메뉴 건너뛰기




Volumn 28, Issue 7, 2009, Pages 521-535

Risk profiles and distributed risk assessment

Author keywords

Distributed algorithm; Distributed systems; Risk management; Security; Security model

Indexed keywords

AD-HOC COLLABORATION; CONTINUOUS ASSESSMENT; CRITICAL ASSET; DISTRIBUTED ALGORITHM; DISTRIBUTED COMPUTATIONS; DISTRIBUTED SYSTEMS; DYNAMIC SYSTEMS; OPERATIONAL LIFE; PATH ENUMERATION; POLICY CHANGES; RISK PROFILE; SECURITY; SECURITY MODEL; SYSTEM CHANGE;

EID: 70349596824     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2009.04.005     Document Type: Article
Times cited : (16)

References (38)
  • 1
    • 0041957197 scopus 로고    scopus 로고
    • Managing information security risks - the octave approach
    • Addison-Wesley
    • Alberts C., and Dorofee A. Managing information security risks - the octave approach. SEI series in software engineering (2003), Addison-Wesley
    • (2003) SEI series in software engineering
    • Alberts, C.1    Dorofee, A.2
  • 3
    • 0027804413 scopus 로고
    • Information systems security design methods: implications for information systems development
    • Baskerville R. Information systems security design methods: implications for information systems development. ACM Computing Surveys 25 4 (1993) 375-414
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 4
    • 33947368645 scopus 로고    scopus 로고
    • Model-based security analysis in seven steps - a guided tour to the CORAS method
    • Braber F., Hogganvik I., Lund M.S., Stølen K., and Vraalsen F. Model-based security analysis in seven steps - a guided tour to the CORAS method. BT Technology Journal 25 1 (2007) 101-117
    • (2007) BT Technology Journal , vol.25 , Issue.1 , pp. 101-117
    • Braber, F.1    Hogganvik, I.2    Lund, M.S.3    Stølen, K.4    Vraalsen, F.5
  • 5
    • 2442549069 scopus 로고    scopus 로고
    • Using trust for secure collaboration in uncertain environments
    • Cahill V., et al. Using trust for secure collaboration in uncertain environments. IEEE Pervasive Computing 2 3 (2003) 52-61
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.3 , pp. 52-61
    • Cahill, V.1
  • 8
    • 33845214117 scopus 로고    scopus 로고
    • Department of Computer Science, The University of York, York, UK p. 484
    • Chivers H. Security design analysis (2006), Department of Computer Science, The University of York, York, UK p. 484
    • (2006) Security design analysis
    • Chivers, H.1
  • 10
    • 0032839653 scopus 로고    scopus 로고
    • Combining probability distributions from experts in risk analysis
    • Clemen R.T., and Winkler R.L. Combining probability distributions from experts in risk analysis. Risk Analysis 19 2 (1999) 187-203
    • (1999) Risk Analysis , vol.19 , Issue.2 , pp. 187-203
    • Clemen, R.T.1    Winkler, R.L.2
  • 11
    • 35048850522 scopus 로고    scopus 로고
    • On trust establishment in mobile ad-hoc networks
    • Proceedings of the security protocols workshop, Springer-Verlag
    • Eschenauer L., Gligor V.D., and Baras J. On trust establishment in mobile ad-hoc networks. Proceedings of the security protocols workshop. Lecture notes in computer science (LNCS) vol. 2845 (2002), Springer-Verlag 47-66
    • (2002) Lecture notes in computer science (LNCS) , vol.2845 , pp. 47-66
    • Eschenauer, L.1    Gligor, V.D.2    Baras, J.3
  • 12
    • 70349594037 scopus 로고    scopus 로고
    • Fenton N, Neil M, Combining evidence in risk analysis using Bayesian networks, Agenda white paper, W0704/01; 2004. Available from: [accessed January 2009].
    • Fenton N, Neil M, Combining evidence in risk analysis using Bayesian networks, Agenda white paper, W0704/01; 2004. Available from: [accessed January 2009].
  • 14
    • 33750988493 scopus 로고    scopus 로고
    • Component-based hazard analysis: optimal designs, product lines, and online-reconfiguration
    • Proceedings of the SAFECOMP '04, Springer, Berlin/Heidelberg
    • Giese H., and Tichy M. Component-based hazard analysis: optimal designs, product lines, and online-reconfiguration. Proceedings of the SAFECOMP '04. Lecture notes in computer science vol. 4166 (2006), Springer, Berlin/Heidelberg 156-169
    • (2006) Lecture notes in computer science , vol.4166 , pp. 156-169
    • Giese, H.1    Tichy, M.2
  • 17
    • 33750384757 scopus 로고    scopus 로고
    • A graphical approach to risk identification, motivated by empirical investigations
    • Proceedings of the ninth international conference on model driven engineering and systems (MoDELS '06), Springer, Berlin
    • Hogganvik I., and Stølen K. A graphical approach to risk identification, motivated by empirical investigations. Proceedings of the ninth international conference on model driven engineering and systems (MoDELS '06). Lecture notes in computer science (LNCS) vol. 4199 (2006), Springer, Berlin 574-588
    • (2006) Lecture notes in computer science (LNCS) , vol.4199 , pp. 574-588
    • Hogganvik, I.1    Stølen, K.2
  • 19
    • 84944220091 scopus 로고    scopus 로고
    • Towards development of secure systems using UMLsec
