메뉴 건너뛰기




Volumn , Issue , 2005, Pages

Risky trust: Risk-based analysis of software systems

Author keywords

Distrust; Risk analysis; Trust

Indexed keywords

APPLICATION PROGRAMS; COMPUTER SOFTWARE; RISK ANALYSIS; RISK ASSESSMENT; RISK PERCEPTION; SECURITY SYSTEMS; SOFTWARE ENGINEERING;

EID: 84882662991     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (10)

References (20)
  • 7
    • 18944394652 scopus 로고    scopus 로고
    • Modeling and verification of layered security protocols: A bank application
    • Grunbauer, J., Hollmann, H., Jurjens, J. and Wimmel, G., Modeling and Verification of Layered Security Protocols: A Bank Application, SAFECOMP 2003, LNCS 2788, pp. 116-129, 2003.
    • (2003) SAFECOMP 2003, LNCS , vol.2788 , pp. 116-129
    • Grunbauer, J.1    Hollmann, H.2    Jurjens, J.3    Wimmel, G.4
  • 9
    • 35048837543 scopus 로고    scopus 로고
    • Picking battles: The impact of trust assumptions on the elaboration of security requirements
    • Haley, C., Laney, R., Moffett, J., and Nuseibeh, B., Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements, iTrust 2004, LNCS 2995, pp. 347-354, 2004.
    • (2004) ITrust 2004, LNCS , vol.2995 , pp. 347-354
    • Haley, C.1    Laney, R.2    Moffett, J.3    Nuseibeh, B.4
  • 11
    • 85027584208 scopus 로고    scopus 로고
    • Internet engineering task force
    • Internet Engineering Task Force, RFC 2828, www.ietf.org
    • RFC 2828
  • 13
    • 0038601459 scopus 로고    scopus 로고
    • The grand challenge of trusted components
    • May
    • Meyer, B., The Grand Challenge of Trusted Components, Proceeding of 25th ICSE, 2003, Pages. 660-667, May 2003.
    • (2003) Proceeding of 25th ICSE 2003 , pp. 660-667
    • Meyer, B.1
  • 14
    • 84957035924 scopus 로고    scopus 로고
    • Formal security analysis with interacting state machines
    • Oheimb, D. and Lotz, V., Formal Security Analysis with Interacting State Machines, ESORICS 2002, LNCS 2502, pp. 212-229, 2002.
    • (2002) ESORICS 2002, LNCS , vol.2502 , pp. 212-229
    • Oheimb, D.1    Lotz, V.2
  • 15
    • 33646357597 scopus 로고    scopus 로고
    • A vector model of trust for developing trustworthy systems
    • Ray, I. and Chakraborty, S., A Vector Model of Trust for Developing Trustworthy Systems, ESORIC 2004, LCNS 3139, pp. 260-275, 2004.
    • (2004) ESORIC 2004, LCNS , vol.3139 , pp. 260-275
    • Ray, I.1    Chakraborty, S.2
  • 19
    • 0002686025 scopus 로고    scopus 로고
    • Trust (and mistrust) in secure applications
    • Feb
    • Viega, J., Kohno, T. and Potter, B., Trust (and Mistrust) in Secure Applications, Communications of the ACM, Feb 2001, Vol. 44, No. 2.
    • (2001) Communications of the ACM , vol.44 , Issue.2
    • Viega, J.1    Kohno, T.2    Potter, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.