-
2
-
-
33144468364
-
Modeling information assurance: An application
-
Beauregard, J. E., Deckro, D. F., and Chambal, S. P., 2002, Modeling Information Assurance: An Application, Military Operations Research, 7 (4) 35-55.
-
(2002)
Military Operations Research
, vol.7
, Issue.4
, pp. 35-55
-
-
Beauregard, J.E.1
Deckro, D.F.2
Chambal, S.P.3
-
3
-
-
33144476299
-
-
Unpublished white paper
-
Buckshaw, D., Buede, D., and Parnell, G., 2004, "An Analysis of Methodologies to Create a Multiple Adversary Risk Model for Information Assurance." Unpublished white paper.
-
(2004)
An Analysis of Methodologies to Create a Multiple Adversary Risk Model for Information Assurance
-
-
Buckshaw, D.1
Buede, D.2
Parnell, G.3
-
4
-
-
33144477369
-
Comparison of aggregation techniques for Mission Oriented Risk and Design Analysis (MORDA) attack values
-
Innovative Decisions, Inc, September
-
Buckshaw, D., Parnell, G., Smith, G., Unkenholz, W. L., and Parks, D. L., "Comparison of Aggregation Techniques for Mission Oriented Risk and Design Analysis (MORDA) Attack Values," Innovative Decisions, Inc, Technical Report 2004-04, September, 2004.
-
(2004)
Technical Report
, vol.2004
, Issue.4
-
-
Buckshaw, D.1
Parnell, G.2
Smith, G.3
Unkenholz, W.L.4
Parks, D.L.5
-
7
-
-
0030701247
-
Information system attacks: A preliminary classification scheme
-
1997
-
Cohen, F., 1997, "Information System Attacks: A Preliminary Classification Scheme," Computer & Security, Vol. 16, No. 1, 1997, pp. 29-46.
-
(1997)
Computer & Security
, vol.16
, Issue.1
, pp. 29-46
-
-
Cohen, F.1
-
8
-
-
33144471297
-
-
unpublished white paper
-
Design Analysis Working Group (DAWG), National Security Agency, 2004, "A Comparison of Risk Assessment Methodologies," unpublished white paper.
-
(2004)
A Comparison of Risk Assessment Methodologies
-
-
-
10
-
-
0003931072
-
-
Joint Chiefs of Staff, Joint Publication 3-13, Washington: Pentagon
-
Department of Defense, 1998, Joint Chiefs of Staff, Joint Publication 3-13, Joint doctrine for Information Operations, Washington: Pentagon.
-
(1998)
Joint Doctrine for Information Operations
-
-
-
11
-
-
10644259149
-
-
MS Thesis, AFIT/GOR/ENS/00M-15, Air Force Institute of Technology, Wright-Patterson AFB, Ohio
-
Hamill, T. J., 2000, Modeling Information Assurance: A Value Focused Thinking Approach, MS Thesis, AFIT/GOR/ENS/00M-15, Air Force Institute of Technology, Wright-Patterson AFB, Ohio.
-
(2000)
Modeling Information Assurance: A Value Focused Thinking Approach
-
-
Hamill, T.J.1
-
12
-
-
33144464064
-
Risk management and the value of information in a defense computer system
-
Hamill, T. J., Deckro, R. F., Kloeber, J. M., Kelso, T. S., 2002, "Risk Management and the Value of Information in A Defense Computer System," Military Operations Research, 7 (2) 61-82.
-
(2002)
Military Operations Research
, vol.7
, Issue.2
, pp. 61-82
-
-
Hamill, T.J.1
Deckro, R.F.2
Kloeber, J.M.3
Kelso, T.S.4
-
18
-
-
33144463925
-
-
National Security Agency
-
Lund, L., Unkenholz, W., Parks, D., Bowers, C., Brill, H., and Garner, B., 1996, "O'er the RAMparts We Watch: An Introduction to the Risk Analysis Model (RAM)," National Security Agency.
-
(1996)
O'er the RAMparts We Watch: An Introduction to the Risk Analysis Model (RAM)
-
-
Lund, L.1
Unkenholz, W.2
Parks, D.3
Bowers, C.4
Brill, H.5
Garner, B.6
-
19
-
-
2442701031
-
A model for information assurance: An integrated approach
-
June United States Military Academy, West Point, New York
-
Maconachy, W. V., Schou, C. D., Ragsdale, D., and Welch, D., June 2001, "A Model for Information Assurance: An Integrated Approach," Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, New York.
-
(2001)
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
-
-
Maconachy, W.V.1
Schou, C.D.2
Ragsdale, D.3
Welch, D.4
-
21
-
-
4644317619
-
Information systems security: A comprehensive model
-
October. National Institute of Standards and Technology, Baltimore, MD
-
th National Computer Security Conference. National Institute of Standards and Technology, Baltimore, MD.
-
(1991)
th National Computer Security Conference
-
-
McCumber, J.1
-
22
-
-
0038226150
-
-
March, Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University
-
Moore, A. P., Ellison, R. J., and Linger, R. C., March 2001, Attack Modeling for Information Security and Survivability (CMU/SEI-2001-TN-001), Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University.
-
(2001)
Attack Modeling for Information Security and Survivability (CMU/SEI-2001-TN-001)
-
-
Moore, A.P.1
Ellison, R.J.2
Linger, R.C.3
-
25
-
-
85020200328
-
Toward a secure system engineering methodology
-
September New Security Paradigms Workshop, Counterpane Systems, 101 East Minnehaha Parkway, Minneapolis, MN 55419
-
Salter, C., Saydjari, O., Schneier, B., and Wallner, J., September 1998, "Toward a Secure System Engineering Methodology," New Security Paradigms Workshop. Technical Report, Counterpane Systems, 101 East Minnehaha Parkway, Minneapolis, MN 55419.
-
(1998)
Technical Report
-
-
Salter, C.1
Saydjari, O.2
Schneier, B.3
Wallner, J.4
-
26
-
-
0002670359
-
Attack trees: Modeling security threats
-
December
-
Schneier, B., December 1999, "Attack Trees: Modeling Security Threats," Dr. Dobbs Journal of Software Tools 24, 12, 21-29.
-
(1999)
Dr. Dobbs Journal of Software Tools
, vol.24
, Issue.12
, pp. 21-29
-
-
Schneier, B.1
-
28
-
-
32644456297
-
-
June Report of the Consortium for Research on Information Security and Policy, Center for International Security and Cooperation, Stanford University, California
-
Soo Hoo, K. J., June 2000, "How Much Is Enough? A Risk-Management Approach to Computer Security." Report of the Consortium for Research on Information Security and Policy, Center for International Security and Cooperation, Stanford University, California.
-
(2000)
How Much Is Enough? A Risk-management Approach to Computer Security
-
-
Soo Hoo, K.J.1
-
30
-
-
33144461311
-
-
United States Military Academy at West Point, November
-
Snyder, F. J., Parnell, G. S., & Klimack, W. K., "Modeling the Cost Objective in Multiple Objective Decision Analysis," United States Military Academy at West Point, November 2002.
-
(2002)
Modeling the Cost Objective in Multiple Objective Decision Analysis
-
-
Snyder, F.J.1
Parnell, G.S.2
Klimack, W.K.3
|