메뉴 건너뛰기




Volumn , Issue , 2010, Pages 521-527

Automated threat identification for UML

Author keywords

Expert systems; Secure software development; Software threat identification; Software threat modeling; UML

Indexed keywords

AUTOMATED APPROACH; BUILDING SOFTWARES; MANUAL METHODS; SECURE SOFTWARE DEVELOPMENT; THREAT IDENTIFICATION; THREAT MODELING; UML; UML DIAGRAMS; UML MODEL;

EID: 78651432023     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (19)
  • 5
    • 39449110065 scopus 로고    scopus 로고
    • Threat modeling: Diving into the deep end
    • January-February
    • Ingalsbe, J.A., Kunimatsu, L., Baeten, T., & Mead, N.R. (2008). Threat Modeling: Diving into the Deep End. IEEE Computer Software, Volume 25, Issue 1, pp. 28-34, January-February.
    • (2008) IEEE Computer Software , vol.25 , Issue.1 , pp. 28-34
    • Ingalsbe, J.A.1    Kunimatsu, L.2    Baeten, T.3    Mead, N.R.4
  • 6
    • 78651461931 scopus 로고    scopus 로고
    • (n.d.-A) Available as of July 31, 2009
    • Microsoft (n.d.-A). Microsoft's Threat Modeling Tool. Available as of July 31, 2009 at: http://www.microsoft.com/downloads/details.aspx7FamilyID= 62830f95-0e61-4f87-88a6-e7c663444acl& displaylang=en.
    • Microsoft's Threat Modeling Tool.
  • 7
    • 78651464439 scopus 로고    scopus 로고
    • n.d.-B Available as of July 31, 2009 at
    • Microsoft (n.d.-B). Microsoft Threat Analysis and Modeling v2.1.2. Available as of July 31, 2009 at: http://www.microsoft.com/downloads/details. aspx7FamilyId=59888078-9DAF-4E96-B7D1-944703479451&displaylang=en
    • Microsoft Threat Analysis and Modeling V2.1.2
  • 8
    • 78651460183 scopus 로고    scopus 로고
    • (n.d.) Available as of July 31, 2009 at
    • No Magic (n.d.). MagicDraw UML 16.0. Available as of July 31, 2009 at: http://www.nomagic.com/
    • MagicDraw UML 16.0
  • 9
    • 78651444078 scopus 로고    scopus 로고
    • Object Management Group (n.d.-A). UML. Available as of July 31, 2009 at
    • Object Management Group (n.d.-A). UML. Available as of July 31, 2009 at: http://www.omg.org/
  • 10
    • 78651424325 scopus 로고    scopus 로고
    • Object Management Group (n.d.-B). XMI. Available as of July 31, 2009 at
    • Object Management Group (n.d.-B). XMI. Available as of July 31, 2009 at: http://www.omg.org/technology/xml/index.htm.
  • 11
    • 84956994446 scopus 로고    scopus 로고
    • Checking general safety criteria on UML statecharts
    • Springer-Verlag
    • Pap, Z., Majzik, I., & Pataricza, A. (2001). Checking General Safety Criteria on UML Statecharts. In Lecture Notes in Computer Science, Vol. 2187, pp. 46-55, Springer-Verlag.
    • (2001) Lecture Notes in Computer Science , vol.2187 , pp. 46-55
    • Pap, Z.1    Majzik, I.2    Pataricza, A.3
  • 12
    • 84907303035 scopus 로고    scopus 로고
    • (n.d.) Available as of July 31, 2009 at
    • PTA Technologies (n.d.). Practical Threat Analysis. Available as of July 31, 2009 at: http://www.ptatechnologies.com/
    • Practical Threat Analysis
  • 16
    • 84886774759 scopus 로고    scopus 로고
    • (n.d.) Available as of July 31, 2009 at
    • SWI-Prolog (n.d.). SWI-Prolog. Available as of July 31, 2009 at: http://www.swi-prolog.org/
    • SWI-Prolog
  • 18
    • 52249097319 scopus 로고    scopus 로고
    • NRC Institute for Information Technology, National Research Council Canada, NRCC# 48478, NPArC# 8914119, March. Available as of July 29, 2009 at
    • Yee, G. (2006). Recent research in secure software. NRC Institute for Information Technology, National Research Council Canada, NRCC# 48478, NPArC# 8914119, March. Available as of July 29, 2009 at: http://nparc.cisti-icist. nrccnrc.gc.ca/npsi/ctrl?action=shwart&index=an&req=8914119&lang=en
    • (2006) Recent Research in Secure Software
    • Yee, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.