메뉴 건너뛰기




Volumn , Issue , 2009, Pages

System level security modeling using attack trees

Author keywords

Attack tree; Attack tree nodes; Security modelings

Indexed keywords

ATTACK TREE; ATTACK TREE NODES; DYNAMIC ASPECTS; ERROR RECOVERY MECHANISMS; GRAPHICAL REPRESENTATIONS; INTRUSION TOLERANT SYSTEM; OPERATION MODE; ORDERING EVENTS; RELATED SYSTEMS; SECURITY MODEL; SECURITY MODELING; SECURITY MODELINGS; SYSTEM LEVELS;

EID: 70349170749     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IC4.2009.4909245     Document Type: Conference Paper
Times cited : (41)

References (19)
  • 2
    • 0002670359 scopus 로고    scopus 로고
    • Attack Trees
    • B. Schneier, "Attack Trees", Dr. Dobb's Journal, vol.24, no.12, pp.21-29, 1999.
    • (1999) Dr. Dobb's Journal , vol.24 , Issue.12 , pp. 21-29
    • Schneier, B.1
  • 10
    • 33745983856 scopus 로고    scopus 로고
    • OWA trees and their role in security modeling using attack trees
    • R. R. Yager, and Ht, "OWA trees and their role in security modeling using attack trees," Information Sciences, vol.176, no.20, pp. 2933-2959, 2006.
    • (2006) Information Sciences , vol.176 , Issue.20 , pp. 2933-2959
    • Yager, R.R.1
  • 11
    • 35048855032 scopus 로고    scopus 로고
    • Application of 'Attack Trees' Technique to Copyright Protection Protocols Using Watermarking and Definition of a New Transactions Protocol SecDP (Secure Distribution Protocol)
    • M. V. Higuero, J. J. Unzilla, E. Jacob, P. Sáiz, and D. Luengo, " Application of 'Attack Trees' Technique to Copyright Protection Protocols Using Watermarking and Definition of a New Transactions Protocol SecDP (Secure Distribution Protocol)", Lecture Notes in Computer Science (LNCS) 3311, pp. 264-275, 2004.
    • (2004) Lecture Notes in Computer Science (LNCS) , vol.3311 , pp. 264-275
    • Higuero, M.V.1    Unzilla, J.J.2    Jacob, E.3    Sáiz, P.4    Luengo, D.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.