메뉴 건너뛰기




Volumn , Issue , 2013, Pages 111-120

A problem-based threat analysis in compliance with common criteria

Author keywords

Common Criteria; Document Generation; Model driven Engineering; Problem Frames; Security Requirements Engineering; Security Standards

Indexed keywords

COMMON CRITERIA; DOCUMENT GENERATION; MODEL-DRIVEN ENGINEERING; PROBLEM FRAMES; SECURITY REQUIREMENTS ENGINEERING; SECURITY STANDARDS;

EID: 84892423647     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2013.21     Document Type: Conference Paper
Times cited : (14)

References (25)
  • 3
    • 73849097284 scopus 로고    scopus 로고
    • Security requirements engineering: The simodeling language and the secure tropos methodology
    • ser. SCI, Z. Ras and L.-S. Tsay, Eds. Springer
    • F. Massacci, J. Mylopoulos, and N. Zannone, "Security Requirements Engineering: The SIModeling Language and the Secure Tropos Methodology," in AIIS, ser. SCI, Z. Ras and L.-S. Tsay, Eds. Springer, 2010, vol. 265, pp. 147-174.
    • (2010) AIIS , vol.265 , pp. 147-174
    • Massacci, F.1    Mylopoulos, J.2    Zannone, N.3
  • 8
    • 84877941639 scopus 로고    scopus 로고
    • UML Revision Task Force February
    • UML Revision Task Force, "OMG Object Constraint Language: Reference," February 2010. [Online]. Available: http://www.omg.org/ docs/formal/10-02-02.pdf
    • (2010) OMG Object Constraint Language: Reference
  • 14
    • 84892382482 scopus 로고    scopus 로고
    • Protection Profile for the Gateway of a Smart Metering System (Gateway PP)
    • Version 01.01.01(final draft)
    • BSI, "Protection Profile for the Gateway of a Smart Metering System (Gateway PP)," Bundesamt fur Sicherheit in der Informationstechnik (BSI)-Federal Office for Information Security Germany, Version 01.01.01(final draft), 2011, https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/SmartMeter/ PP-SmartMeter.pdf? blob=publicationFile.
    • (2011) Bundesamt fur Sicherheit in der Informationstechnik (BSI)-Federal Office for Information Security Germany
  • 15
    • 33750950652 scopus 로고    scopus 로고
    • A comparison of the common criteria with proposals of information systems security requirements
    • D. Mellado, E. Fernandez-Medina, and M. Piattini, "A comparison of the common criteria with proposals of information systems security requirements," in Proceedings of ARES, 2006, p. 8 pp.
    • (2006) Proceedings of ARES , pp. 8
    • Mellado, D.1    Fernandez-Medina, E.2    Piattini, M.3
  • 16
    • 33750273034 scopus 로고    scopus 로고
    • Applying a security requirements engineering process
    • D. Gollmann, J. Meier, and A. Sabelfeld, Eds. Springer Berlin / Heidelberg
    • D. Mellado, E. Fernandez-Medina, and M. Piattini, "Applying a security requirements engineering process," in ESORICS 2006, ser. LNCS 4189, D. Gollmann, J. Meier, and A. Sabelfeld, Eds. Springer Berlin / Heidelberg, 2006, pp. 192-206.
    • (2006) ESORICS 2006, Ser. LNCS 4189 , pp. 192-206
    • Mellado, D.1    Fernandez-Medina, E.2    Piattini, M.3
  • 21
  • 22
    • 45849131284 scopus 로고    scopus 로고
    • Design of a modelling language for information system security risk management
    • N. Mayer, P. Heymans, and R. Matulevicius, "Design of a modelling language for information system security risk management," in RCIS, 2007, pp. 121-132.
    • (2007) RCIS , pp. 121-132
    • Mayer, N.1    Heymans, P.2    Matulevicius, R.3
  • 23
    • 63349110076 scopus 로고    scopus 로고
    • Aurum: A framework for information security risk management
    • A. Ekelhart, S. Fenz, and T. Neubauer, "Aurum: A framework for information security risk management," in HICSS, 2009, pp. 1-10.
    • (2009) HICSS , pp. 1-10
    • Ekelhart, A.1    Fenz, S.2    Neubauer, T.3
  • 24
    • 80051515778 scopus 로고    scopus 로고
    • Developer-driven threat modeling: Lessons learned in the trenches
    • Jul
    • D. Dhillon, "Developer-driven threat modeling: Lessons learned in the trenches," IEEE Security and Privacy, vol. 9, no. 4, pp. 41-47, Jul. 2011.
    • (2011) IEEE Security and Privacy , vol.9 , Issue.4 , pp. 41-47
    • Dhillon, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.