메뉴 건너뛰기




Volumn 7465 LNCS, Issue , 2012, Pages 562-577

Tool-supported risk modeling and analysis of evolving critical infrastructures

Author keywords

ATM; critical infrastructures; interdependencies; Risk analysis

Indexed keywords

AIR TRAFFIC MANAGEMENT; COORDINATED ACTIVITY; EXPLICIT MODELING; INTERDEPENDENCIES; INTERDEPENDENT SYSTEMS; MODELING AND ANALYSIS; RISK ANALYSIS METHODS; RISK ANALYSIS TOOLS; RISK MODEL; RISK MODELING; SYSTEM CHANGE; TOOL SUPPORT;

EID: 84865657363     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32498-7_43     Document Type: Conference Paper
Times cited : (4)

References (17)
  • 1
    • 9944262089 scopus 로고    scopus 로고
    • version 2.0. Technical report CMU/SEI-2001-TR-016, Carnegie Mellon University
    • Alberts, C.J., Davey, J.: OCTAVE criteria version 2.0. Technical report CMU/SEI-2001-TR-016, Carnegie Mellon University (2004)
    • (2004) OCTAVE Criteria
    • Alberts, C.J.1    Davey, J.2
  • 2
    • 0001094070 scopus 로고
    • The use of the CCTA risk analysis and management methodology CRAMM in health information systems
    • North-Holland
    • Barber, B., Davey, J.: The use of the CCTA risk analysis and management methodology CRAMM in health information systems. In: 7th International Congress on Medical Informatics (MEDINFO 1992), pp. 1589-1593. North-Holland (1992)
    • (1992) 7th International Congress on Medical Informatics (MEDINFO 1992) , pp. 1589-1593
    • Barber, B.1    Davey, J.2
  • 3
    • 77956063392 scopus 로고    scopus 로고
    • Modular analysis and modelling of risk scenarios with dependencies
    • Brændeland, G., Refsdal, A., Stølen, K.: Modular analysis and modelling of risk scenarios with dependencies. Journal of Systems and Software 83(10), 1995-2013 (2010)
    • (2010) Journal of Systems and Software , vol.83 , Issue.10 , pp. 1995-2013
    • Brændeland, G.1    Refsdal, A.2    Stølen, K.3
  • 4
    • 84865619448 scopus 로고    scopus 로고
    • MoVEing forward: Towards an architecture and processes for a Living Models infrastructure
    • Breu, M., Breu, R., Löw, S.: MoVEing forward: Towards an architecture and processes for a Living Models infrastructure. International Journal On Advances in Life Sciences 3(1-2), 12-22 (2011)
    • (2011) International Journal on Advances in Life Sciences , vol.3 , Issue.1-2 , pp. 12-22
    • Breu, M.1    Breu, R.2    Löw, S.3
  • 9
    • 84946150482 scopus 로고    scopus 로고
    • Using indicators to monitor security risk in systems of systems: How to capture and measure the impact of service dependencies on the security of provided services
    • IGI Global to appear
    • Ligaarden, O.S., Refsdal, A., Stølen, K.: Using indicators to monitor security risk in systems of systems: How to capture and measure the impact of service dependencies on the security of provided services. In: IT Security Governance Innovations: Theory and Research. IGI Global (to appear, 2012)
    • (2012) IT Security Governance Innovations: Theory and Research
    • Ligaarden, O.S.1    Refsdal, A.2    Stølen, K.3
  • 10
    • 77953097363 scopus 로고    scopus 로고
    • Evolution in relation to risk and trust management
    • Lund, M.S., Solhaug, B., Stølen, K.: Evolution in relation to risk and trust management. Computer 43(5), 49-55 (2010)
    • (2010) Computer , vol.43 , Issue.5 , pp. 49-55
    • Lund, M.S.1    Solhaug, B.2    Stølen, K.3
  • 12
    • 80054085878 scopus 로고    scopus 로고
    • Risk Analysis of Changing and Evolving Systems Using CORAS
    • Aldini, A., Gorrieri, R. (eds.) FOSAD VI. Springer, Heidelberg
    • Lund, M.S., Solhaug, B., Stølen, K.: Risk Analysis of Changing and Evolving Systems Using CORAS. In: Aldini, A., Gorrieri, R. (eds.) FOSAD VI. LNCS, vol. 6858, pp. 231-274. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6858 , pp. 231-274
    • Lund, M.S.1    Solhaug, B.2    Stølen, K.3
  • 13
    • 73849097284 scopus 로고    scopus 로고
    • Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology
    • Ras, Z.W., Tsay, L.-S. (eds.) Springer, Heidelberg
    • Massacci, F., Mylopoulos, J., Zannone, N.: Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology. In: Ras, Z.W., Tsay, L.-S. (eds.) Advances in Intelligent Information Systems. SCI, vol. 265, pp. 147-174. Springer, Heidelberg (2010)
    • (2010) Advances in Intelligent Information Systems. SCI , vol.265 , pp. 147-174
    • Massacci, F.1    Mylopoulos, J.2    Zannone, N.3
  • 14
    • 77649321736 scopus 로고    scopus 로고
    • Microsoft Solutions for Security and Compliance and Microsoft Security Center of Excellence
    • Microsoft Solutions for Security and Compliance and Microsoft Security Center of Excellence: The Security Risk Management Guide (2006)
    • (2006) The Security Risk Management Guide
  • 15
    • 50949102921 scopus 로고    scopus 로고
    • Object Management Group: Version 2.2, OMG Document: formal/2009-02-02
    • Object Management Group: OMG Unified Modeling Language (OMG UML), Superstructure. Version 2.2, OMG Document: formal/2009-02-02 (2009)
    • (2009) OMG Unified Modeling Language (OMG UML), Superstructure


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.