메뉴 건너뛰기




Volumn , Issue , 2008, Pages 142-145

A unified threat model for assessing threat in web applications

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATIONS; INFORMATION SERVICES; INFORMATION THEORY; PROGRAMMING THEORY; WORLD WIDE WEB;

EID: 51449100978     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISA.2008.47     Document Type: Conference Paper
Times cited : (14)

References (12)
  • 2
    • 33747302976 scopus 로고    scopus 로고
    • Web application security engineering
    • J. D. Meier, "Web application security engineering." Security & Privacy Magazine, IEEE, vol. 4, pp. 16-24, 2006
    • (2006) Security & Privacy Magazine, IEEE , vol.4 , pp. 16-24
    • Meier, J.D.1
  • 3
    • 0038349200 scopus 로고    scopus 로고
    • MOPS: An Infrastructure for Examining Security Properties of Software
    • Washington, D.C, Nov
    • Chen, H., Wagner, D. "MOPS: an Infrastructure for Examining Security Properties of Software." In: ACM conference on computer and communication security. Washington, D.C., Nov 2002.
    • (2002) ACM conference on computer and communication security
    • Chen, H.1    Wagner, D.2
  • 4
    • 0036147522 scopus 로고    scopus 로고
    • Improving Security Using Extensible Lightweight Static Analysis
    • Jan
    • Evans D., Larochelle, D. "Improving Security Using Extensible Lightweight Static Analysis." In: IEEE Software, Jan 2002.
    • (2002) IEEE Software
    • Evans, D.1    Larochelle, D.2
  • 6
    • 0036735040 scopus 로고    scopus 로고
    • Treatment of general dependencies in system fault-tree and risk analysis
    • Vaurio, J. K. "Treatment of general dependencies in system fault-tree and risk analysis." IEEE Transactions on Reliability, vol. 51, 278-287, 2002.
    • (2002) IEEE Transactions on Reliability , vol.51 , pp. 278-287
    • Vaurio, J.K.1
  • 10
    • 51449089596 scopus 로고    scopus 로고
    • Attack Tree
    • New York: John Wiley and Sons
    • Schneier, B. "Attack Tree", Secrets and Lies. New York: John Wiley and Sons, 2000.
    • (2000) Secrets and Lies
    • Schneier, B.1
  • 12
    • 84936873422 scopus 로고    scopus 로고
    • Model-based risk assessment to improve enterprise security
    • IEEE Computer Society
    • Aagedal, J. Ø., den Braber, F., Dimitrakos, T. et al. "Model-based risk assessment to improve enterprise security." In: Proc. EDOC2002. 2002 IEEE Computer Society. 2002, 51-62.
    • (2002) Proc. EDOC2002 , pp. 51-62
    • Aagedal, J.Ø.1    den Braber, F.2    Dimitrakos, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.