메뉴 건너뛰기




Volumn , Issue , 2011, Pages 142-149

Model-based systems security quantification

Author keywords

Activity Diagrams; Attack Pattern; Probabilistic verification; Risk Assessment; Security; SysML; Vulnerability detection

Indexed keywords

ACTIVITY DIAGRAM; ATTACK PATTERNS; PROBABILISTIC VERIFICATION; SECURITY; SYSML; VULNERABILITY DETECTION;

EID: 80052101817     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PST.2011.5971976     Document Type: Conference Paper
Times cited : (16)

References (39)
  • 1
    • 63749106886 scopus 로고    scopus 로고
    • A methodology for mapping SysML activity diagram to time petri net for requirement validation of embedded real-time systems with energy constraints
    • Washington, DC, USA: IEEE Computer Society
    • E. Andrade, P. Maciel, G. Callou, and B. Nogueira, "A Methodology for Mapping SysML Activity Diagram to Time Petri Net for Requirement Validation of Embedded Real-Time Systems with Energy Constraints, " in ICDS '09: Proc. of the 2009 Third Int. Conf on Dig. Soc. Washington, DC, USA: IEEE Computer Society, 2009, pp. 266-271.
    • (2009) ICDS '09: Proc. of the 2009 Third Int. Conf on Dig. Soc , pp. 266-271
    • Andrade, E.1    MacIel, P.2    Callou, G.3    Nogueira, B.4
  • 5
    • 67650273271 scopus 로고    scopus 로고
    • Mapping sysml state machine diagram to time petri net for analysis and verification of embedded real-time systems with energy constraints
    • Washington, DC, USA: IEEE Computer Society
    • E. Carneiro, P. Maciel, G. Callou, E. Tavares, and B. Nogueira, "Mapping SysML State Machine Diagram to Time Petri Net for Analysis and Verification of Embedded Real-Time Systems with Energy Constraints, " in ENICS '08: Proc. of the 2008 Int. Confon Adv. in Elec. and Micro-elec. Washington, DC, USA: IEEE Computer Society, 2008, pp. 1-6.
    • ENICS '08: Proc. of the 2008 Int. Confon Adv. in Elec. and Micro-elec , vol.2008 , pp. 1-6
    • Carneiro, E.1    MacIel, P.2    Callou, G.3    Tavares, E.4    Nogueira, B.5
  • 6
    • 51949085363 scopus 로고    scopus 로고
    • Measuring network security using bayesian network-based attack graphs
    • 32nd Annual IEEE International, August
    • M. Frigault and L. Wang, "Measuring Network Security Using Bayesian Network-Based Attack Graphs, " in Computer Software and Applications, 2008. COMPSAC '08. 32nd Annual IEEE International, August 2008, pp. 6 98- 703.
    • (2008) Computer Software and Applications 2008. COMPSAC '08 , pp. 698-703
    • Frigault, M.1    Wang, L.2
  • 7
    • 33846466500 scopus 로고    scopus 로고
    • On the design of more secure software-intensive systems by use of attack patterns
    • DOI 10.1016/j.infsof.2006.06.002, PII S0950584906000802
    • M. Gegick and L. Williams, "On The Design of More Secure SoftwareIntensive Systems by Use of Attack Patterns, " Irif. Softw. Techno!. , vol. 4 9, pp. 381-3 9 7, April 2007. (Pubitemid 46162190)
    • (2007) Information and Software Technology , vol.49 , Issue.4 , pp. 381-397
    • Gegick, M.1    Williams, L.2
  • 10
    • 50049117473 scopus 로고    scopus 로고
    • Quantitative risk-based security prediction for component-based systems with explicitly modeled attack profiles
    • August
    • L. Grunske and D. Joyce, "Quantitative Risk-Based Security Prediction for Component-Based Systems with Explicitly Modeled Attack Profiles, " J Syst. Softw. , vol. 81, pp. 1327-1345, August 2008.
    • (2008) J Syst. Softw. , vol.81 , pp. 1327-1345
    • Grunske, L.1    Joyce, D.2
  • 13
    • 77950516884 scopus 로고    scopus 로고
