메뉴 건너뛰기




Volumn 6542 LNCS, Issue , 2011, Pages 128-141

Lightweight modeling and analysis of security concepts

Author keywords

DSML; Information Security Management; Risk Assessment; Security Engineering

Indexed keywords

DSML; INFORMATION SECURITY MANAGEMENT; INFORMATION SECURITY MANAGEMENTS; MODELING AND ANALYSIS; MODELING RESULTS; OPEN FRAMEWORKS; SECURITY ENGINEERING; MODEL AND ANALYSIS; MODEL RESULTS; ORGANIZATIONAL PERSPECTIVES;

EID: 79551516193     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19125-1_10     Document Type: Conference Paper
Times cited : (5)

References (31)
  • 7
    • 33947368645 scopus 로고    scopus 로고
    • Model-based security analysis in seven steps - A guided tour to the CORAS method
    • DOI 10.1007/s10550-007-0013-9
    • den Braber, F., Hogganvik, I., Lund, M., Stølen, K., Vraalsen, F.: Model-based security analysis in seven steps - a guided tour to the CORAS method. BT Technology Journal 25(1), 101-117 (2007) (Pubitemid 46455705)
    • (2007) BT Technology Journal , vol.25 , Issue.1 , pp. 101-117
    • Den, B.F.1    Hogganvik, I.2    Lund, M.S.3    Stolen, K.4    Vraalsen, F.5
  • 8
    • 77956247296 scopus 로고    scopus 로고
    • Bundesamt für Sicherheit in der Informationstechnik: BSI-Standard 100-2: IT-Grundschutz methodology (2008), https://www.bsi.bund.de/cae/servlet/ contentblob/471430/publicationFile/27993/standard-100-2-e-pdf.pdf
    • (2008) BSI-Standard 100-2: IT-Grundschutz Methodology
  • 10
    • 26444465547 scopus 로고    scopus 로고
    • Agile security using an incremental security architecture
    • Baumeister, H., Marchesi, M., Holcombe, M. (eds.) XP 2005. Springer, Heidelberg
    • Chivers, H., Paige, R., Ge, X.: Agile security using an incremental security architecture. In: Baumeister, H., Marchesi, M., Holcombe, M. (eds.) XP 2005. LNCS, vol. 3556, pp. 57-65. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3556 , pp. 57-65
    • Chivers, H.1    Paige, R.2    Ge, X.3
  • 16
    • 79551568227 scopus 로고    scopus 로고
    • Gesellschaft für Telematikanwendungen der Gesundheitskarte mbH
    • Gesellschaft für Telematikanwendungen der Gesundheitskarte mbH: Übergreifendes Sicherheitskonzept der Telematikinfrastruktur (2008), http://www.gematik.de/upload/gematik-DS-Sicherheitskonzept-V2.4.0-4493.zip
    • (2008) Übergreifendes Sicherheitskonzept der Telematikinfrastruktur
  • 17
    • 77950516884 scopus 로고    scopus 로고
    • Eliciting security requirements and tracing them to design: An integration of Common Criteria, heuristics, and UMLsec
    • Houmb, S., Islam, S., Knauss, E., Jürjens, J., Schneider, K.: Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec. Requirements Engineering 15(1), 63-93 (2009)
    • (2009) Requirements Engineering , vol.15 , Issue.1 , pp. 63-93
    • Houmb, S.1    Islam, S.2    Knauss, E.3    Jürjens, J.4    Schneider, K.5
  • 22
    • 33747610426 scopus 로고    scopus 로고
    • Innovative characteristics of small manufacturing firms
    • DOI 10.1108/14626000610680253
    • Laforet, S., Tann, J.: Innovative characteristics of small manufacturing firms. Journal of Small Business and Enterprise Development 13(3), 363-380 (2006) (Pubitemid 44263410)
    • (2006) Journal of Small Business and Enterprise Development , vol.13 , Issue.3 , pp. 363-380
    • Laforet, S.1    Tann, J.2
  • 24
    • 79551516333 scopus 로고    scopus 로고
    • Ministerie van Binnenlandse Zaken en Koninkrijksrelaties
    • Ministerie van Binnenlandse Zaken en Koninkrijksrelaties: Afhankelijkheids- en kwetsbaarheidsanalyse (1996)
    • (1996) Afhankelijkheids- en Kwetsbaarheidsanalyse
  • 27
    • 38049100950 scopus 로고    scopus 로고
    • Towards CIM to PIM transformation: From secure business processes defined in BPMN to use-cases
    • Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. Springer, Heidelberg
    • Rodríguez, A., Fernández-Medina, E., Piattini, M.: Towards CIM to PIM transformation: From secure business processes defined in BPMN to use-cases. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 408-415. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4714 , pp. 408-415
    • Rodríguez, A.1    Fernández-Medina, E.2    Piattini, M.3
  • 28
    • 0003669844 scopus 로고    scopus 로고
    • Standards Australia/Standards New Zealand: AS/NZS 4360:2004
    • Standards Australia/Standards New Zealand: AS/NZS 4360:2004: Risk management (2004)
    • (2004) Risk Management
  • 31
    • 80053188165 scopus 로고    scopus 로고
    • Model-based qualitative risk assessment for availability of IT infrastructures
    • Zambon, E., Etalle, S., Wieringa, R., Hartel, P.: Model-based qualitative risk assessment for availability of IT infrastructures. In: Software and Systems Modeling, pp. 1-28 (2010)
    • (2010) Software and Systems Modeling , pp. 1-28
    • Zambon, E.1    Etalle, S.2    Wieringa, R.3    Hartel, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.