메뉴 건너뛰기




Volumn 29, Issue 6, 2010, Pages 659-679

A probabilistic relational model for security risk analysis

Author keywords

Architecture analysis; Architecture metamodel; Probabilistic relational model; Risk assessment; Security risk

Indexed keywords

ARCHITECTURE ANALYSIS; ARCHITECTURE META-MODEL; PROBABILISTIC RELATIONAL MODEL; PROBABILISTIC RELATIONAL MODELS; SECURITY RISKS;

EID: 77955417822     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2010.02.002     Document Type: Article
Times cited : (82)

References (54)
  • 14
  • 18
    • 2342646110 scopus 로고    scopus 로고
    • The effect of intrusion detection management methods on the return on investment
    • C. Iheagwara The effect of intrusion detection management methods on the return on investment Computers and Security 23 2004 213 228
    • (2004) Computers and Security , vol.23 , pp. 213-228
    • Iheagwara, C.1
  • 26
    • 17844381878 scopus 로고    scopus 로고
    • ISRAM: Information security risk analysis method
    • B. Karabacak, and I. Sogukpinar ISRAM: information security risk analysis method Computers and Security 24 2005 147 159
    • (2005) Computers and Security , vol.24 , pp. 147-159
    • Karabacak, B.1    Sogukpinar, I.2
  • 27
    • 27544491841 scopus 로고    scopus 로고
    • Network vulnerability assessment using Bayesian networks
    • Orlando, Florida, USA
    • Liu Y, Hong M. Network vulnerability assessment using Bayesian networks. In: Proceedings of SPIE. Orlando, Florida, USA; 2005. p. 61-71.
    • (2005) Proceedings of SPIE , pp. 61-71
    • Liu, Y.1    Hong, M.2
  • 32
    • 77955423252 scopus 로고    scopus 로고
    • Object Management Group (OMG). OMG systems modeling language (OMG SysML)
    • Object Management Group (OMG). OMG systems modeling language (OMG SysML); 2008.
    • (2008)
  • 36
    • 33751072193 scopus 로고    scopus 로고
    • Risk analysis and assessment
    • 4th ed Auerbach Boca Raton, USA
    • W. Ozier Risk analysis and assessment Information security management handbook 4th ed 1999 Auerbach Boca Raton, USA 247 285
    • (1999) Information Security Management Handbook , pp. 247-285
    • Ozier, W.1
  • 40
    • 33751084118 scopus 로고    scopus 로고
    • Expected benefits of information security investments
    • J.J.C.H. Ryan, and D.J. Ryan Expected benefits of information security investments Computers and Security 25 2006 579 588
    • (2006) Computers and Security , vol.25 , pp. 579-588
    • Ryan, J.J.C.H.1    Ryan, D.J.2
  • 42
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • B. Schneier Attack trees: modeling security threats Dr. Dobb's Journal December, 1999
    • (1999) Dr. Dobb's Journal
    • Schneier, B.1
  • 43
    • 0032299248 scopus 로고    scopus 로고
    • Time-based security explained: Provable security models and formulas for the practitioner and vendor
    • W. Schwartau Time-based security explained: provable security models and formulas for the practitioner and vendor Computers and Security 17 1998 693 714
    • (1998) Computers and Security , vol.17 , pp. 693-714
    • Schwartau, W.1
  • 44
    • 0022818911 scopus 로고
    • Evaluating influence diagrams
    • R. Shachter Evaluating influence diagrams Operations Research 34 1986 871 882
    • (1986) Operations Research , vol.34 , pp. 871-882
    • Shachter, R.1
  • 45
    • 35048885033 scopus 로고    scopus 로고
    • Tools for generating and analyzing attack graphs
    • Springer Berlin/Heidelberg
    • O. Sheyner, and J. Wing Tools for generating and analyzing attack graphs Formal methods for components and objects 2004 Springer Berlin/Heidelberg 344 371
    • (2004) Formal Methods for Components and Objects , pp. 344-371
    • Sheyner, O.1    Wing, J.2
  • 47
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • G. Sindre, and A.L. Opdahl Eliciting security requirements with misuse cases Requirements Engineering 10 2005 34 44
    • (2005) Requirements Engineering , vol.10 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 53
    • 17844396492 scopus 로고    scopus 로고
    • The economic approach of information security
    • T. Tsiakis, and G. Stephanides The economic approach of information security Computers and Security 24 2005 105 108
    • (2005) Computers and Security , vol.24 , pp. 105-108
    • Tsiakis, T.1    Stephanides, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.