메뉴 건너뛰기




Volumn 4237 LNCS, Issue , 2006, Pages 228-239

Information modeling for automated risk analysis

Author keywords

Communication; Information; Model; Risk; Security; Service oriented; Threat

Indexed keywords

COMPUTATION THEORY; COMPUTER CRIME; INFORMATION ANALYSIS; MATHEMATICAL MODELS; SECURITY OF DATA; COMMUNICATION; INFORMATION THEORY; MOBILE SECURITY; MODELS; RISK ASSESSMENT; RISKS;

EID: 33845197906     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11909033_21     Document Type: Conference Paper
Times cited : (2)

References (14)
  • 2
    • 1842829828 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST), SP 800-30. January (accessed January 2006)
    • Risk Management Guide for Information Technology Systems, National Institute of Standards and Technology (NIST), SP 800-30. January 2002. http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf (accessed January 2006)
    • (2002) Risk Management Guide for Information Technology Systems
  • 5
    • 33845214117 scopus 로고    scopus 로고
    • Thesis at Department of Computer Science, The University of York, York, UK, (accessed July 2006).
    • Chivers, H., Security Design Analysis, Thesis at Department of Computer Science, The University of York, York, UK, available on-line at http://www.cs.york.ac.uk/ftpdir/reports/YCST-2006-06.pdf, (accessed July 2006). p. 484. 2006
    • (2006) Security Design Analysis , pp. 484
    • Chivers, H.1
  • 6
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • Baskerville, R., Information Systems Security Design Methods: Implications for Information Systems Development. ACM Computing Surveys, 1993.25(4). 375-414.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 7
    • 84941189169 scopus 로고    scopus 로고
    • Insight Consulting Limited, (accessed May 2005)
    • CRAMM Risk Assessment Tool Overview, Insight Consulting Limited, available at http://www.cramm.com/riskassesment.htm (accessed May 2005)
    • CRAMM Risk Assessment Tool Overview
  • 8
    • 22144453559 scopus 로고    scopus 로고
    • Model-based security risk analysis for web applications: The CORAS approach
    • St Anne's College, Oxford, UK. (Electronic Workshops in Computing). British Computer Society, (accessed January 2006)
    • Dimitrakos, T., Raptis, D., Ritchie, B., and Stølen, K. Model-Based Security Risk Analysis for Web Applications: The CORAS approach, Proceedings of the EuroWeb 2002, St Anne's College, Oxford, UK. (Electronic Workshops in Computing). British Computer Society, available on-line at http://ewic.bcs.org/conferences/2002/euroweb/index.htm (accessed January 2006), 2002.
    • (2002) Proceedings of the EuroWeb 2002
    • Dimitrakos, T.1    Raptis, D.2    Ritchie, B.3    Stølen, K.4
  • 10
    • 84944220091 scopus 로고    scopus 로고
    • Towards development of secure systems using UMLsec
    • Proceedings of the Fundamental Approaches to Software Engineering : 4th International Conference, FASE 2001 : Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001, Genova, Italy. Springer-Verlag
    • Jürjens, J. Towards Development of Secure Systems Using UMLsec, Proceedings of the Fundamental Approaches to Software Engineering : 4th International Conference, FASE 2001 : Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001, Genova, Italy. (Lecture Notes in Computer Science vol 2029). Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science Vol 2029
    • Jürjens, J.1
  • 11
    • 33845224346 scopus 로고    scopus 로고
    • Security requirements engineering for e-govemment applications: Analysis of current frameworks
    • Proceedings of the Electronic Government: Third International Conference, EGOV 2004, Zaragoza, Spain. Springer-Verlag
    • Kalloniatis, C. Security Requirements Engineering for e-Govemment Applications: Analysis of Current Frameworks, Proceedings of the Electronic Government: Third International Conference, EGOV 2004, Zaragoza, Spain. (Lecture Notes in Computer Science vol 3183 / 2004), Springer-Verlag, 2004; 66-71.
    • (2004) Lecture Notes in Computer Science Vol 3183 / 2004 , pp. 66-71
    • Kalloniatis, C.1
  • 13
    • 0005314068 scopus 로고    scopus 로고
    • National Computer Security Center (NCSC), Technical Report 79-91. (accessed January 2006)
    • Mayfield, T., Roskos, J. E., Welke, S. R., and Boone, J. M., Integrity in Automated Information Systems, National Computer Security Center (NCSC), Technical Report 79-91. http://www.radium.ncsc.mil/tpep/library/rainbow/C-TR-79- 91.txt (accessed January 2006)
    • Integrity in Automated Information Systems
    • Mayfield, T.1    Roskos, J.E.2    Welke, S.R.3    Boone, J.M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.