메뉴 건너뛰기




Volumn , Issue , 2013, Pages 121-130

Detecting insider threats: A trust-aware framework

Author keywords

Insider threats; Security requirements; Trust relationships

Indexed keywords

AUTOMATIC DETECTION; EARLY REQUIREMENT ANALYSIS; INSIDER THREAT; ORGANIZATIONAL SETTING; REQUIREMENT MODELING LANGUAGES; SECURITY PROPERTIES; SECURITY REQUIREMENTS; TRUST RELATIONSHIP;

EID: 84892384466     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2013.22     Document Type: Conference Paper
Times cited : (11)

References (21)
  • 1
    • 84867672691 scopus 로고    scopus 로고
    • Software Engineering Institute, Carnegie Mellon, Tech. Rep.
    • S. E. Institute, "2011 cybersecurity watch survey," Software Engineering Institute, Carnegie Mellon, Tech. Rep., 2011. [Online]. Available: http://www.cert.org/archive/pdf/CyberSecuritySurvey2011Data.pdf
    • (2011) 2011 Cybersecurity Watch Survey
    • Institute, S.E.1
  • 3
    • 73849097284 scopus 로고    scopus 로고
    • Security requirements engineering : the si*modeling language and the secure tropos methodology
    • Z. Ras and L.-S. Tsay, Eds. Springer Berlin / Heidelberg
    • F. Massacci, J. Mylopoulos, and N. Zannone, "Security Requirements Engineering : The SI*Modeling Language and the Secure Tropos Methodology," in Advances in Intelligent Information Systems, ser. Studies in Computational Intelligence, Z. Ras and L.-S. Tsay, Eds. Springer Berlin / Heidelberg, 2010, vol. 265, pp. 147-174.
    • (2010) Advances in Intelligent Information Systems, Ser. Studies in Computational Intelligence , vol.265 , pp. 147-174
    • Massacci, F.1    Mylopoulos, J.2    Zannone, N.3
  • 6
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • March
    • A. Jøsang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Systems, vol. 43, no. 2, pp. 618-644, March 2007.
    • (2007) Decision Support Systems , vol.43 , Issue.2 , pp. 618-644
    • Jøsang, A.1    Ismail, R.2    Boyd, C.3
  • 7
    • 52149094285 scopus 로고    scopus 로고
    • A model for trust metrics analysis
    • I. Agudo, M. C. F. Gago, and J. Lopez, "A model for trust metrics analysis," in TrustBus, 2008, pp. 28-37.
    • (2008) TrustBus , pp. 28-37
    • Agudo, I.1    Gago, M.C.F.2    Lopez, J.3
  • 9
    • 84882784197 scopus 로고    scopus 로고
    • Towards an access-control framework for countering insider threats
    • C.W. Probst, J. Hunker, D. Gollmann, and M. Bishop, Eds. Springer US
    • J. Crampton and M. Huth, "Towards an access-control framework for countering insider threats," in Insider Threats in Cyber Security, ser. Advances in Information Security, C.W. Probst, J. Hunker, D. Gollmann, and M. Bishop, Eds. Springer US, 2010, vol. 49, pp. 173-195.
    • (2010) Insider Threats in Cyber Security, Ser. Advances in Information Security , vol.49 , pp. 173-195
    • Crampton, J.1    Huth, M.2
  • 10
    • 0034291619 scopus 로고    scopus 로고
    • Handling obstacles in goal-oriented requirements engineering
    • A. Van Lamsweerde and E. Letier, "Handling obstacles in goal-oriented requirements engineering," IEEE Transactions on Software Engineering, vol. 26, no. 10, pp. 978-1005, 2000.
    • (2000) IEEE Transactions on Software Engineering , vol.26 , Issue.10 , pp. 978-1005
    • Van Lamsweerde, A.1    Letier, E.2
  • 12
    • 84942866002 scopus 로고    scopus 로고
    • Security and privacy requirements analysis within a social setting
    • L. Liu, E. Yu, and J. Mylopoulos, "Security and privacy requirements analysis within a social setting," Proc.of RE, vol. 3, pp. 151-161, 2003.
    • (2003) Proc.Of RE , vol.3 , pp. 151-161
    • Liu, L.1    Yu, E.2    Mylopoulos, J.3
  • 15
    • 77950520810 scopus 로고    scopus 로고
    • A vulnerability-centric requirements engineering framework: Analyzing security attacks, countermeasures, and requirements based on vulnerabilities
    • Nov
    • G. Elahi, E. Yu, and N. Zannone, "A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities," Requirements Engineering, vol. 15, no. 1, pp. 41-62, Nov. 2009.
    • (2009) Requirements Engineering , vol.15 , Issue.1 , pp. 41-62
    • Elahi, G.1    Yu, E.2    Zannone, N.3
  • 16
  • 18
    • 33751189883 scopus 로고    scopus 로고
    • Security quality requirements engineering (square) methodology
    • May
    • N. R. Mead and T. Stehney, "Security quality requirements engineering (square) methodology," SIGSOFT Softw. Eng. Notes, vol. 30, no. 4, pp. 1-7, May 2005.
    • (2005) SIGSOFT Softw. Eng. Notes , vol.30 , Issue.4 , pp. 1-7
    • Mead, N.R.1    Stehney, T.2
  • 20
    • 79955934437 scopus 로고    scopus 로고
    • Goal-driven risk assessment in requirements engineering
    • Y. Asnar, P. Giorgini, and J. Mylopoulos, "Goal-driven risk assessment in requirements engineering," Requirements Engineering, vol. 16, no. 2, pp. 101-116, 2011.
    • (2011) Requirements Engineering , vol.16 , Issue.2 , pp. 101-116
    • Asnar, Y.1    Giorgini, P.2    Mylopoulos, J.3
  • 21
    • 30544438141 scopus 로고    scopus 로고
    • Beyond proof-ofcompliance: Security analysis in trust management
    • May.
    • N. Li, J. C. Mitchell, and W. H. Winsborough, "Beyond proof-ofcompliance: security analysis in trust management," J. ACM, vol. 52, no. 3, pp. 474-514, May 2005.
    • (2005) J. ACM , vol.52 , Issue.3 , pp. 474-514
    • Li, N.1    Mitchell, J.C.2    Winsborough, W.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.