메뉴 건너뛰기




Volumn , Issue , 2003, Pages 341-350

Maintaining results from security assessments

Author keywords

[No Author keywords available]

Indexed keywords

COMPONENT-ORIENTED APPROACH; SECURITY ASSESSMENT;

EID: 33749360118     PISSN: 15345351     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSMR.2003.1192442     Document Type: Conference Paper
Times cited : (11)

References (32)
  • 1
    • 84976854012 scopus 로고
    • Conjoining specification
    • Abadi, M., Lamport, L. Conjoining specification. ACM TOPLAS 17:507-533,1995.
    • (1995) ACM TOPLAS , vol.17 , pp. 507-533
    • Abadi, M.1    Lamport, L.2
  • 2
    • 84885478310 scopus 로고    scopus 로고
    • Risk management
    • AS/NZS 4360:1999 Risk management.
    • (1999) AS/NZS , pp. 43-60
  • 4
    • 0001094070 scopus 로고
    • The use of the CCTA risk analysis and management methodology CRAMM
    • North Holland
    • Barber, B., Davey, J. The use of the CCTA risk analysis and management methodology CRAMM. In Proc. MEDINFO92, pages 1589-1593. North Holland, 1992.
    • (1992) Proc. MEDINFO92 , pp. 1589-1593
    • Barber, B.1    Davey, J.2
  • 11
    • 60949103111 scopus 로고    scopus 로고
    • Integrating model-based security risk management into eBusiness systems development: The CORAS approach
    • Kluwer
    • Dimitrakos, T., Ritchie, B., Raptis, D., Aagedal, J. , den Braber, F., Stlen, K., Houmb, S-H. Integrating model-based security risk management into eBusiness systems development: The CORAS approach. In Proc. I3E2002, pages 159-175. Kluwer, 2002.
    • (2002) Proc. I3E2002 , pp. 159-175
    • Dimitrakos, T.1    Ritchie, B.2    Raptis, D.3    Aagedal, J.4    Den Braber, F.5    Stlen, K.6    Houmb, S.-H.7
  • 13
    • 84945708698 scopus 로고
    • An axiomatic basis for computer programming
    • Hoare, C. A. R. An axiomatic basis for computer programming. Communications of the ACM, 12:576-583, 1969.
    • (1969) Communications of the ACM , vol.12 , pp. 576-583
    • Hoare, C.A.R.1
  • 15
    • 84884726824 scopus 로고
    • Fault tree analysis (FTA)
    • IEC 1025: 1990 Fault tree analysis (FTA).
    • (1990) IEC , pp. 10-25
  • 18
    • 84885482102 scopus 로고    scopus 로고
    • Information technology-Guidelines for the management of IT Security-Part 1: Concepts and models for IT Security
    • ISO/IEC TR 13335-1:2001: Information technology-Guidelines for the management of IT Security-Part 1: Concepts and models for IT Security.
    • (2001) ISO/IEC TR , pp. 133-351
  • 23
    • 84884707863 scopus 로고    scopus 로고
    • Structuring and design of reactive systems using RSDS and B
    • Springer
    • Lano, K., Androutsopoulos, K., Clark, D. Structuring and design of reactive systems using RSDS and B. In Proc. FASE 2000, LNCS 1783, pages 97-111. Springer, 2000.
    • (2000) Proc. FASE 2000, LNCS 1783 , pp. 97-111
    • Lano, K.1    Androutsopoulos, K.2    Clark, D.3
  • 28
    • 20444404422 scopus 로고    scopus 로고
    • The CORAS approach for model-based risk analysis applied to the ecommerce domain
    • Kluwer
    • Raptis, D., Dimitrakos, T., Gran, B. A., Stlen, K. The CORAS approach for model-based risk analysis applied to the ecommerce domain. In Proc. CMS-2002, pages 169-181. Kluwer, 2002.
    • (2002) Proc. CMS-2002 , pp. 169-181
    • Raptis, D.1    Dimitrakos, T.2    Gran, B.A.3    Stlen, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.