메뉴 건너뛰기




Volumn 5965 LNCS, Issue , 2010, Pages 114-122

Idea: Reusability of threat models - Two approaches with an experimental evaluation

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK TREE; CONTROLLED EXPERIMENT; EXPERIMENTAL EVALUATION; KNOWLEDGE-SHARING; MISUSE CASE; PROFESSIONAL SOFTWARE; QUALITATIVE EVALUATIONS; SOFTWARE COMPANY; SOFTWARE DEVELOPER;

EID: 77949463181     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-11747-3_9     Document Type: Conference Paper
Times cited : (11)

References (14)
  • 1
    • 77949482736 scopus 로고    scopus 로고
    • McGraw, G.: Software Security: Building Security In. Addison-Wesley, Reading (2006)
    • McGraw, G.: Software Security: Building Security In. Addison-Wesley, Reading (2006)
  • 2
    • 23944475544 scopus 로고    scopus 로고
    • When security meets software engineering: A case of modelling secure information systems
    • Mouratidis, H., Giorgini, P., Manson, G.: When security meets software engineering: a case of modelling secure information systems. Information Systems 30(8), 609-629 (2005)
    • (2005) Information Systems , vol.30 , Issue.8 , pp. 609-629
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.3
  • 3
    • 27644580707 scopus 로고    scopus 로고
    • Demystifying the threat modeling process
    • Torr, P.: Demystifying the threat modeling process. IEEE Security & Privacy 3(5), 66-70 (2005)
    • (2005) IEEE Security & Privacy , vol.3 , Issue.5 , pp. 66-70
    • Torr, P.1
  • 6
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Engineering 10(1), 34-44 (2005)
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 9
    • 60949097689 scopus 로고    scopus 로고
    • Experimental comparison of attack trees and misuse cases for security threat identification
    • Opdahl, A.L., Sindre, G.: Experimental comparison of attack trees and misuse cases for security threat identification. Information and Software Technology 51(5), 916-932 (2009)
    • (2009) Information and Software Technology , vol.51 , Issue.5 , pp. 916-932
    • Opdahl, A.L.1    Sindre, G.2
  • 12
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technologies
    • Davis, F.: Perceived usefulness, perceived ease of use, and user acceptance of information technologies. MIS Quarterly 13(3), 319-340 (1989)
    • (1989) MIS Quarterly , vol.13 , Issue.3 , pp. 319-340
    • Davis, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.