIRIT Framework IV Nr. 22187
  • 27
    • 27144505986 scopus 로고    scopus 로고
    • Security analysis of sitar intrusion tolerance system
    • ACM Press
    • D. Wang, B. B. Madan, and K. S. Trivedi. Security analysis of sitar intrusion tolerance system. In ACM SSRS'03. ACM Press, 2003.
    • (2003) ACM SSRS'03
    • Wang, D.1    Madan, B.B.2    Trivedi, K.S.3
  • 28
    • 0009582826 scopus 로고    scopus 로고
    • The srp authentication and key exchange system
    • Network Working Group
    • T. Wu. The srp authentication and key exchange system, 2000. RFC 2945, Network Working Group.
    • (2000) RFC , vol.2945
    • Wu, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.