메뉴 건너뛰기




Volumn 25, Issue 1, 2007, Pages 141-153

A risk-driven security analysis method and modelling language

(2)  Kearney, P a   Brugger L a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords

INDUSTRIAL MANAGEMENT; OPTIMIZATION; RISK ANALYSIS; RISK ASSESSMENT; RISK MANAGEMENT;

EID: 33947420435     PISSN: 13583948     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10550-007-0016-6     Document Type: Article
Times cited : (7)

References (22)
  • 1
    • 33845216895 scopus 로고    scopus 로고
    • 'A Model Based Approach to Trust, Security and Assurance'
    • (October)
    • Baldwin A, Beres Y, Shiu S and Kearney P: 'A Model Based Approach to Trust, Security and Assurance', BT Technol J, 24, No 4, pp 53-68 (October 2006).
    • (2006) BT Technol J , vol.24 , Issue.4 , pp. 53-68
    • Baldwin, A.1    Beres, Y.2    Shiu, S.3    Kearney, P.4
  • 2
    • 33947411409 scopus 로고    scopus 로고
    • 'Using assurance models to aid the risk and governance life cycle'
    • (January)
    • Baldwin A, Beres Y and Shiu S: 'Using assurance models to aid the risk and governance life cycle', BT Technol J, 25, No 1, pp 128-140 (January 2007).
    • (2007) BT Technol J , vol.25 , Issue.1 , pp. 128-140
    • Baldwin, A.1    Beres, Y.2    Shiu, S.3
  • 5
    • 33947369886 scopus 로고    scopus 로고
    • 'The BT Risk Cockpit - A Visual Approach to ORM'
    • (January)
    • Evans G and Benton S: 'The BT Risk Cockpit - A Visual Approach to ORM', BT Technol J, 25, No 1, pp 88-100 (January 2007).
    • (2007) BT Technol J , vol.25 , Issue.1 , pp. 88-100
    • Evans, G.1    Benton, S.2
  • 6
    • 13644252644 scopus 로고    scopus 로고
    • 'Eliciting security requirements with misuse cases'
    • Sindre G and Opdahl A L: 'Eliciting security requirements with misuse cases', Requir Eng, 10, pp 34-44 (2005).
    • (2005) Requir Eng , vol.10 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 8
    • 2942757657 scopus 로고    scopus 로고
    • 'Engineering Security Requirements'
    • Firesmith D: 'Engineering Security Requirements', Journal of Object Technology, 2, pp 53-68 (2003).
    • (2003) Journal of Object Technology , vol.2 , pp. 53-68
    • Firesmith, D.1
  • 9
    • 0002670359 scopus 로고    scopus 로고
    • 'Attack Trees: Modeling Security Threats'
    • Schneier B: 'Attack Trees: Modeling Security Threats', Dr Dobb's Journal (1999).
    • (1999) Dr Dobb's Journal
    • Schneier, B.1
  • 10
    • 33745849657 scopus 로고    scopus 로고
    • 'Foundations of Attack Trees'
    • in Springer Lecture Notes in Computer Science
    • Mauw S and Oostdijk M: 'Foundations of Attack Trees', in 'Information Security and Cryptology - ICISC 2005' Springer Lecture Notes in Computer Science, Vol 3935, pp 186-198 (2005).
    • (2005) 'Information Security and Cryptology - ICISC 2005' , vol.3935 , pp. 186-198
    • Mauw, S.1    Oostdijk, M.2
  • 11
    • 84887267539 scopus 로고    scopus 로고
    • Microsoft Security Developer Center:
    • Microsoft Security Developer Center: 'Threat Modeling', - http:// msdn.microsoft.com/security/securecode/threatmodeling/default.aspx
    • 'Threat Modeling'
  • 13
    • 33947368645 scopus 로고    scopus 로고
    • 'Model-based security analysis in seven steps - A guided tour to the CORAS method'
    • January
    • Braber et al: 'Model-based security analysis in seven steps - a guided tour to the CORAS method', BT Technol J, 25, No 1, pp 101-117 January (2007).
    • (2007) BT Technol J , vol.25 , Issue.1 , pp. 101-117
    • Braber1
  • 15
    • 33947354273 scopus 로고    scopus 로고
    • 'QinetiQ: The MOD Application of Domain Based Security (DBSy)'
    • 'QinetiQ: The MOD Application of Domain Based Security (DBSy)', Version 1.0, CD-ROM (2004).
    • (2004) Version 1.0, CD-ROM
  • 17
    • 17644401409 scopus 로고    scopus 로고
    • 'Bringing security home: A process for developing secure and usable systems'
    • Flechais I, Sasse MAA and Hailes S: 'Bringing security home: a process for developing secure and usable systems', pp 49-57 (2003).
    • (2003) , pp. 49-57
    • Flechais, I.1    Sasse, M.A.2    Hailes, S.3
  • 19
    • 79955143136 scopus 로고    scopus 로고
    • 'SecureUML: A UML-Based Modeling Language for Model-Driven Security'
    • Lodderstedt T, Basin D and Doser J: 'SecureUML: A UML-Based Modeling Language for Model-Driven Security', Lecture Notes in Computer Science, Vol 2460, pp 426-441 (2002).
    • (2002) Lecture Notes in Computer Science , vol.2460 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 20
    • 84944220091 scopus 로고    scopus 로고
    • 'Towards Development of Secure Systems Using UMLsec'
    • Jürjens J: 'Towards Development of Secure Systems Using UMLsec', Lecture Notes in Computer Science, Vol 2029, pp 187-200 (2001).
    • (2001) Lecture Notes in Computer Science , vol.2029 , pp. 187-200
    • Jürjens, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.