    • Eliciting security requirements and tracing them to design: An integration of common criteria, heuristics, and UMLsec
    • March
    • S. H. Houmb, S. Islam, E. Knauss, J. Jiirjens, and K. Schneider, "Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec, " Requir. Eng. , vol. 15, pp. 63-93, March 2010.
    • (2010) Requir. Eng. , vol.15 , pp. 63-93
    • Houmb, S.H.1    Islam, S.2    Knauss, E.3    Jiirjens, J.4    Schneider, K.5
  • 15
    • 84919356434 scopus 로고    scopus 로고
    • Information technology-Security techniques-Information security risk management
    • Information technology-Security techniques-Information security risk management, International Organization for Standardization (ISO), 2008.
    • (2008) International Organization for Standardization (ISO)
  • 19
    • 34250162897 scopus 로고    scopus 로고
    • Automatic verification and performance analysis of time-constrained SysML activity diagrams
    • DOI 10.1109/ECBS.2007.22, 4148969, Proceedings - 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, ECBS 2007: Raising Expectations of Computer-Based Systems
    • Y. Jarraya, A. Soeanu, M. Debbabi, and F. Hassaine, "Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams, " in ECBS '07: Proc. of the 14th An. IEEE Int. Conf and Work. on the Eng. of Comp.-Bas. Sys. Washington, DC, USA: IEEE Computer Society, 2007, pp. 515-522. (Pubitemid 46900708)
    • (2007) Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems , pp. 515-522
    • Jarraya, Y.1    Soeanu, A.2    Debbabi, M.3    Hassaine, F.4
  • 23
  • 26
    • 34547444679 scopus 로고    scopus 로고
    • Ph. D. dissertation, Carnegie Mellon University
    • P. K. Manadhata, "An Attack Surface Metric, " Ph. D. dissertation, Carnegie Mellon University, 2008.
    • (2008) An Attack Surface Metric
    • Manadhata, P.K.1
  • 27
    • 10044293457 scopus 로고    scopus 로고
    • Comparing passwords, tokens, and biometrics for user authentication
    • L. O. Gorman, "Comparing Passwords, Tokens, and Biometrics for User Authentication, " Proceedings of the IEEE, vol. 91, no. 12, pp. 2021- 2040, 2003.
    • (2003) Proceedings of the IEEE , vol.91 , Issue.12 , pp. 2021-2040
    • Gorman, L.O.1
  • 28
    • 80052083607 scopus 로고    scopus 로고
    • OMG, OMG Systems Modeling Language (OMG SysML) Specification, Object Management Group, September 2007, oMG Available Specification
    • OMG, OMG Systems Modeling Language (OMG SysML) Specification, Object Management Group, September 2007, oMG Available Specification.
  • 29
    • 80052099641 scopus 로고    scopus 로고
    • bachelor Thesis to obtain Engineering Degree from Sidi Bel Abess University
    • S. Ouchani, "Automatic Generation of Fuzzy Inference Systems, " 1 9 9 7, bachelor Thesis to obtain Engineering Degree from Sidi Bel Abess University.
    • (1997) Automatic Generation of Fuzzy Inference Systems
    • Ouchani, S.1
  • 31
  • 36
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • B. Schneier, "Attack Trees: Modeling Security Threats, " Dr. Dobb's Journal, 1999.
    • (1999) Dr. Dobb's Journal
    • Schneier, B.1
  • 38
    • 77950516699 scopus 로고    scopus 로고
    • A UML-based static verification framework for security
    • L. Siveroni, A. Zisman, and G. Spanoudakis, "A UML-Based Static Verification Framework for Security, " Requirements Engineering, vol. 15, pp. 95-118, 2010.
    • Requirements Engineering , vol.15 , Issue.2010 , pp. 95-118
    • Siveroni, L.1    Zisman, A.2    Spanoudakis, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.