메뉴 건너뛰기




Volumn , Issue , 2007, Pages 19-26

From trust to dependability through risk analysis

Author keywords

[No Author keywords available]

Indexed keywords

AIR TRAFFIC CONTROL; MATHEMATICAL MODELS; RISK ANALYSIS; SOCIETIES AND INSTITUTIONS;

EID: 34548171255     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2007.93     Document Type: Conference Paper
Times cited : (56)

References (27)
  • 1
    • 45849138846 scopus 로고    scopus 로고
    • Modelling risk and identifying countermeasures in organizations
    • Y. Asnar and P. Giorgini. Modelling risk and identifying countermeasures in organizations. In Proc. of CRITIS'06, 2006.
    • (2006) Proc. of CRITIS'06
    • Asnar, Y.1    Giorgini, P.2
  • 2
    • 34548158508 scopus 로고    scopus 로고
    • Risk Modelling and Reasoning in Goal Models
    • Technical Report DIT-06-008, University of Trento
    • Y. Asnar, P. Giorgini, and J. Mylopoulos. Risk Modelling and Reasoning in Goal Models. Technical Report DIT-06-008, University of Trento, 2006.
    • (2006)
    • Asnar, Y.1    Giorgini, P.2    Mylopoulos, J.3
  • 3
    • 12344308304 scopus 로고    scopus 로고
    • Basic Concepts and Taxonomy of Dependable and Secure Computing
    • A. Avizienis, J.-C. Laprie, B. Randell, and C. E. Landwehr. Basic Concepts and Taxonomy of Dependable and Secure Computing. TDSC, 1(1):11-33, 2004.
    • (2004) TDSC , vol.1 , Issue.1 , pp. 11-33
    • Avizienis, A.1    Laprie, J.-C.2    Randell, B.3    Landwehr, C.E.4
  • 5
    • 1642518660 scopus 로고    scopus 로고
    • Simulation and Verification I: Formal Analysis of Air Traffic Management Systems: The Case of Conflict Resolution and Recovery
    • IEEE Press
    • R. Butler, J. Maddalon, A. Geser, and C. Muñoz. Simulation and Verification I: Formal Analysis of Air Traffic Management Systems: The Case of Conflict Resolution and Recovery. In Proc. of WSC'03, pages 906-914. IEEE Press, 2003.
    • (2003) Proc. of WSC'03 , pp. 906-914
    • Butler, R.1    Maddalon, J.2    Geser, A.3    Muñoz, C.4
  • 7
    • 34548175498 scopus 로고    scopus 로고
    • S. Campadello, L. Compagna, D. Gidoin, P. Giorgini, S. Holtmanns, J. Latanicki, V. Meduri, J.-C. Pazzaglia, M. Seguran, R. Thomas, and N. Zannone. S&D Requirements Specification. Research report A7.D2.1, SERENITY consortium, 2006.
    • S. Campadello, L. Compagna, D. Gidoin, P. Giorgini, S. Holtmanns, J. Latanicki, V. Meduri, J.-C. Pazzaglia, M. Seguran, R. Thomas, and N. Zannone. S&D Requirements Specification. Research report A7.D2.1, SERENITY consortium, 2006.
  • 8
    • 33750199540 scopus 로고    scopus 로고
    • Trust Relations in High-Reliability Organizations
    • S. Cox, B. Jones, and D. Collinson. Trust Relations in High-Reliability Organizations. Risk Analysis, 26(5): 1123-1138, 2006.
    • (2006) Risk Analysis , vol.26 , Issue.5 , pp. 1123-1138
    • Cox, S.1    Jones, B.2    Collinson, D.3
  • 11
    • 16244392439 scopus 로고    scopus 로고
    • Towards a Unified Approach to the Representation of, and Reasoning with, Probabilistic Risk Information about Software and its System Interface
    • IEEE Press
    • M. S. Feather. Towards a Unified Approach to the Representation of, and Reasoning with, Probabilistic Risk Information about Software and its System Interface. In Proc. of ISSRE'04, pages 391-402. IEEE Press, 2004.
    • (2004) Proc. of ISSRE'04 , pp. 391-402
    • Feather, M.S.1
  • 13
    • 84949226562 scopus 로고    scopus 로고
    • The CORAS framework for a model-based risk management process
    • Proc. of SAFECOMP'02, Springer-Verlag
