메뉴 건너뛰기




Volumn , Issue , 2007, Pages 393-396

Checking threat modeling data flow diagrams for implementation conformance and security

Author keywords

data flow diagrams; denial of service; information disclosure; reflexion models; security analysis; spoofing; tampering; threat modeling

Indexed keywords

APPLICATION SECURITY; DATA FLOW DIAGRAMS; DENIAL OF SERVICE; INFORMATION DISCLOSURE; NOVICE DESIGNERS; SECURITY ANALYSIS; SECURITY THREATS; THREAT MODELING;

EID: 77951490166     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1321631.1321692     Document Type: Conference Paper
Times cited : (39)

References (8)
  • 5
    • 0035308156 scopus 로고    scopus 로고
    • Software Reflexion Models: Bridging the Gap between Design and Implementation
    • G. C. Murphy, D. Notkin, and K. J. Sullivan. Software Reflexion Models: Bridging the Gap between Design and Implementation. IEEE Trans. Softw. Eng., 27(4), 2001.
    • (2001) IEEE Trans. Softw. Eng. , vol.27 , Issue.4
    • Murphy, G.C.1    Notkin, D.2    Sullivan, K.J.3
  • 7
    • 27644580707 scopus 로고    scopus 로고
    • Demystifying the Threat-Modeling Process
    • P. Torr. Demystifying the Threat-Modeling Process. IEEE Security and Privacy, 03(5):66-70, 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.5 , pp. 66-70
    • Torr, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.