-
1
-
-
84882694538
-
-
http://msgs.securepoint.com/bugtraq/.
-
-
-
-
3
-
-
0027804413
-
Information system security design methods: Implications for information systems development
-
Richard Baskerville. Information system security design methods: Implications for information systems development. ACM Computing Survey, 25(4):375-412, 1993.
-
(1993)
ACM Computing Survey
, vol.25
, Issue.4
, pp. 375-412
-
-
Baskerville, R.1
-
5
-
-
84882638774
-
Risk analysis helps establish a good security posture; risk management keeps it that way
-
B. Jenkins. Risk analysis helps establish a good security posture; risk management keeps it that way. whitepaper, pages 1-16, 1998.
-
(1998)
Whitepaper
, pp. 1-16
-
-
Jenkins, B.1
-
9
-
-
10944259927
-
Risk-based system security engineering: Stopping attacks with intention
-
S. Evans, D. Heinbuch, E. Kyle, J. Piorkowski, and J. Wallener. Risk-based system security engineering: Stopping attacks with intention. IEEE Security & Privacy, pages 59-62, 2004.
-
(2004)
IEEE Security & Privacy
, pp. 59-62
-
-
Evans, S.1
Heinbuch, D.2
Kyle, E.3
Piorkowski, J.4
Wallener, J.5
-
10
-
-
0010381933
-
-
Network Working Group, May. Request for Comments: 2828
-
Network Working Group. Internet security glossary, http://rfc.net/rfc2828.html, May 2000. Request for Comments: 2828.
-
(2000)
Internet security glossary
-
-
-
12
-
-
0007863633
-
A framework for an active interface to characterize compositional security contracts of software components
-
IEEE Computer Society Press
-
Khaled Khan, Jun Han, and Yuliang Zheng. A framework for an active interface to characterize compositional security contracts of software components. 2001 Australian Software Engineering Conference (dSWECO1)-IEEE Computer Society Press, pages 117-126.
-
2001 Australian Software Engineering Conference (dSWECO1)
, pp. 117-126
-
-
Khan, K.1
Han, J.2
Zheng, Y.3
-
15
-
-
0021491645
-
Fault tree vs event trees in reliability analysis
-
M. Elisabeth Pate-Cornell. Fault tree vs. event trees in reliability analysis. Risk Analysis, 4(3):177-186, 1984.
-
(1984)
Risk Analysis
, vol.4
, Issue.3
, pp. 177-186
-
-
Pate-Cornell, M.E.1
-
16
-
-
20844461569
-
Security meter:A pratical decision-tree model to quantify risk
-
May/June
-
Mehmet Sahinoglu. Security meter:a pratical decision-tree model to quantify risk. IEEE Security & Privacy, 3(3):18-24, May/June 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.3
, pp. 18-24
-
-
Sahinoglu, M.1
-
17
-
-
0002670359
-
Modelling security threats
-
dec
-
Bruce Schneier. Modelling security threats. Dr. Dobb's Journal, dec 1999.
-
(1999)
Dr. Dobb's Journal
-
-
Schneier, B.1
-
18
-
-
1142292428
-
Managing vulnerabilities of information system to security incindets
-
Gunter P. Sharp, Philip H. Enslow, Shamkant B. Navathe, and Fariborz Farhmand. Managing vulnerabilities of information system to security incindets. ACM International Conference: 5th international conference on Electronic commerce, pages 348-354, 2003.
-
(2003)
ACM International Conference: 5th international conference on Electronic commerce
, pp. 348-354
-
-
Sharp, G.P.1
Enslow, P.H.2
Navathe, S.B.3
Farhmand, F.4
-
20
-
-
84882688468
-
Risk-eye for IT security guy
-
Thomas Siu. Risk-eye for IT security guy. Gsec, pages 1-20, 2004.
-
(2004)
Gsec
, pp. 1-20
-
-
Siu, T.1
|