    • R. Fredriksen, M. Kristiansenand, B. A. Granand, K. Stølen, T. A. Opperud, and T. Dimitrakos. The CORAS framework for a model-based risk management process. In Proc. of SAFECOMP'02, LNCS 2434, pages 94-105. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2434 , pp. 94-105
    • Fredriksen, R.1    Kristiansenand, M.2    Granand, B.A.3    Stølen, K.4    Opperud, T.A.5    Dimitrakos, T.6
  • 14
    • 27644537252 scopus 로고    scopus 로고
    • Modeling Security Requirements Through Ownership, Permission and Delegation
    • IEEE Press
    • P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone. Modeling Security Requirements Through Ownership, Permission and Delegation. In Proc. of RE'05, pages 167-176. IEEE Press, 2005.
    • (2005) Proc. of RE'05 , pp. 167-176
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 15
    • 24944578244 scopus 로고    scopus 로고
    • Modelling Social and Individual Trust in Requirements Engineering Methodologies
    • Proc. of iTrust'05, Springer-Verlag
    • P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone. Modelling Social and Individual Trust in Requirements Engineering Methodologies. In Proc. of iTrust'05, LNCS 3477, pages 161-176. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3477 , pp. 161-176
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 17
    • 33747440391 scopus 로고    scopus 로고
    • Safety Validation of Dependable Transportation Systems
    • J. Jacobson. Safety Validation of Dependable Transportation Systems. In Proc. of ITSC'05, pages 1-6, 2005.
    • (2005) Proc. of ITSC'05 , pp. 1-6
    • Jacobson, J.1
  • 18
    • 0031162048 scopus 로고    scopus 로고
    • A unified framework for enforcing multiple access control policies
    • ACM Press
    • S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino. A unified framework for enforcing multiple access control policies. In Proc. of PODS'97, pages 474-485. ACM Press, 1997.
    • (1997) Proc. of PODS'97 , pp. 474-485
    • Jajodia, S.1    Samarati, P.2    Subrahmanian, V.S.3    Bertino, E.4
  • 19
    • 35048832333 scopus 로고    scopus 로고
    • Analysing the Relationship Between Risk and Trust
    • Proc. of iTrust '04, Springer-Verlag
    • A. Jøsang and S. Presti. Analysing the Relationship Between Risk and Trust. In Proc. of iTrust '04, LNCS 2995, pages 135-145. Springer-Verlag, 2004.
    • (2004) LNCS , vol.2995 , pp. 135-145
    • Jøsang, A.1    Presti, S.2
  • 20
    • 34548174728 scopus 로고    scopus 로고
    • Security Requirements Driven Risk Assessment for Critical Infrastructure Information Systems
    • S. Lee, R. Gandhi, and G. Ahn. Security Requirements Driven Risk Assessment for Critical Infrastructure Information Systems. In Proc. of SREIS'05, 2005.
    • (2005) Proc. of SREIS'05
    • Lee, S.1    Gandhi, R.2    Ahn, G.3
  • 22
    • 84883288824 scopus 로고    scopus 로고
    • Towards a Risk-Based Security Requirements Engineering Framework
    • N. Mayer, A. Rifaut, and E. Dubois. Towards a Risk-Based Security Requirements Engineering Framework. In Proc. of REFSQ '05, 2005.
    • (2005) Proc. of REFSQ '05
    • Mayer, N.1    Rifaut, A.2    Dubois, E.3
  • 23
    • 12344275676 scopus 로고    scopus 로고
    • Model-Based Evaluation: From Dependability to Security
    • D. M. Nicol, W. H. Sanders, and K. S. Trivedi. Model-Based Evaluation: From Dependability to Security. TDSC, 1(1):48-65, 2004.
    • (2004) TDSC , vol.1 , Issue.1 , pp. 48-65
    • Nicol, D.M.1    Sanders, W.H.2    Trivedi, K.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.