메뉴 건너뛰기




Volumn 3, Issue , 2008, Pages 1057-1061

A markov game theory-based risk assessment model for network information system

Author keywords

Markov game theory; Risk assessment; Threat transmission

Indexed keywords

ASSESSMENT APPROACHES; ASSESSMENT MODELS; MARKOV GAMES; NETWORK INFORMATION SYSTEMS; SIMULATION EXAMPLE; SOFTWARE TOOL; SYSTEM ADMINISTRATORS; SYSTEM RISK; SYSTEM SECURITY; THREAT TRANSMISSION;

EID: 79951507952     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSSE.2008.949     Document Type: Conference Paper
Times cited : (43)

References (20)
  • 1
    • 79951499392 scopus 로고    scopus 로고
    • IEC 1025: 1990 Fault Tree Analysis (FTA), 1990
  • 2
    • 79951482829 scopus 로고    scopus 로고
    • Bouti, A. and Ait Kadi, D., "A State of the Art Review of FMEA/FMECA", International Journal of Reliability, Quality and Safety Engineering. January 1949: 515-543.
  • 3
    • 79951481363 scopus 로고    scopus 로고
    • Redmill F, Chudleigh M, Catmur J, "HAZOP and Software HAZOP", Wiley, 1999.
  • 4
    • 0016444204 scopus 로고    scopus 로고
    • B. Littlewood, "A reliability Model for Systems with Markov Structure", Applied Statistics, 1997, 24(2):172-177.
  • 5
    • 79951506915 scopus 로고    scopus 로고
    • CORAS IST-2000-25031 Web Site, http://www.nr.no/coras. 24 February 2003.
  • 6
    • 79951496260 scopus 로고    scopus 로고
    • Reactive System Design Support, "RSDS", http://www.kcl.ac.uk. 2002.
  • 7
    • 79951476203 scopus 로고    scopus 로고
    • Commission of the European Communities Security Investigations Projects: Project S2014, Risk Analysis, CRAMM Evaluation, 1993.
  • 8
    • 79951503497 scopus 로고    scopus 로고
    • Control Objectives for Information and Related Technology, http://www.isaca.org/COBIT, 2003.
  • 9
    • 34147194713 scopus 로고    scopus 로고
    • J ZHANG Yong-Zheng etc., "Research on Network Node Correlation in Network Risk Assessment", China Journal of Computers, February 2007: 234-240.
  • 10
    • 79951489269 scopus 로고    scopus 로고
    • The International Organization for Standardization, Common Criteria for Information Technology Security Evaluation, ISO/IEC15408: 1999(E), 1999.
  • 11
    • 79951468774 scopus 로고    scopus 로고
    • SSE-CMM Model Description Document, Version 2.0, 1999, http://www.sse-cmm.org.
  • 12
    • 79951471303 scopus 로고    scopus 로고
    • International Organization for Standardization, Code of Practice for Information Security Management, ISO/IEC 17799:2000, December 2000.
  • 13
    • 79951470810 scopus 로고    scopus 로고
    • BSI/DISC Committee BDD/2, BS7799 Code of Practice for Information Security Management, 1999.
  • 14
    • 79951494256 scopus 로고    scopus 로고
    • J International Organization for Standardization, ISO/IEC TR 13335, Guidelines for the Management of IT Security (GMITS), 1996-2001.
  • 15
    • 79951469175 scopus 로고    scopus 로고
    • J National Security Agency, information Assurance Technical Framework (IATF), Version 3.0, 2000, http://www.iatf.net.
  • 16
    • 79951487853 scopus 로고    scopus 로고
    • Information security technology, Risk assessment specification for information security, GB/Z 20984-2007.
  • 17
    • 38949203082 scopus 로고    scopus 로고
    • WU Bing etc., "Network-based malcode detection technology", Journal on Communications, November 2007: 87-91.
  • 18
    • 0033718255 scopus 로고    scopus 로고
    • Ritchey, R.W etc., "Using model checking to analyze network vulnerabilities", IEEE Conference on Security and Privacy, May 2000.
  • 19
    • 67651010222 scopus 로고    scopus 로고
    • Beaudoin, L etc., "Asset Valuation Technique for Network Management and Security", IEEE Conference on Data Mining Workshops, December 2006.
  • 20
    • 79951479453 scopus 로고    scopus 로고
    • Dan Shen etc., "Adaptive Markov Game Theoretic Data Fusion Approach for Cyber Network Defense", IEEE Conference on Military Communications, October 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.