메뉴 건너뛰기




Volumn 1, Issue , 2008, Pages 782-787

An attack scenario based approach for software security testing at design stage

Author keywords

Attack scenario; Software security testing

Indexed keywords

ACTIVITY DIAGRAMS; ATTACK PATHS; ATTACK PATTERNS; ATTACK SCENARIO; COVERAGE CRITERION; DESIGN STAGES; EARLY DESIGN STAGES; ON-LINE BANKINGS; POTENTIAL ATTACKS; SECURITY PATTERNS; SECURITY REQUIREMENTS; SOFTWARE SECURITY TESTING; SYSTEM DESIGNS; TEST CASE;

EID: 62349084005     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISCSCT.2008.116     Document Type: Conference Paper
Times cited : (17)

References (9)
  • 2
    • 62349119914 scopus 로고    scopus 로고
    • A. P. Moore, R. J. Ellison, and R. C. Linger. Attack modeling for information security and survivability, Technical Report, CMU/SEI-2001-TN-001, 2001.
    • A. P. Moore, R. J. Ellison, and R. C. Linger. "Attack modeling for information security and survivability", Technical Report, CMU/SEI-2001-TN-001, 2001.
  • 8
    • 34548508691 scopus 로고    scopus 로고
    • Security Attack Testing (SAT)-testing the security of information systems at design time
    • H. Mouratidis and P. Giorgini, "Security Attack Testing (SAT)-testing the security of information systems at design time," Information Systems, vol. 32, pp. 1166-1183, 2007.
    • (2007) Information Systems , vol.32 , pp. 1166-1183
    • Mouratidis, H.1    Giorgini, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.