메뉴 건너뛰기




Volumn 413, Issue , 2008, Pages

Experiences threat modeling at Microsoft

Author keywords

[No Author keywords available]

Indexed keywords

ACADEMIC RESEARCH; DATA FLOW DIAGRAMS; ENUMERATION TECHNIQUES; MICROSOFT; PRODUCTS AND SERVICES; SECURITY ANALYSIS; SECURITY DEVELOPMENT LIFECYCLE; THREAT MODELING;

EID: 84885645251     PISSN: 16130073     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (33)

References (12)
  • 2
    • 84893108843 scopus 로고    scopus 로고
    • A framework for reasoning about the human in the loop
    • Pittsburgh, Pennsylvania, USA
    • Lorrie Faith Cranor, A Framework for Reasoning About the Human in the Loop, Symposium on Usable Privacy and Security, 2008. Pittsburgh, Pennsylvania, USA
    • (2008) Symposium on Usable Privacy and Security
    • Cranor, L.F.1
  • 3
    • 85049542436 scopus 로고    scopus 로고
    • Microsoft ThinkWeek paper, January 24 A version of this paper appears as Cryptography ePrint 2007/399, October 2007
    • Carl Ellison, Ceremony Analysis, Microsoft ThinkWeek paper, January 24, 2005. A version of this paper appears as Cryptography ePrint 2007/399, October 2007. http://eprint.iacr.org/2007/399
    • (2005) Ceremony Analysis
    • Ellison, C.1
  • 8
    • 84885649753 scopus 로고    scopus 로고
    • Microsoft Corporation, "SDL Process Introduction," 2008, http://msdn.microsoft.com/en-us/library/cc307406.aspx
    • (2008) SDL Process Introduction
  • 11
    • 84885604794 scopus 로고    scopus 로고
    • Reinvigorate your threat modeling process
    • July
    • Adam Shostack, Reinvigorate your Threat Modeling Process, MSDN Magazine, July 2008
    • (2008) MSDN Magazine
    • Shostack, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.