메뉴 건너뛰기




Volumn 6186 LNCS, Issue , 2010, Pages 112-129

Portunes: Representing attack scenarios spanning through the physical, digital and social domain

Author keywords

insider threat; physical security; security awareness; security model

Indexed keywords

ABSTRACTION LEVEL; ATTACK SCENARIOS; DIGITAL SECURITY; HIGH-LEVEL ABSTRACTION; INSIDER THREAT; PHYSICAL SECURITY; SECURITY AWARENESS; SECURITY DOMAINS; SECURITY GOALS; SECURITY MODEL; SECURITY POLICY; SOCIAL DOMAINS; SYSTEMATIC ANALYSIS;

EID: 78449295810     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-16074-5_9     Document Type: Conference Paper
Times cited : (32)

References (12)
  • 1
    • 70549084398 scopus 로고    scopus 로고
    • INFOSEC Research Council November
    • INFOSEC Research Council. Hard problem list (November 2005), http://www.cyber.st.dhs.gov/docs/IRC-Hard-Problem-List.pdf
    • (2005) Hard Problem List
  • 5
    • 84884385328 scopus 로고    scopus 로고
    • Containment: From context awareness to contextual effects awareness
    • Proceedings of 2nd Inernational Workshop on Software Aspects of Context
    • Dragovic, B., Crowcroft, J.: Containment: from context awareness to contextual effects awareness. In: Proceedings of 2nd Inernational Workshop on Software Aspects of Context. CEUR Workshop Proceedings (2005)
    • CEUR Workshop Proceedings (2005)
    • Dragovic, B.1    Crowcroft, J.2
  • 8
    • 35248866884 scopus 로고    scopus 로고
    • Resource access and mobility control with dynamic privileges acquisition
    • Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds.) ICALP 2003. Springer, Heidelberg
    • Gorla, D., Pugliese, R.: Resource access and mobility control with dynamic privileges acquisition. In: Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds.) ICALP 2003. LNCS, vol. 2719, pp. 119-132. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2719 , pp. 119-132
    • Gorla, D.1    Pugliese, R.2
  • 10
    • 38149049950 scopus 로고    scopus 로고
    • Where can an insider attack?
    • Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. Springer, Heidelberg
    • Probst, C.W., Hansen, R.R., Nielson, F.: Where can an insider attack? In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol. 4691, pp. 127-142. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4691 , pp. 127-142
    • Probst, C.W.1    Hansen, R.R.2    Nielson, F.3
  • 11
    • 84885588046 scopus 로고    scopus 로고
    • On the inability of existing security models to cope with data mobility in dynamic organizations
    • Proceedings of theWorkshop on Modeling Security
    • Dimkov, T., Tang, Q., Hartel, P.H.: On the inability of existing security models to cope with data mobility in dynamic organizations. In: Proceedings of theWorkshop on Modeling Security. CEUR Workshop Proceedings (2008)
    • CEUR Workshop Proceedings (2008)
    • Dimkov, T.1    Tang, Q.2    Hartel, P.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.