메뉴 건너뛰기




Volumn 2, Issue 1, 2011, Pages 75-92

Representing humans in system security models: An actor-network approach

Author keywords

Actor network theory; Containment; Hypergraphs; Security modelling; Socio technical systems; Vulnerability analysis

Indexed keywords


EID: 80052324806     PISSN: 20935374     EISSN: 20935382     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (48)

References (37)
  • 1
    • 77956341661 scopus 로고    scopus 로고
    • The emergence of intelligent enterprises: From CPS to CPSS
    • F.-Y. Wang, "The emergence of intelligent enterprises: From CPS to CPSS," IEEE Intelligent Systems, vol. 25, no. 4, pp. 85-88, 2010.
    • (2010) IEEE Intelligent Systems , vol.25 , Issue.4 , pp. 85-88
    • Wang, F.-Y.1
  • 3
  • 7
    • 48949088211 scopus 로고    scopus 로고
    • The Scyther Tool: Verification, falsification, and analysis of security protocols
    • Princeton, USA, LNCS, Springer-Verlag, July
    • C. Cremers, "The Scyther Tool: Verification, falsification, and analysis of security protocols," in Proc. of the 20th International Conference on Computer Aided Verification (CAV'08), Princeton, USA, LNCS, vol. 5123. Springer-Verlag, July 2008, pp. 414-418.
    • (2008) Proc. of the 20th International Conference On Computer Aided Verification (CAV'08) , vol.5123 , pp. 414-418
    • Cremers, C.1
  • 8
    • 84885582667 scopus 로고    scopus 로고
    • On the inability of existing security models to cope with data mobility in dynamic organizations
    • University of Twente, Tech. Rep, TR-CTIT-08-57
    • T. Dimkov, Q. Tang, and P. Hartel, "On the inability of existing security models to cope with data mobility in dynamic organizations," Centre for Telematics and Information Technology, University of Twente, Tech. Rep. TR-CTIT-08-57, 2008.
    • (2008) Centre For Telematics and Information Technology
    • Dimkov, T.1    Tang, Q.2    Hartel, P.3
  • 9
    • 84868569926 scopus 로고    scopus 로고
    • Centre for Telematics and Information Technology, University of Twente, Enschede, Technical Report TR-CTIT-10-34, October
    • P. Hartel, M. Junger, and R. Wieringa, "Cyber-crime science = crime science + information security," http://eprints.eemcs.utwente.nl/18500/, Centre for Telematics and Information Technology, University of Twente, Enschede, Technical Report TR-CTIT-10-34, October 2010.
    • (2010) Cyber-crime Science = Crime Science + Information Security
    • Hartel, P.1    Junger, M.2    Wieringa, R.3
  • 11
    • 84886942861 scopus 로고    scopus 로고
    • [Online]. Available
    • Jericho Forum, "Jericho whitepaper," 2005. [Online]. Available: http://www.opengroup.org/projects/jericho/uploads/40/6809/visionwp.pdf
    • (2005) Jericho Whitepaper
    • Forum, J.1
  • 13
    • 29144523383 scopus 로고    scopus 로고
    • Information exposure control through data manipulation for ubiquitous computing
    • Nova Scotia, Canada. ACM Press, September
    • B. Dragovic and J. Crowcroft, "Information exposure control through data manipulation for ubiquitous computing," in Proc. of the 2004 Workshop on New Security Paradigms (NSPW'04), Nova Scotia, Canada. ACM Press, September 2004, pp. 57-64.
    • (2004) Proc. of the 2004 Workshop On New Security Paradigms (NSPW'04) , pp. 57-64
    • Dragovic, B.1    Crowcroft, J.2
  • 15
    • 72949101002 scopus 로고    scopus 로고
    • Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients
    • Honolulu, Hawaii, USA. ACM Press, March
    • V. Nunes Leal Franqueira, R. Lopes, and P. van Eck, "Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients," in Proc. of the 24th Annual ACM Symposium on Applied Computing (SAC'09), Honolulu, Hawaii, USA. ACM Press, March 2009, pp. 66-73.
    • (2009) Proc. of the 24th Annual ACM Symposium On Applied Computing (SAC'09) , pp. 66-73
    • Nunes, L.F.V.1    Lopes, R.2    van Eck, P.3
  • 18
    • 56449120885 scopus 로고    scopus 로고
    • Security, cryptography and directed bigraphs
    • Leicester, UK, LNCS, ser. LNCS, Springer-Verlag, September
    • D. Grohmann, "Security, cryptography and directed bigraphs," in Proc. of the 4th International Conference on Graph Transformation (ICGT'08), Leicester, UK, LNCS, ser. LNCS, vol. 5214. Springer-Verlag, September 2008, pp. 487-489.
    • (2008) Proc. of the 4th International Conference On Graph Transformation (ICGT'08) , vol.5214 , pp. 487-489
    • Grohmann, D.1
  • 29
    • 0002802925 scopus 로고
    • A summary of a convenient vocabulary for the semiotics of human and nonhuman assemblies
    • W. Bijker and J. Law, Eds. Cambridge, MA: MIT Press
    • M. Akrich and B. Latour, "A summary of a convenient vocabulary for the semiotics of human and nonhuman assemblies," in Shaping Technology/Building Society: Studies in Sociotechnical Change, W. Bijker and J. Law, Eds. Cambridge, MA: MIT Press, 1992, pp. 259-264.
    • (1992) Shaping Technology/Building Society: Studies In Sociotechnical Change , pp. 259-264
    • Akrich, M.1    Latour, B.2
  • 30
    • 0002355487 scopus 로고    scopus 로고
    • Actor-network theory and IS research: Current status and future prospects
    • A. Lee, J. Liebenau, and J. DeGross, Eds. London: Chapman Hall
    • G. Walsham, "Actor-network theory and IS research: Current status and future prospects," in Information Systems and Qualitative Research, A. Lee, J. Liebenau, and J. DeGross, Eds. London: Chapman Hall, 1997, pp. 466-480.
    • (1997) Information Systems and Qualitative Research , pp. 466-480
    • Walsham, G.1
  • 32
    • 0011101139 scopus 로고    scopus 로고
    • Information ethics: On the philosophical foundation of computer ethics
    • L. Floridi, "Information ethics: on the philosophical foundation of computer ethics," Ethics and Information Technology, vol. 1, no. 1, pp. 37-56, 1999.
    • (1999) Ethics and Information Technology , vol.1 , Issue.1 , pp. 37-56
    • Floridi, L.1
  • 37
    • 84867876949 scopus 로고    scopus 로고
    • Centre for Telematics and Information Technology University of Twente, Enschede, Technical Report TR-CTIT-10-18, April
    • A. Ghamarian, M. de Mol, A. Rensink, E. Zambon, and M. Zimakova, "Modelling and analysis using GROOVE," http://eprints.eemcs.utwente.nl/17830/, Centre for Telematics and Information Technology University of Twente, Enschede, Technical Report TR-CTIT-10-18, April 2010.
    • (2010) Modelling and Analysis Using GROOVE
    • Ghamarian, A.1    de Mol, M.2    Rensink, A.3    Zambon, E.4    Zimakova, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.