메뉴 건너뛰기




Volumn 1, Issue , 2006, Pages 178-185

Modeling the symptomatic fixes archetype in enterprise computer security

Author keywords

Attacks; Countermeasures; Human factors; Software and computer system security; System archetypes; System dynamics; System modeling and simulation

Indexed keywords

ENTERPRISE COMPUTER SECURITY; SYSTEM ARCHETYPES; SYSTEM DYNAMICS; SYSTEM MODELING;

EID: 34247519266     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMPSAC.2006.62     Document Type: Conference Paper
Times cited : (1)

References (24)
  • 5
    • 34247479621 scopus 로고    scopus 로고
    • K. Marais and N. Leveson. Archetypes for Organizational Safety. Presented at IRIA03. [Online]. Available: http://sunnyday.mit.edu/papers/iria-marais.pdf
    • K. Marais and N. Leveson. Archetypes for Organizational Safety. Presented at IRIA03. [Online]. Available: http://sunnyday.mit.edu/papers/iria-marais.pdf
  • 6
    • 34247481439 scopus 로고    scopus 로고
    • Modeling and Simulation of the Escalation Archetype in Computer Security
    • presented at, Huntsville, AL, April
    • S. N. Rosenfeld, I. Rus, and M. Cukier, "Modeling and Simulation of the Escalation Archetype in Computer Security," presented at Symposium on Simulation Software Security (SSSS06), Huntsville, AL, April 2006.
    • (2006) Symposium on Simulation Software Security (SSSS06)
    • Rosenfeld, S.N.1    Rus, I.2    Cukier, M.3
  • 7
    • 34247532854 scopus 로고    scopus 로고
    • Imagine That, Inc, v. 6.07, CD-ROM, Windows 98/ME/NT4/2K/XP, San Jose, CA
    • Imagine That, Inc. Extend. v. 6.07, [CD-ROM, Windows 98/ME/NT4/2K/XP]. San Jose, CA, 2005.
    • (2005) Extend
  • 8
    • 0037338449 scopus 로고    scopus 로고
    • Towards the Definition and Use of a Core Set of Archetypal Structures in System Dynamics
    • Spring
    • E. F. Wolstenholme, "Towards the Definition and Use of a Core Set of Archetypal Structures in System Dynamics," System Dynamics Review, vol. 19, no. 1, Spring 2003, pp. 7-26.
    • (2003) System Dynamics Review , vol.19 , Issue.1 , pp. 7-26
    • Wolstenholme, E.F.1
  • 10
    • 34247543928 scopus 로고    scopus 로고
    • Feb. 27, Archetypes
    • W. Braun. (2002, Feb. 27). The Systems Archetypes. www.uni-klu.ac.at/ ~gossimit/pap/sd/wb_sysarch.pdf
    • (2002) The Systems
    • Braun, W.1
  • 11
    • 84990029315 scopus 로고    scopus 로고
    • The Economics of Information Security Investment
    • November
    • L. A. Gordon and M. P. Loeb, "The Economics of Information Security Investment," ACM Trans. Information and System Security, vol. 5, no. 4, November 2002, pp. 438-457.
    • (2002) ACM Trans. Information and System Security , vol.5 , Issue.4 , pp. 438-457
    • Gordon, L.A.1    Loeb, M.P.2
  • 12
    • 13444274614 scopus 로고    scopus 로고
    • Evaluating Information Security Investments Using the Analytic Hierarchy Process
    • L. Bodin, L. Gordon, and M. P. Loeb, "Evaluating Information Security Investments Using the Analytic Hierarchy Process," Comm. of. the ACM, vol. 28, no. 2, pp. 79-83.
    • Comm. of. the ACM , vol.28 , Issue.2 , pp. 79-83
    • Bodin, L.1    Gordon, L.2    Loeb, M.P.3
  • 14
    • 34247513026 scopus 로고
    • Department of Defense Trusted Computer System Evaluation Criteria" ("Orange Book"), DOD 5200.28-STD
    • U.S. Department of Defense Standard, Dec
    • U.S. Department of Defense Standard, "Department of Defense Trusted Computer System Evaluation Criteria" ("Orange Book"), DOD 5200.28-STD, Library No. S225,7ll, Dec. 1985.
    • (1985) Library , Issue.S225
  • 15
    • 34247516484 scopus 로고    scopus 로고
    • ISO/IEC International Standards (IS) 15408-1:1999, 15408-2:1999, and 15408-3:1999, Common Criteria for Information Technology Security Evaluation: Parts 1-3, Version 2.1, August 1999 (CCIMB-99-031, CCIMB-99-032, and CCIMB-99-033). http://csrc.nist.gov/cc/ccv20/ccv21ist.htm
    • ISO/IEC International Standards (IS) 15408-1:1999, 15408-2:1999, and 15408-3:1999, "Common Criteria for Information Technology Security Evaluation": Parts 1-3, Version 2.1, August 1999 (CCIMB-99-031, CCIMB-99-032, and CCIMB-99-033). http://csrc.nist.gov/cc/ccv20/ccv21ist.htm
  • 16
    • 84888929255 scopus 로고    scopus 로고
    • Cyberciege: An Information Assurance Teaching Tool for Training and Awareness
    • presented at, North Bethesda, MD, March
    • C. E. Irvine et al, "Cyberciege: An Information Assurance Teaching Tool for Training and Awareness," presented at Fed. Info. Sys. Security Educators' Association Conference (FISSEA05), North Bethesda, MD, March 2005.
    • (2005) Fed. Info. Sys. Security Educators' Association Conference (FISSEA05)
    • Irvine, C.E.1
  • 17
    • 0019608720 scopus 로고
    • Formal Models for Computer Security
    • Sept
    • C. Landwehr, "Formal Models for Computer Security," Computer Surveys, vol. 13, no. 3, Sept. 1981
    • (1981) Computer Surveys , vol.13 , Issue.3
    • Landwehr, C.1
  • 21
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security
    • Sept.-Oct
    • R. Ortalo, Y. Deswarte, and M. Kaaniche, "Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security," IEEE Transactions on Software Engineering, vol. 25, no. 5, pp. 633-650, Sept.-Oct. 1999.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 23
    • 27544493249 scopus 로고    scopus 로고
    • An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack
    • Yokohama, Japan, June 28-July 1
    • S. Panjwani et al, "An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack," in Proc. International Conference on Dependable Systems and Networks (DSN05), Yokohama, Japan, June 28-July 1, 2005.
    • (2005) Proc. International Conference on Dependable Systems and Networks (DSN05)
    • Panjwani, S.1
  • 24
    • 31944444819 scopus 로고    scopus 로고
    • A Developmental View of System Security
    • January
    • C. L. Huntley, "A Developmental View of System Security," Computer, vol. 39, no. 1, pp. 113-114, January 2006.
    • (2006) Computer , vol.39 , Issue.1 , pp. 113-114
    • Huntley, C.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.