메뉴 건너뛰기




Volumn , Issue , 2006, Pages 11-17

Using model-based security analysis in component-oriented system development: A Case-based Evaluation

Author keywords

Case studies; Security risk analysis

Indexed keywords

COMPUTER SOFTWARE SELECTION AND EVALUATION; MATHEMATICAL MODELS; MESSAGE PASSING; RISK ANALYSIS; SECURITY OF DATA;

EID: 34547449378     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1179494.1179498     Document Type: Conference Paper
Times cited : (10)

References (23)
  • 2
    • 34547487058 scopus 로고    scopus 로고
    • Using model-based security analysis in component-oriented system development, a case-based evaluation
    • Technical Report 342, University of Oslo, Department of Informatics
    • G. Brændeland and K. Stølen. Using model-based security analysis in component-oriented system development, a case-based evaluation. Technical Report 342, University of Oslo, Department of Informatics, 2006.
    • (2006)
    • Brændeland, G.1    Stølen, K.2
  • 3
    • 0004181454 scopus 로고    scopus 로고
    • UML Components. A simple process for specifying component-based software
    • Addison-Wesley
    • J. Cheesman and J. Daniels. UML Components. A simple process for specifying component-based software. Component software series. Addison-Wesley, 2001.
    • (2001) Component software series
    • Cheesman, J.1    Daniels, J.2
  • 5
    • 34547406903 scopus 로고    scopus 로고
    • F. den Braber, T. Dimitrakos, B. A. Gran, M. S. Lund, K. Stolen, and J. Ø. Aagedal. UML and the Unified Process, chapter The CORAS methodology: model-based risk management using UML and UP, pages 332-357. IRM Press, 2003.
    • F. den Braber, T. Dimitrakos, B. A. Gran, M. S. Lund, K. Stolen, and J. Ø. Aagedal. UML and the Unified Process, chapter The CORAS methodology: model-based risk management using UML and UP, pages 332-357. IRM Press, 2003.
  • 7
    • 24944476741 scopus 로고    scopus 로고
    • Why timed sequence diagrams require three-event semantics
    • Technical Report 309, University of Oslo, Department of Informatics
    • Ø. Haugen, K. E. Husa, R. K. Runde, and K. Stølen. Why timed sequence diagrams require three-event semantics. Technical Report 309, University of Oslo, Department of Informatics, 2004.
    • (2004)
    • Haugen, O.1    Husa, K.E.2    Runde, R.K.3    Stølen, K.4
  • 8
    • 0242339578 scopus 로고    scopus 로고
    • Ø. Haugen and K. Stølen. STAIRS - steps to analyze interactions with refinement semantics. In UML, 2863 of Lecture Notes in Computer Science, pages 388-402. Springer, 2003.
    • Ø. Haugen and K. Stølen. STAIRS - steps to analyze interactions with refinement semantics. In UML, volume 2863 of Lecture Notes in Computer Science, pages 388-402. Springer, 2003.
  • 9
    • 34547428174 scopus 로고    scopus 로고
    • Information Technology - Security techniques - Management of information and communications technology security - Part 1: Concepts and models for information and communications technology security management,
    • ISO/IEC, TR 13335-1
    • ISO/IEC. Information Technology - Security techniques - Management of information and communications technology security - Part 1: Concepts and models for information and communications technology security management, 2004. TR 13335-1.
    • (2004)
  • 12
    • 79955143136 scopus 로고    scopus 로고
    • T. Lodderstedt, D. A. Basin, and J. Doser. SecureUML: A UML-based modeling language for model-driven security. In UML, 2460 of Lecture Notes in Computer Science, pages 426-441. Springer, 2002.
    • T. Lodderstedt, D. A. Basin, and J. Doser. SecureUML: A UML-based modeling language for model-driven security. In UML, volume 2460 of Lecture Notes in Computer Science, pages 426-441. Springer, 2002.
  • 13
    • 84949225186 scopus 로고    scopus 로고
    • Abuse-case-based assurance arguments
    • IEEE Computer Society
    • J. P. McDermott. Abuse-case-based assurance arguments. In ACSAC, pages 366-376. IEEE Computer Society, 2001.
    • (2001) ACSAC , pp. 366-376
    • McDermott, J.P.1
  • 14
    • 85045573601 scopus 로고    scopus 로고
    • J. P. McDermott and C. Fox. Using abuse case models for security requirements analysis. In ACSAC, pages 55-. IEEE Computer Society, 1999.
    • J. P. McDermott and C. Fox. Using abuse case models for security requirements analysis. In ACSAC, pages 55-. IEEE Computer Society, 1999.
  • 15
    • 34547700307 scopus 로고    scopus 로고
    • G. McGraw. Sofware security: Building security in. Software security. Adison-Wesley, 2006.
    • G. McGraw. Sofware security: Building security in. Software security. Adison-Wesley, 2006.
  • 17
    • 33745443561 scopus 로고    scopus 로고
    • Specification and refinement of soft real-time requirements using sequence diagrams
    • FORMATS, of, Springer
    • A. Refsdal, K. E. Husa, and K. Stølen. Specification and refinement of soft real-time requirements using sequence diagrams. In FORMATS, volume 3829 of Lecture Notes in Computer Science, pages 32-48. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3829 , pp. 32-48
    • Refsdal, A.1    Husa, K.E.2    Stølen, K.3
  • 20
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • G. Sindre and A. L. Opdahl. Eliciting security requirements with misuse cases. Requirements Engineering, 10(1):34-44, 2005.
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 21
    • 34547465824 scopus 로고    scopus 로고
    • Standards Australia, Standards New Zealand. Information security risk management guidelines, 2004. HB 231:2004.
    • Standards Australia, Standards New Zealand. Information security risk management guidelines, 2004. HB 231:2004.
  • 22
    • 34547438943 scopus 로고    scopus 로고
    • Symantec internet security threat report. Trends for July 05-December 05, March 2006
    • Symantec. Symantec internet security threat report. Trends for July 05-December 05, March 2006.
    • Symantec1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.