메뉴 건너뛰기




Volumn 2, Issue , 2009, Pages 439-444

On a Classification Approach for SOA Vulnerabilities

Author keywords

Security; SOA; Vulnerability Classification; Vulnerability Management

Indexed keywords

BUSINESS PROCESS; CLASSIFICATION APPROACH; OPERATING SYSTEMS; VULNERABILITY MANAGEMENT; WEB APPLICATION;

EID: 70449636536     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMPSAC.2009.173     Document Type: Conference Paper
Times cited : (28)

References (43)
  • 1
    • 70449639903 scopus 로고    scopus 로고
    • Global report on soa/web services security initiatives
    • G. Trub and L. Olski, "Global report on soa/web services security initiatives," GMG Insights, Tech. Rep., 2008.
    • (2008) GMG Insights, Tech. Rep.
    • Trub, G.1    Olski, L.2
  • 3
    • 59449108823 scopus 로고    scopus 로고
    • National Institute of Standards and Technology. [Online]. Available: http://nvd.nist.gov/
    • National Institute of Standards and Technology, "National vulnerability database," http://nvd.nist.gov/, 2009. [Online]. Available: http://nvd.nist.gov/
    • (2009) National Vulnerability Database
  • 4
    • 84871961892 scopus 로고    scopus 로고
    • Open Security Foundation (OSF) . [Online]. Available: http://osvdb.org
    • Open Security Foundation (OSF), "Open Source Vulnerability Database (OSVDB)," http://osvdb.org, 2009. [Online]. Available: http://osvdb.org
    • (2009) Open Source Vulnerability Database (OSVDB)
  • 5
    • 70449646408 scopus 로고    scopus 로고
    • [Online]. Available
    • SecurityFocus, "Securityfocus vulnerability database," 2009. [Online]. Available: http://www.securityfocus.com/vulnerabilities
    • (2009) Securityfocus Vulnerability Database
  • 6
    • 70449672552 scopus 로고    scopus 로고
    • [Online]. Available: http://www.sans.org/top20/
    • SANS, "Sans top 20 security risks," http://www.sans.org/top20/, 2007. [Online]. Available: http://www.sans.org/top20/
    • (2007) Sans Top 20 Security Risks
  • 7
    • 70449685977 scopus 로고    scopus 로고
    • MITRE Corporation. [Online]. Available: http://measurablesecurity.mitre. org/
    • MITRE Corporation, "Making security measurable," http://measurablesecurity.mitre.org/, 2009. [Online]. Available: http://measurablesecurity.mitre.org/
    • (2009) Making Security Measurable
  • 8
    • 70449635321 scopus 로고    scopus 로고
    • The OWASP Foundation. [Online]. Available: http://www.owasp.org/
    • The OWASP Foundation, "Open web application security project (owasp)," http://www.owasp.org/, 2009. [Online]. Available: http://www.owasp.org/
    • (2009) Open Web Application Security Project (Owasp)
  • 9
    • 70449629149 scopus 로고    scopus 로고
    • Web Application Security Consortium, [Online]. Available
    • Web Application Security Consortium, "Web application security consortium threat classification," 2009. [Online]. Available: http://www.webappsec.org/projects/threat/
    • (2009) Web Application Security Consortium Threat Classification
  • 13
    • 10944267118 scopus 로고    scopus 로고
    • Static analysis for security
    • B. Chess and G. McGraw, "Static analysis for security," IEEE Security and Privacy, vol.Nov/Dec, pp. 32-35, 2004.
    • (2004) IEEE Security and Privacy , vol.NOV AND DEC , pp. 32-35
    • Chess, B.1    McGraw, G.2
  • 21
    • 2442605789 scopus 로고
    • technical report isi/sr-78-13, University of Southern California Information Sciences Institute, Marina Del Rey, CA, Tech. Rep.
    • R. Bisbey II and D. Hollingworth, "Protection analysis: Final report. technical report isi/sr-78-13," University of Southern California Information Sciences Institute, Marina Del Rey, CA, Tech. Rep., 1978.
    • (1978) Protection Analysis: Final Report
    • Bisbey II, R.1    Hollingworth, D.2
  • 25
    • 30344442772 scopus 로고    scopus 로고
    • Seven pernicious kingdoms: A taxonomy of software security errors
    • K. Tsipenyuk, B. Chess, and G. McGraw, "Seven pernicious kingdoms: A taxonomy of software security errors," IEEE Security and Privacy, vol.3, no.6, pp. 81-84, 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.6 , pp. 81-84
    • Tsipenyuk, K.1    Chess, B.2    McGraw, G.3
  • 28
    • 70449651912 scopus 로고    scopus 로고
    • Forum Of Incident Response And Security Teams (FIRST), [Online]. Available
    • Forum Of Incident Response And Security Teams (FIRST), "Common vulnerability scoring system 2.0," 2007. [Online]. Available: http://www.first.org/cvss
    • (2007) Common Vulnerability Scoring System 2.0
  • 29
    • 70350545677 scopus 로고    scopus 로고
    • Classification of component vulnerabilities in Java service oriented programming (SOP) platforms
    • ser. LNCS. Springer, October
    • P. Parrend and S. Frénot, "Classification of component vulnerabilities in Java service oriented programming (SOP) platforms," in Conference on Component-based Software Engineering (CBSE'2008), ser. LNCS, vol.5282/2008. Springer, October 2008.
    • (2008) Conference on Component-based Software Engineering (CBSE'2008) , vol.5282 , Issue.2008
    • Parrend, P.1    Frénot, S.2
  • 30
    • 36348977135 scopus 로고    scopus 로고
    • MITRE Corporation. [Online]. Available: http://cwe.mitre.org/
    • MITRE Corporation, "Common weakness enumeration," http://cwe.mitre.org, 2009. [Online]. Available: http://cwe.mitre.org/
    • (2009) Common Weakness Enumeration
  • 34
    • 69949159983 scopus 로고    scopus 로고
    • MITRE Corporation. [Online]. Available: http://capec.mitre.org/
    • MITRE Corporation, "Common Attack Pattern Enumeration and Classification (CAPEC)," http://capec.mitre.org/, 2009. [Online]. Available: http://capec.mitre.org/
    • (2009) Common Attack Pattern Enumeration and Classification (CAPEC)
  • 37
    • 57849117582 scopus 로고    scopus 로고
    • Compliance monitor for early warning risk determination
    • October
    • R. Accorsi, Y. Sato, and S. Kai, "Compliance monitor for early warning risk determination," Wirtschaftsinformatik, vol.50, no.5, October 2008.
    • (2008) Wirtschaftsinformatik , vol.50 , Issue.5
    • Accorsi, R.1    Sato, Y.2    Kai, S.3
  • 40
    • 84857188344 scopus 로고    scopus 로고
    • IT Governance Institute
    • IT Governance Institute, "Cobit 4.1," 2007.
    • (2007) Cobit 4.1
  • 41
    • 70449674451 scopus 로고    scopus 로고
    • [Online]. Available: http: //www.sans.org/cag/
    • J. Gilligan, "Consensus audit guidelines," http://www.sans.org/ cag/, 2009. [Online]. Available: http: //www.sans.org/cag/
    • (2009) Consensus Audit Guidelines
    • Gilligan, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.