메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1156-1163

Using security patterns to combine security metrics

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATIONS.; INTERNATIONAL CONFERENCES; SECURITY METRICS; SECURITY OBJECTIVES; SECURITY PATTERNS;

EID: 49049102759     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2008.54     Document Type: Conference Paper
Times cited : (42)

References (18)
  • 2
    • 49049113762 scopus 로고    scopus 로고
    • The OWASP CLASP Project
    • "The OWASP CLASP Project." http://www.owasp.org/.
  • 4
    • 49049118120 scopus 로고    scopus 로고
    • T. Heyman and C. Huygens, Software security patterns and risk. First Workshop on Security Metrics, MetriCon 1.0, Vancouver, BC, Canada, August 1, 2006, USENIX, 2006.
    • T. Heyman and C. Huygens, "Software security patterns and risk." First Workshop on Security Metrics, MetriCon 1.0, Vancouver, BC, Canada, August 1, 2006, USENIX, 2006.
  • 9
    • 38549112088 scopus 로고    scopus 로고
    • An inventory of security patterns,
    • Tech. Rep. CW-469, Katholieke Universiteit Leuven, Department of Computer Science
    • K. Yskout, T. Heyman, R. Scandariato, and W. Joosen, "An inventory of security patterns," Tech. Rep. CW-469, Katholieke Universiteit Leuven, Department of Computer Science, 2006.
    • (2006)
    • Yskout, K.1    Heyman, T.2    Scandariato, R.3    Joosen, W.4
  • 15
    • 49049092665 scopus 로고    scopus 로고
    • ClearPoint Metrics, Security metrics management: metrics that matter, 2006.
    • ClearPoint Metrics, "Security metrics management: metrics that matter," 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.