메뉴 건너뛰기




Volumn , Issue , 2006, Pages 178-185

Security threat modeling and analysis: A goal-oriented approach

Author keywords

Inverse contributions; Negative softgoal; Security requirements engineering; Software security; Threat modeling

Indexed keywords

COMPUTER CRIME; COMPUTER SIMULATION; OBJECT ORIENTED PROGRAMMING; SOFTWARE ENGINEERING;

EID: 38049161526     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (46)

References (31)
  • 1
    • 38049152207 scopus 로고    scopus 로고
    • C. J. Alberts, S. G. Behrens, R. D. Pethia, and W. R. Wilson. Operationally critical threat, asset, and vulnerability evaluation (octave) framework. Technical Report CMU/SEI-99-TR-017, SEL Carnegie Mellon University, May 2005.
    • C. J. Alberts, S. G. Behrens, R. D. Pethia, and W. R. Wilson. Operationally critical threat, asset, and vulnerability evaluation (octave) framework. Technical Report CMU/SEI-99-TR-017, SEL Carnegie Mellon University, May 2005.
  • 11
    • 79955163100 scopus 로고    scopus 로고
    • UMLsec: Extending UML for secure systems development
    • 2460, Springer-Verlag
    • J. Jrjens. UMLsec: Extending UML for secure systems development. UML 2002, LNCS 2460, Springer-Verlag, 2002.
    • (2002) LNCS , vol.UML 2002
    • Jrjens, J.1
  • 12
    • 38049131510 scopus 로고    scopus 로고
    • M. Keeney, E. Kowalski, D. Cappelli, A. Moore, T. Shimeall, and S. Rogers. Insider threat study: Computer system sabotage in critical infrastructure sectors. Technical report. Software Eng. Institute, Carnegie Mellon University, May 2005.
    • M. Keeney, E. Kowalski, D. Cappelli, A. Moore, T. Shimeall, and S. Rogers. Insider threat study: Computer system sabotage in critical infrastructure sectors. Technical report. Software Eng. Institute, Carnegie Mellon University, May 2005.
  • 13
    • 12844284330 scopus 로고
    • A taxonomy of computer program security flaws, with examples
    • Technical Report NRL/FR/5542-93-9591, Naval Research Laboratory, Washington, DC, Nov
    • C. E. Landwehr, A. R. Bull, J. P. McDermott, and W. S. Choi. A taxonomy of computer program security flaws, with examples. Technical Report NRL/FR/5542-93-9591, Naval Research Laboratory, Washington, DC, Nov. 1993.
    • (1993)
    • Landwehr, C.E.1    Bull, A.R.2    McDermott, J.P.3    Choi, W.S.4
  • 15
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: A UML-based modeling language for model-driven security
    • 2460, Springer-Verlag
    • T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-based modeling language for model-driven security. UML 2002, LNCS 2460, Springer-Verlag, pages 426-441, 2002.
    • (2002) LNCS , vol.UML 2002 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 16
    • 35048841167 scopus 로고    scopus 로고
    • Requirements engineering meets trust management: Model, methodology, and reasoning
    • Proceedings of iTrust'04
    • P. G. F. Massacci, J. Mylopoulos, and N. Zannone. Requirements engineering meets trust management: Model, methodology, and reasoning. In Proceedings of iTrust'04, LNCS 2995, pages 176-190, 2004.
    • (2004) LNCS , vol.2995 , pp. 176-190
    • Massacci, P.G.F.1    Mylopoulos, J.2    Zannone, N.3
  • 19
    • 38049159507 scopus 로고    scopus 로고
    • A. P. Moore, R. J. Ellison, and R. C. Linger. Attack modeling for information security and survivability. Technical Report CMU/SEI-2001-TN-OOT, Software Engineering Institute, Carnegie Mellon University, March 2001.
    • A. P. Moore, R. J. Ellison, and R. C. Linger. Attack modeling for information security and survivability. Technical Report CMU/SEI-2001-TN-OOT, Software Engineering Institute, Carnegie Mellon University, March 2001.
  • 21
    • 38049155208 scopus 로고    scopus 로고
    • NIST Software errors costs U.S. economy $59.5 billion annually. Technical Report NIST 2002-10, National Institute of Standards and Technology, June 2002.
    • NIST Software errors costs U.S. economy $59.5 billion annually. Technical Report NIST 2002-10, National Institute of Standards and Technology, June 2002.
  • 23
    • 38049168293 scopus 로고    scopus 로고
    • B. Schneier. Attack trees: Modeling security threats. Dr. Dobbs Journal, pages 21-29, December 1999.
    • B. Schneier. Attack trees: Modeling security threats. Dr. Dobbs Journal, pages 21-29, December 1999.
  • 24
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • January
    • G. Sindre and A. L. Opdahl. Eliciting security requirements with misuse cases. Requirements Engineering, 10(1):34-44, January 2005.
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 25
    • 0003618149 scopus 로고
    • Scenario-based requirements analysis
    • A. Sutcliffe. Scenario-based requirements analysis. Requirements Engineering, 3(1):48-65, 1995.
    • (1995) Requirements Engineering , vol.3 , Issue.1 , pp. 48-65
    • Sutcliffe, A.1
  • 27
    • 14744271048 scopus 로고    scopus 로고
    • Application penetration testing
    • 66-69
    • H. H. Thompson. Application penetration testing. IEEE Security and Privacy, 03(1):66-69, 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.1
    • Thompson, H.H.1
  • 28
    • 27644580707 scopus 로고    scopus 로고
    • Demystifying the threat-modeling process
    • 66-70, Sept/Oct
    • P. Torr. Demystifying the threat-modeling process. IEEE Security and Privacy, 03(5):66-70, Sept/Oct 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.5
    • Torr, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.