메뉴 건너뛰기




Volumn , Issue , 2009, Pages

A rigorous methodology for security architecture modeling and verification

Author keywords

[No Author keywords available]

Indexed keywords

ARCHITECTURE MODELING; CONSTRAINED MODELS; FORMAL REPRESENTATIONS; IN BUILDINGS; RIGOROUS METHODOLOGIES; SECURITY ARCHITECTURES; SECURITY PROPERTIES; SECURITY REQUIREMENTS; SMV MODELS; SYMBOLIC MODEL-CHECKING; THREAT MODELING; THREAT-MODELING PROCESS;

EID: 63349090625     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2009.35     Document Type: Conference Paper
Times cited : (15)

References (19)
  • 1
    • 33646524687 scopus 로고    scopus 로고
    • Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets
    • Apr
    • Dianxiang Xu, Kendall E. Nygard, "Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets," IEEE Transactions on Software Engineering, vol. 32, no. 4, pp. 265-278, Apr., 2006.
    • (2006) IEEE Transactions on Software Engineering , vol.32 , Issue.4 , pp. 265-278
    • Xu, D.1    Nygard, K.E.2
  • 2
    • 0141502155 scopus 로고    scopus 로고
    • An Approach for Modeling and Analysis of Security System Architectures
    • Sept/Oct
    • Yi Deng, Jiacun Wang, Jeffrey J.P. Tsai, Konstantin Beznosov, "An Approach for Modeling and Analysis of Security System Architectures," IEEE Transactions on Knowledge and Data Engineering, vol. 15, no. 5, pp. 1099-1119, Sept/Oct, 2003.
    • (2003) IEEE Transactions on Knowledge and Data Engineering , vol.15 , Issue.5 , pp. 1099-1119
    • Deng, Y.1    Wang, J.2    Tsai, J.J.P.3    Beznosov, K.4
  • 3
    • 84869273607 scopus 로고    scopus 로고
    • Attack Trees
    • December
    • Bruce Schneier, "Attack Trees," Dr. Dobb's Journal December 1999. http://www.schneier.com/paper-attacktrees-fig1.html
    • (1999) Dr. Dobb's Journal
  • 4
    • 63349103744 scopus 로고    scopus 로고
    • Security Threat Modeling: A Goal-Oriented Approach
    • Dallas, TX, Dec
    • Ebenezer Oladimeji, Sam Supakkul, and Lawrence Chung, "Security Threat Modeling: A Goal-Oriented Approach," Proceedings of SEA'06, Dallas, TX, Dec. 2006
    • (2006) Proceedings of SEA'06
    • Oladimeji, E.1    Supakkul, S.2    Chung, L.3
  • 5
    • 0034497420 scopus 로고    scopus 로고
    • Eliciting security requirements by misuse cases
    • Guttorm Sindre, and Andreas L. Opdahl. "Eliciting security requirements by misuse cases. " Proceedings of TOOLS Pacific 2000, pp. 120-131, 2000.
    • (2000) Proceedings of TOOLS Pacific 2000 , pp. 120-131
    • Sindre, G.1    Opdahl, A.L.2
  • 6
    • 63349105375 scopus 로고    scopus 로고
    • Suvda Myagmar, Adam J. Lee, and William Yurcik, Threat Modeling as a Basis for Security Requirements, Symposium on Requirements Engineering for Information Security (SREIS) in conjunction with 13th IEEE International Requirements Engineering Conference (RE), Paris, France, Aug., 2005.
    • Suvda Myagmar, Adam J. Lee, and William Yurcik, "Threat Modeling as a Basis for Security Requirements," Symposium on Requirements Engineering for Information Security (SREIS) in conjunction with 13th IEEE International Requirements Engineering Conference (RE), Paris, France, Aug., 2005.
  • 9
    • 63349090616 scopus 로고    scopus 로고
    • Threat-Driven Design and Analysis of Secure Software Architectures
    • June
    • Dianxiang Xu and Josh Pauli, "Threat-Driven Design and Analysis of Secure Software Architectures," Journal of Information Assurance (JIAS), vol. 1, no. 2, June 2006.
    • (2006) Journal of Information Assurance (JIAS) , vol.1 , Issue.2
    • Xu, D.1    Pauli, J.2
  • 10
    • 0034291619 scopus 로고    scopus 로고
    • Axel van Lamsweerde and Emmanuel Letier, Handling Obstacles in Goal-Oriented Requirements Engineering, IEEE Transactions on Software Enineering. Special Issue on Exception Handling, 2000.
    • Axel van Lamsweerde and Emmanuel Letier, "Handling Obstacles in Goal-Oriented Requirements Engineering," IEEE Transactions on Software Enineering. Special Issue on Exception Handling, 2000.
  • 14
    • 27744500390 scopus 로고    scopus 로고
    • Automated analysis of unified modeling language (UML) specifications
    • Master's thesis presented to the University of Waterloo, August
    • Meyer C. Tanuan, "Automated analysis of unified modeling language (UML) specifications." Master's thesis presented to the University of Waterloo, August 2001.
    • (2001)
    • Tanuan, M.C.1
  • 16
    • 1242320326 scopus 로고    scopus 로고
    • Formally analyzing software architectural specifications using SAM
    • Xudong He, Huiqun Yu, Tianjun Shi, Junhua Ding, Yi Deng, "Formally analyzing software architectural specifications using SAM," Journal of Systems and Software 71 (1-2), pp.11-29, 2004.
    • (2004) Journal of Systems and Software , vol.71 , Issue.1-2 , pp. 11-29
    • He, X.1    Yu, H.2    Shi, T.3    Ding, J.4    Deng, Y.5
  • 17
    • 0036149234 scopus 로고    scopus 로고
    • Correctness by Construction: Developing a. Commercial Secure System
    • Anthony Hall and Roderick Chapman, "Correctness by Construction: Developing a. Commercial Secure System," IEEE Software, Jan/Feb 2002, pp18 - 25, 2002.
    • (2002) IEEE Software, Jan/Feb 2002 , pp. 18-25
    • Hall, A.1    Chapman, R.2
  • 18
    • 0010314258 scopus 로고
    • Carnegie-Mellon University, Pittsburgh, PA, Feb
    • Ken McMllan. "The SMV System". Carnegie-Mellon University, Pittsburgh, PA, Feb. 1992.
    • (1992) The SMV System
    • McMllan, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.