메뉴 건너뛰기




Volumn 23, Issue , 2006, Pages 65-77

Assessing the risk of using vulnerable components

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84882663975     PISSN: 15682633     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-36584-8_6     Document Type: Article
Times cited : (44)

References (20)
  • 1
    • 84882694538 scopus 로고    scopus 로고
    • http://msgs.securepoint.com/bugtraq/.
  • 3
    • 0027804413 scopus 로고
    • Information system security design methods: Implications for information systems development
    • Richard Baskerville. Information system security design methods: Implications for information systems development. ACM Computing Survey, 25(4):375-412, 1993.
    • (1993) ACM Computing Survey , vol.25 , Issue.4 , pp. 375-412
    • Baskerville, R.1
  • 5
    • 84882638774 scopus 로고    scopus 로고
    • Risk analysis helps establish a good security posture; risk management keeps it that way
    • B. Jenkins. Risk analysis helps establish a good security posture; risk management keeps it that way. whitepaper, pages 1-16, 1998.
    • (1998) Whitepaper , pp. 1-16
    • Jenkins, B.1
  • 10
    • 0010381933 scopus 로고    scopus 로고
    • Network Working Group, May. Request for Comments: 2828
    • Network Working Group. Internet security glossary, http://rfc.net/rfc2828.html, May 2000. Request for Comments: 2828.
    • (2000) Internet security glossary
  • 12
    • 0007863633 scopus 로고    scopus 로고
    • A framework for an active interface to characterize compositional security contracts of software components
    • IEEE Computer Society Press
    • Khaled Khan, Jun Han, and Yuliang Zheng. A framework for an active interface to characterize compositional security contracts of software components. 2001 Australian Software Engineering Conference (dSWECO1)-IEEE Computer Society Press, pages 117-126.
    • 2001 Australian Software Engineering Conference (dSWECO1) , pp. 117-126
    • Khan, K.1    Han, J.2    Zheng, Y.3
  • 15
    • 0021491645 scopus 로고
    • Fault tree vs event trees in reliability analysis
    • M. Elisabeth Pate-Cornell. Fault tree vs. event trees in reliability analysis. Risk Analysis, 4(3):177-186, 1984.
    • (1984) Risk Analysis , vol.4 , Issue.3 , pp. 177-186
    • Pate-Cornell, M.E.1
  • 16
    • 20844461569 scopus 로고    scopus 로고
    • Security meter:A pratical decision-tree model to quantify risk
    • May/June
    • Mehmet Sahinoglu. Security meter:a pratical decision-tree model to quantify risk. IEEE Security & Privacy, 3(3):18-24, May/June 2005.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.3 , pp. 18-24
    • Sahinoglu, M.1
  • 17
  • 20
    • 84882688468 scopus 로고    scopus 로고
    • Risk-eye for IT security guy
    • Thomas Siu. Risk-eye for IT security guy. Gsec, pages 1-20, 2004.
    • (2004) Gsec , pp. 1-20
    • Siu, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.