메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Privacy-by-design based on quantitative threat modeling

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATED TOOLS; END-USERS; FUNCTIONAL SYSTEMS; MODELING TECHNIQUE; REAL-WORLD SCENARIO; SECURITY AND PRIVACY; THREAT MODELING;

EID: 84872081272     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CRISIS.2012.6378941     Document Type: Conference Paper
Times cited : (24)

References (25)
  • 1
    • 84872063014 scopus 로고    scopus 로고
    • European Commission, COM(2010) 245 final/2., EC, Tech. Rep.
    • European Commission, "A Digital Agenda for Europe," COM(2010) 245 final/2., EC, Tech. Rep., 2011.
    • (2011) A Digital Agenda for Europe
  • 4
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • Chaum D., "Security without identification: transaction systems to make big brother obsolete," CACM, vol. 28, no. 10, pp. 1030-1044, 1985.
    • (1985) CACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 9
    • 84861352176 scopus 로고    scopus 로고
    • European Commission, EC, Tech. Rep. COM(2012) 11 final
    • European Commission, "General Data Protection Regulation," EC, Tech. Rep. COM(2012) 11 final, 2012.
    • (2012) General Data Protection Regulation
  • 10
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees
    • [Online]. Available
    • Schneier B., "Attack trees," Dr Dobb's, vol. 24, no. 12, 1999. [Online]. Available: http://www.schneier.com/paper-attacktrees-ddj-ft.html
    • (1999) Dr Dobb's , vol.24 , Issue.12
    • Schneier, B.1
  • 11
    • 79952002261 scopus 로고    scopus 로고
    • A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
    • Deng M., et.al., "A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements," Requirements Engineering, vol. 16, pp. 3 - 32, 2011.
    • (2011) Requirements Engineering , vol.16 , pp. 3-32
    • Deng, M.1
  • 13
    • 84872083297 scopus 로고    scopus 로고
    • Department of Homeland Security, Online
    • Department of Homeland Security, "Attack Patterns," Online: https://buildsecurityin.us-cert.gov/, 2009.
    • (2009) Attack Patterns
  • 14
    • 33947368645 scopus 로고    scopus 로고
    • Model-based security analysis in seven steps - A guided tour to the CORAS method
    • Braber F., et.al., "Model-based security analysis in seven steps - a guided tour to the CORAS method," BT Technology Journal, vol. 25, no. 1, pp. 101 - 117, 2007.
    • (2007) BT Technology Journal , vol.25 , Issue.1 , pp. 101-117
    • Braber, F.1
  • 15
    • 84870424212 scopus 로고    scopus 로고
    • Architecture for Attribute-based Credential Technologies - Version 1
    • Tech. Rep.
    • Krontiris I. (ed.), "Architecture for Attribute-based Credential Technologies - Version 1," ABC4Trust Deliverable D2.1, Tech. Rep., 2011.
    • (2011) ABC4Trust Deliverable D2.1
    • Krontiris, I.1
  • 18
    • 80052184686 scopus 로고    scopus 로고
    • A Novel Attack Tree Based Risk Assessment Approach for Location Privacy Preservation in the VANETs
    • Dandan R., et.al., "A Novel Attack Tree Based Risk Assessment Approach for Location Privacy Preservation in the VANETs," in Proc. of the IEEE Intl. Conference on Communications, 2011, pp. 1-5.
    • Proc. of the IEEE Intl. Conference on Communications, 2011 , pp. 1-5
    • Dandan, R.1
  • 21
    • 17844381878 scopus 로고    scopus 로고
    • ISRAM: Information security risk analysis method
    • Karabacak B. and Sogukpinar I., "ISRAM: information security risk analysis method," Computers and Security, vol. 24, no. 2, pp. 147 - 159, 2005.
    • (2005) Computers and Security , vol.24 , Issue.2 , pp. 147-159
    • Karabacak, B.1    Sogukpinar, I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.