    • Proceedings of the fundamental approaches to software engineering: fourth international conference, FASE 2001: held as part of the joint European conferences on theory and practice of software, ETAPS 2001, Springer-Verlag
    • Jürjens J. Towards development of secure systems using UMLsec. Proceedings of the fundamental approaches to software engineering: fourth international conference, FASE 2001: held as part of the joint European conferences on theory and practice of software, ETAPS 2001. Lecture notes in computer science vol. 2029 (2001), Springer-Verlag
    • (2001) Lecture notes in computer science , vol.2029
    • Jürjens, J.1
  • 22
    • 33845224346 scopus 로고    scopus 로고
    • Security requirements engineering for e-government applications: analysis of current frameworks
    • Proceedings of the electronic government: third international conference, EGOV 2004, Springer-Verlag
    • Kalloniatis C. Security requirements engineering for e-government applications: analysis of current frameworks. Proceedings of the electronic government: third international conference, EGOV 2004. Lecture notes in computer science vol. 3183/2004 (2004), Springer-Verlag 66-71
    • (2004) Lecture notes in computer science , vol.3183-2004 , pp. 66-71
    • Kalloniatis, C.1
  • 24
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: a UML-based modeling language for model-driven security
    • Proceedings of the fifth international conference on the unified modelling language, Springer-Verlag
    • Lodderstedt T., Basin D., and Doser J. SecureUML: a UML-based modeling language for model-driven security. Proceedings of the fifth international conference on the unified modelling language. Lecture notes in computer science (LNCS) vol. 2460 (2002), Springer-Verlag 426-441
    • (2002) Lecture notes in computer science (LNCS) , vol.2460 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 26
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • IEEE Computer Society
    • McLean J. A general theory of composition for trace sets closed under selective interleaving functions. Proceedings of the IEEE symposium on research in security and privacy (1994), IEEE Computer Society 79-93
    • (1994) Proceedings of the IEEE symposium on research in security and privacy , pp. 79-93
    • McLean, J.1
  • 27
    • 32044433021 scopus 로고    scopus 로고
    • Open University, Department of Computing Technical Report no. 2004/23 [accessed January 2006]
    • Moffett J.D., Haley C.B., and Nuseibeh B.A. Core security requirements artifacts (2004), Open University, Department of Computing. http://computing-reports.open.ac.uk/index.php/content/download/166/999/f ile/2004_23.pdf Technical Report no. 2004/23 [accessed January 2006]
    • (2004) Core security requirements artifacts
    • Moffett, J.D.1    Haley, C.B.2    Nuseibeh, B.A.3
  • 29
    • 0035283779 scopus 로고    scopus 로고
    • Analysis and synthesis of the behaviour of complex programmable electronic systems in conditions of failure
    • Papadopoulos Y., McDermid J., Sasse R., and Heiner G. Analysis and synthesis of the behaviour of complex programmable electronic systems in conditions of failure. Reliability Engineering and System Safety 71 3 (2001) 229-247
    • (2001) Reliability Engineering and System Safety , vol.71 , Issue.3 , pp. 229-247
    • Papadopoulos, Y.1    McDermid, J.2    Sasse, R.3    Heiner, G.4
  • 30
    • 1842829828 scopus 로고    scopus 로고
    • SP 800-30, National Institute of Standards and Technology (NIST) [accessed January 2006]
    • Risk management guide for information technology systems. SP 800-30 (2002), National Institute of Standards and Technology (NIST). http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf [accessed January 2006]
    • (2002) Risk management guide for information technology systems
  • 33
    • 0010381933 scopus 로고    scopus 로고
    • The Internet Society, Reston, USA RFC 2828[accessed January 2006]
    • Shirey R. Internet security glossary (2000), The Internet Society, Reston, USA. http://ietfreport.isoc.org/rfc/rfc2828.txt RFC 2828[accessed January 2006]
    • (2000) Internet security glossary
    • Shirey, R.1
  • 35
    • 70349585136 scopus 로고    scopus 로고
    • University of York, Department of Computer Science, York, UK Technical Report YCS-2004-374
    • Srivatanakul T., Clark J., and Polack F. Security zonal analysis (2004), University of York, Department of Computer Science, York, UK. http://www.cs.york.ac.uk/ftpdir/reports/YCS-2004-374.pdf Technical Report YCS-2004-374
    • (2004) Security zonal analysis
    • Srivatanakul, T.1    Clark, J.2    Polack, F.3
  • 38
    • 33646524687 scopus 로고    scopus 로고
    • Threat-driven modeling and verification of secure software using aspect-oriented petri nets
    • Xu D., and Nygard K.E. Threat-driven modeling and verification of secure software using aspect-oriented petri nets. IEEE Transactions on Software Engineering 32 4 (2006) 265-278
    • (2006) IEEE Transactions on Software Engineering , vol.32 , Issue.4 , pp. 265-278
    • Xu, D.1    Nygard, K.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.