메뉴 건너뛰기




Volumn , Issue , 2009, Pages 419-424

Introducing vulnerability awareness to common criteria's security targets

Author keywords

Common criteria; Security activity graph; Security target; Vulnerability cause graph; Vulnerability cause mitigation; Vulnerability modeling

Indexed keywords

COMPUTER SOFTWARE;

EID: 70749151816     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSEA.2009.67     Document Type: Conference Paper
Times cited : (16)

References (20)
  • 1
    • 77951751854 scopus 로고    scopus 로고
    • Build Security In 2006-08-10, accessed August
    • N. R. Mead, "Security requirements engineering", Build Security In 2006-08-10, http://buildsecurityin.us-cert.gov/daisy/bsi/articles/ bestpractices/requirements/243.html, accessed August 2007.
    • (2007) Security Requirements Engineering
    • Mead, N.R.1
  • 4
    • 70749133282 scopus 로고    scopus 로고
    • SECTRA AB, http://www.sectra.com.
    • SECTRA AB
  • 7
    • 49049097741 scopus 로고    scopus 로고
    • A cause-based approach to preventing software vulnerabilities
    • Reliability and Security (ARES08), Barcelona, Spain, March
    • D. Byers, N. Shahmehri, "A cause-based approach to preventing software vulnerabilities", Proceedings of the International Conference on Availability, Reliability and Security (ARES08), Barcelona, Spain, March 2008.
    • (2008) Proceedings of the International Conference on Availability
    • Byers, D.1    Shahmehri, N.2
  • 9
    • 70749136564 scopus 로고    scopus 로고
    • http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0513.
  • 10
    • 70749135762 scopus 로고    scopus 로고
    • Security Target CC Evaluation Document, ver. 1.0, April
    • IBM Tivoli Access Manager for e-businnes 5.1 with Fixpack 06, Security Target CC Evaluation Document, ver. 1.0, April 2005, http://www. commoncriteriaportal.org/files/epfiles/0285b.pdf.
    • (2005) IBM Tivoli Access Manager for e-Businnes 5.1 with Fixpack 06
  • 11
    • 70749118760 scopus 로고    scopus 로고
    • Deliverable D2.2, accessed April
    • SHIELDS project, Deliverable D2.2, http://www.shields-project.eu, accessed April 2009.
    • (2009) SHIELDS Project
  • 12
    • 70749145723 scopus 로고    scopus 로고
    • http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192.
  • 13
    • 70349673927 scopus 로고    scopus 로고
    • Prioritisation and selection of software security activities
    • Reliability and Security (ARES09), Fukuoka, Japan, March
    • D. Byers, N. Shahmehri, "Prioritisation and selection of software security activities", Proceedings of the International Conference on Availability, Reliability and Security (ARES09), Fukuoka, Japan, March 2009.
    • (2009) Proceedings of the International Conference on Availability
    • Byers, D.1    Shahmehri, N.2
  • 15
    • 70749087037 scopus 로고    scopus 로고
    • Version 6.0f
    • CC ToolBox, Version 6.0f, http://pagenotes.com/writings/.
    • CC ToolBox
  • 19
    • 70749140107 scopus 로고    scopus 로고
    • http://www.atsec.de/01/index.php?id=03-0002-01&news=127.
  • 20
    • 70749148634 scopus 로고    scopus 로고
    • Report of the defense science board task force on mission impact of foreign influence on dod software
    • Technology and Logistics, Washington D.C., September
    • Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on DoD Software, Office of the Under Secretary of Defense For Acquisition, Technology and Logistics, Washington D.C., September 2007.
    • (2007) Office of the Under Secretary of Defense For Acquisition


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.