메뉴 건너뛰기




Volumn , Issue , 2011, Pages 698-703

Security evaluation of service-oriented systems with an extensible knowledge base

Author keywords

Security; Security evaluation, architecture centric software assessment, service oriented architectures

Indexed keywords

BUILDING BLOCKES; BUSINESS PROCESS; HARD PROBLEMS; KNOWLEDGE BASE; PROTOTYPE TOOLS; SECURITY; SECURITY EVALUATION; SECURITY RULES; SERVICE ORIENTED; SERVICE ORIENTED SYSTEMS; SERVICE-ORIENTED SOFTWARE ARCHITECTURES; STATIC SECURITY ANALYSIS; UNDERLYING PRINCIPLES;

EID: 80455140276     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2011.109     Document Type: Conference Paper
Times cited : (5)

References (17)
  • 2
    • 58449097917 scopus 로고    scopus 로고
    • Security goal indicator trees: A model of software features that supports efficient security inspection
    • Nanjing China Dec.
    • H. Peine, M. Jawurek, S. Mandel: Security Goal Indicator Trees: A Model of Software Features that Supports Efficient Security Inspection. High Assurance Systems Engineering Symposium (HASE'08), Nanjing, China, Dec. 2008
    • (2008) High Assurance Systems Engineering Symposium (HASE'08)
    • Peine, H.1    Jawurek, M.2    Mandel, S.3
  • 4
    • 80455136304 scopus 로고    scopus 로고
    • last accessed Feb. 2011
    • Apache Tuscany: http://tuscany.apache.org/ (last accessed Feb. 2011)
  • 5
    • 80455177420 scopus 로고    scopus 로고
    • last accessed Feb. 2011
    • Service Component Architecture (SCA), http://www.osoa.org/display/Main/ Service+Component+Architecture+Home (last accessed Feb. 2011)
  • 6
    • 80455177421 scopus 로고    scopus 로고
    • Microsoft: FxCop: (last accessed March 2011)
    • Microsoft: FxCop: http://msdn.microsoft.com/en-us/library/bb429476.aspx (last accessed March 2011)
  • 8
    • 85069976796 scopus 로고    scopus 로고
    • ITS4: A Static Vulnerability Scanner for C and C++ code
    • May
    • ITS4: A Static Vulnerability Scanner for C and C++ code. ACM Transactions on Information and System Security 5(2), May 2002
    • (2002) ACM Transactions on Information and System Security , vol.5 , Issue.2
  • 16
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees
    • Dec.
    • B. Schneier: Attack Trees. Dr Dobb's Journal, Vol..24, No.12, Dec. 1999
    • (1999) Dr Dobb's Journal , vol.24 , Issue.12
    • Schneier, B.1
  • 17
    • 77954619439 scopus 로고    scopus 로고
    • Unified modeling of attacks, vulnerabilities and security activities
    • rd International Conference on Software Engineering (ICSE10), Cape Town, South Africa, May
    • D. Byers, N. Shahmehri: Unified modeling of attacks, vulnerabilities and security activities. Position paper, 2010 ICSE Workshop on Software Engineering for Secure Systems (SESS'10), 23rd International Conference on Software Engineering (ICSE10), Cape Town, South Africa, May 2010
    • (2010) 2010 ICSE Workshop on Software Engineering for Secure Systems (SESS'10)
    • Byers, D.1    Shahmehri, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.