|
Volumn , Issue , 2007, Pages 393-396
|
Checking threat modeling data flow diagrams for implementation conformance and security
|
Author keywords
data flow diagrams; denial of service; information disclosure; reflexion models; security analysis; spoofing; tampering; threat modeling
|
Indexed keywords
APPLICATION SECURITY;
DATA FLOW DIAGRAMS;
DENIAL OF SERVICE;
INFORMATION DISCLOSURE;
NOVICE DESIGNERS;
SECURITY ANALYSIS;
SECURITY THREATS;
THREAT MODELING;
COMPUTER SOFTWARE;
FLOWCHARTING;
GRAPHIC METHODS;
SECURITY OF DATA;
SECURITY SYSTEMS;
TRANSMISSION CONTROL PROTOCOL;
DATA FLOW ANALYSIS;
|
EID: 77951490166
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/1321631.1321692 Document Type: Conference Paper |
Times cited : (39)
|
References (8)
|