메뉴 건너뛰기




Volumn , Issue , 2005, Pages 94-102

Toward a threat model for storage systems

Author keywords

Security; Storage system; Threat model

Indexed keywords

DATA LIFECYCLE MODEL; STORAGE PROTECTION SOLUTIONS; STORAGE SYSTEM; THREAT MODEL;

EID: 33244464085     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1103780.1103795     Document Type: Conference Paper
Times cited : (60)

References (42)
  • 2
    • 21644453586 scopus 로고    scopus 로고
    • Threat analysis of the Domain Name System (DNS)
    • August
    • D. Atkins and R. Austein. Threat Analysis of the Domain Name System (DNS). RFC 3833, August 2004.
    • (2004) RFC , vol.3833
    • Atkins, D.1    Austein, R.2
  • 4
    • 84858532832 scopus 로고    scopus 로고
    • California Senate. California Database Breach Act (SB 1386)
    • California Senate. California Database Breach Act (SB 1386). http://info.sen.ca.gov/pub/01-02/bill/sen/sb.1351-1400/sb-1386-bill-20020926- chaptered.html, 2002.
    • (2002)
  • 5
    • 84858551005 scopus 로고    scopus 로고
    • Centers for Medicare & Medicaid Services. The Health Insurance Portability and Accountability Act of 1996 (HIPAA). http://www.cms.hhs.gov/ hipaa/, 1996.
    • (1996)
  • 12
    • 33244479789 scopus 로고    scopus 로고
    • Towards securing information end-to-end: Networked storage security update and best practices
    • February
    • A. Edmonds. Towards Securing Information End-to-End: Networked Storage Security Update and Best Practices. White Paper, February 2003.
    • (2003) White Paper
    • Edmonds, A.1
  • 13
    • 33244480009 scopus 로고    scopus 로고
    • Federal Trade Commission. Gramm-Leach-Bliley Act of 1999
    • Federal Trade Commission. Gramm-Leach-Bliley Act of 1999.
  • 14
    • 3042825662 scopus 로고    scopus 로고
    • Remembrance of data passed: A study of disk sanitization practices
    • January/February
    • S. Garfinkel and A. Shelat. Remembrance of Data Passed: A Study of Disk Sanitization Practices. IEEE Security & Privacy, pages 17-27, January/February 2003.
    • (2003) IEEE Security & Privacy , pp. 17-27
    • Garfinkel, S.1    Shelat, A.2
  • 17
    • 33244465495 scopus 로고    scopus 로고
    • The emerging storage security challenge
    • September
    • J. Gruener and M. Kovar. The Emerging Storage Security Challenge. Yankee Group Report, September 2003.
    • (2003) Yankee Group Report
    • Gruener, J.1    Kovar, M.2
  • 20
    • 33244459003 scopus 로고    scopus 로고
    • Understanding storage security
    • February
    • HP. Understanding Storage Security. RFC 3833, February 2005.
    • (2005) RFC , vol.3833
  • 24
    • 0005475811 scopus 로고    scopus 로고
    • Replication does survive information warfare attacks
    • J. P. McDermott. Replication Does Survive Information Warfare Attacks. In IFIP Workshop on Database Security, pages 219-228, 1997.
    • (1997) IFIP Workshop on Database Security , pp. 219-228
    • McDermott, J.P.1
  • 29
    • 33244492553 scopus 로고    scopus 로고
    • File profiling for insider threats
    • February
    • P. Reiher. File Profiling for Insider Threats. Technical Report, February 2002.
    • (2002) Technical Report
    • Reiher, P.1
  • 32
    • 35248853499 scopus 로고    scopus 로고
    • How much security is enough to stop a thief?: The economics of outsider theft via computer systems and networks
    • S. Schechter and M. D. Smith. How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks. In Financial Cryptography, pages 122-137, 2003.
    • (2003) Financial Cryptography , pp. 122-137
    • Schechter, S.1    Smith, M.D.2
  • 33
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • December
    • B. Schneier. Attack Trees: Modeling Security Threats. Dr. Dobb's Journal, December 1999.
    • (1999) Dr. Dobb's Journal
    • Schneier, B.1
  • 40
    • 84858551003 scopus 로고    scopus 로고
    • U.S. Securities and Exchange Commission. Sarbanes-Oxley Act of 2002. http://www.sarbanes-oxley-forum.com/.
  • 41
    • 33244460199 scopus 로고    scopus 로고
    • CA security hole points to data backup threats
    • August
    • J. Vijayan. CA Security Hole Points to Data Backup Threats. Computerworld, August 2005.
    • (2005) Computerworld
    • Vijayan, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.