메뉴 건너뛰기




Volumn , Issue , 2009, Pages 719-723

Threat mitigation, monitoring and management plan - A new approach in risk management

Author keywords

Agents; Defense in depth; Mitigation; Monitoring; Threat modeling

Indexed keywords

COMPLEX SOFTWARE SYSTEMS; DEFENSE IN DEPTH; DEFENSE STRATEGY; DESIGN LEVELS; MONITORING AND MANAGEMENT; MULTI-LAYERED; NEW APPROACHES; ON-LINE BANKING; SECURITY ENVIRONMENTS; SECURITY RISKS; SOFTWARE SYSTEMS; THREAT MITIGATION; THREAT MODELING;

EID: 73849104170     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARTCom.2009.38     Document Type: Conference Paper
Times cited : (6)

References (26)
  • 8
    • 55249114157 scopus 로고    scopus 로고
    • C.Murray Woodside, Dorina C. Petriu, Dorin Bogdan Petriu, Jing Xu, Tauseef A. Israr, Geri Georg, Robert B. France,James M.Bieman, Siv Hilde Houmb, Jan Jürjens: Performance analysis of security aspects by weaving scenarios extracted from UML models. Journal of Systems and Software 82(1): 56-74 (2009).
    • C.Murray Woodside, Dorina C. Petriu, Dorin Bogdan Petriu, Jing Xu, Tauseef A. Israr, Geri Georg, Robert B. France,James M.Bieman, Siv Hilde Houmb, Jan Jürjens: Performance analysis of security aspects by weaving scenarios extracted from UML models. Journal of Systems and Software 82(1): 56-74 (2009).
  • 11
    • 21644480889 scopus 로고    scopus 로고
    • Steve Lipner, The Trustworthy Computing Security Development Lifecycle, ACSAC, pp.2-13, 20th Annual Computer Security Applications Conference (ACSAC'04), 2004.
    • Steve Lipner, "The Trustworthy Computing Security Development Lifecycle," ACSAC, pp.2-13, 20th Annual Computer Security Applications Conference (ACSAC'04), 2004.
  • 13
    • 73849129048 scopus 로고    scopus 로고
    • Vineet Saini, Qiang Duan and Vamsi Paruchuri, Threat Modeling Using Attack Trees, Proceedings of the Sixth Annual CCSC Mid-South Conference and Journal of Computing Sciences in Colleges, 23, Issue 4, April 2008.
    • Vineet Saini, Qiang Duan and Vamsi Paruchuri, "Threat Modeling Using Attack Trees", Proceedings of the Sixth Annual CCSC Mid-South Conference and Journal of Computing Sciences in Colleges, Volume 23, Issue 4, April 2008.
  • 14
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting Security Requirements with Misuse Cases
    • G.Sindre and A. L. Opdahl, "Eliciting Security Requirements with Misuse Cases", Requirements Engineering, 10(1):34-44, 2005.
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 15
    • 0037299044 scopus 로고    scopus 로고
    • Misuse cases help to elicit non-functional equirements
    • I. Alexander, "Misuse cases help to elicit non-functional equirements", Computing and Control Engineering Journal, 14(1):40-45, 2003.
    • (2003) Computing and Control Engineering Journal , vol.14 , Issue.1 , pp. 40-45
    • Alexander, I.1
  • 16
    • 2342563769 scopus 로고    scopus 로고
    • Considering Defense in Depth for Software Applications
    • IEEE Security and Privacy, January
    • Martin R. Stylz and James A> Whittaker, ""Considering Defense in Depth for Software Applications", IEEE Security and Privacy, January 2004..
    • (2004)
    • Martin, R.1
  • 17
    • 66249134919 scopus 로고    scopus 로고
    • Kevin Dauch, Adam Hovak, Roger Nestler, Information Assurance Using a Defense In-Depth Strategy, catch, pp.267-272, Cybersecurity Applications & Technology Conference for Homeland Security, 2009
    • Kevin Dauch, Adam Hovak, Roger Nestler, , "Information Assurance Using a Defense In-Depth Strategy," catch, pp.267-272, Cybersecurity Applications & Technology Conference for Homeland Security, 2009
  • 23
    • 0031074051 scopus 로고    scopus 로고
    • M.Wooldridge, Agent Based Software Engineering, IEE Proceedings, Software Engineering, January 1997, 144, Issue 1, pp. 26-37
    • M.Wooldridge, "Agent Based Software Engineering", IEE Proceedings, Software Engineering, January 1997, Volume 144, Issue 1, pp. 26-37
  • 24
    • 0001468432 scopus 로고    scopus 로고
    • Agent Oriented Software Engineering
    • M.Wooldridge and P.Ciancarini, "Agent Oriented Software Engineering", AOSE 2000, pp: 1-28.
    • (2000) AOSE , pp. 1-28
    • Wooldridge, M.1    Ciancarini, P.2
  • 25
    • 73849112823 scopus 로고    scopus 로고
    • Man-in-the-Middle Attacks, Copyright 2009 Entrust.
    • Man-in-the-Middle Attacks, Copyright 2009 Entrust.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.