메뉴 건너뛰기




Volumn 25, Issue 1, 2007, Pages 101-117

Model-based security analysis in seven steps - A guided tour to the CORAS method

Author keywords

[No Author keywords available]

Indexed keywords

DATA REDUCTION; PROFESSIONAL ASPECTS; RISK ANALYSIS; SOCIETIES AND INSTITUTIONS;

EID: 33947368645     PISSN: 13583948     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10550-007-0013-9     Document Type: Article
Times cited : (145)

References (25)
  • 10
    • 33750384757 scopus 로고    scopus 로고
    • 'A graphical approach to risk identification, motivated by empirical investigations'
    • Hogganvik I and Stølen K: 'A graphical approach to risk identification, motivated by empirical investigations', in Proc MoDELS'06 LNCS 4199, pp 574-588 (2006).
    • (2006) Proc MoDELS'06 LNCS 4199 , pp. 574-588
    • Hogganvik, I.1    Stølen, K.2
  • 11
    • 0001094070 scopus 로고
    • 'The Use of the CCTA Risk Analysis and Management Methodology CRAMM in Health Information Systems'
    • Barber B and Davey J: 'The Use of the CCTA Risk Analysis and Management Methodology CRAMM in Health Information Systems', in Proc MEDINFO'92, pp 1589-1593 (1992).
    • (1992) Proc MEDINFO'92 , pp. 1589-1593
    • Barber, B.1    Davey, J.2
  • 14
    • 0037240812 scopus 로고    scopus 로고
    • 'Misuse cases: Use cases with hostile intent'
    • Alexander I: 'Misuse cases: Use cases with hostile intent', IEEE Software, 20, No 1, pp 58-66 (2003).
    • (2003) IEEE Software , vol.20 , Issue.1 , pp. 58-66
    • Alexander, I.1
  • 15
    • 0034497420 scopus 로고    scopus 로고
    • 'Eliciting Security Requirements by Misuse Cases'
    • Sindre G and Opdahl A L: 'Eliciting Security Requirements by Misuse Cases', in Proc TOOLS-PACIFIC, pp 120-131 (2000).
    • (2000) Proc TOOLS-PACIFIC , pp. 120-131
    • Sindre, G.1    Opdahl, A.L.2
  • 21
    • 79955143136 scopus 로고    scopus 로고
    • 'SecureUML: A UML-Based Modeling Language for Model-Driven Security'
    • Lodderstedt T, Basin D and Doser J: 'SecureUML: A UML-Based Modeling Language for Model-Driven Security', in Proc UML'02, LNCS 2460, pp 426-441 (2002).
    • (2002) Proc UML'02, LNCS , vol.2460 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 22
    • 0002670359 scopus 로고    scopus 로고
    • 'Attack trees: Modeling security threats'
    • Schneier B: 'Attack trees: Modeling security threats', Dr Dobb's Journal, 24, No 12, pp 21-29 (1999).
    • (1999) Dr Dobb's Journal , vol.24 , Issue.12 , pp. 21-29
    • Schneier, B.1
  • 25
    • 0003850384 scopus 로고
    • 'The Cause/Consequence Diagram Method as a Basis for Quantitative Accident Analysis'
    • Nielsen D S: 'The Cause/Consequence Diagram Method as a Basis for Quantitative Accident Analysis', Danish Atomic Energy Commission, RISO-M-1374 (1971).
    • (1971) Danish Atomic Energy Commission, RISO-M-1374
    • Nielsen, D.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.