메뉴 건너뛰기




Volumn 8448, Issue , 2014, Pages 94-124

A threat analysis methodology for smart home scenarios

Author keywords

Attack pattern; Context; Requirements engineering; Smart grid; Threat analysis

Indexed keywords

AUTOMATION; DATA FLOW ANALYSIS; DATA FLOW GRAPHS; INTELLIGENT BUILDINGS; MOBILE SECURITY; REQUIREMENTS ENGINEERING;

EID: 84927612152     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-10329-7_7     Document Type: Conference Paper
Times cited : (6)

References (32)
  • 4
    • 84875055161 scopus 로고    scopus 로고
    • Privacy-aware profiling and statistical data extraction for smart sustainable energy systems
    • Lin, H., Fang, Y.: Privacy-aware profiling and statistical data extraction for smart sustainable energy systems. IEEE Trans. Smart Grid 4(1), 332–340 (2013)
    • (2013) IEEE Trans. Smart Grid , vol.4 , Issue.1 , pp. 332-340
    • Lin, H.1    Fang, Y.2
  • 5
    • 84927614153 scopus 로고    scopus 로고
    • NIST: Guidelines for smart grid cyber security
    • NIST: Guidelines for smart grid cyber security (2010)
    • (2010)
  • 6
    • 77953330474 scopus 로고    scopus 로고
    • Are companies actually using secure development life cycles?
    • Geer, D.: Are companies actually using secure development life cycles? Computer 43(6), 12–16 (2010)
    • (2010) Computer , vol.43 , Issue.6 , pp. 12-16
    • Geer, D.1
  • 7
    • 67349139935 scopus 로고    scopus 로고
    • On the secure software development process: Clasp, {SDL} and touchpoints compared
    • Special Section: Software Engineering for Secure Systems Software Engineering for Secure Systems
    • Win, B.D., Scandariato, R., Buyens, K., Gregoire, J., Joosen, W.: On the secure software development process: Clasp, {SDL} and touchpoints compared. Inf. Softw. Technol. 51(7), 1152–1171 (2009). Special Section: Software Engineering for Secure Systems Software Engineering for Secure Systems
    • (2009) Inf. Softw. Technol , vol.51 , Issue.7 , pp. 1152-1171
    • Win, B.D.1    Scandariato, R.2    Buyens, K.3    Gregoire, J.4    Joosen, W.5
  • 8
    • 84927621654 scopus 로고    scopus 로고
    • SANS: Sans - a member of the microsoft security development lifecycle (sdl) pro network
    • SANS: Sans - a member of the microsoft security development lifecycle (sdl) pro network (2014). http://www.sans.org/security-resources/microsoft-sdl
    • (2014)
  • 9
    • 84927631714 scopus 로고    scopus 로고
    • OWASP: CLASP (Comprehensive, Lightweight Application Security Process). Technical report, The Open Web Application Security Project (OWASP) (2011)
    • OWASP: CLASP (Comprehensive, Lightweight Application Security Process). Technical report, The Open Web Application Security Project (OWASP) (2011). https://www.owasp.org/index.php/Category:OWASP CLASP Project
  • 10
    • 84927651324 scopus 로고    scopus 로고
    • Commission of the European communities.: Communication from the commission to the european parliament, the council, the European economic and social committee and the committee of the regions
    • Commission of the European communities.: Communication from the commission to the european parliament, the council, the European economic and social committee and the committee of the regions (2011)
    • (2011)
  • 11
    • 79951648231 scopus 로고    scopus 로고
    • Review and evaluation of security threats on the communication networks in the smart grid
    • Lu, Z., Lu, X., Wang, W., Wang, C.: Review and evaluation of security threats on the communication networks in the smart grid. In: Military Communications Conference, 2010 - MILCOM 2010, pp. 1830–1835 (2010)
    • (2010) Military Communications Conference, 2010 - MILCOM , pp. 1830-1835
    • Lu, Z.1    Lu, X.2    Wang, W.3    Wang, C.4
  • 12
    • 84875747087 scopus 로고    scopus 로고
    • Survey cyber security in the smart grid: Survey and challenges
    • Wang, W., Lu, Z.: Survey cyber security in the smart grid: survey and challenges. Comput. Netw. 57(5), 1344–1371 (2013)
    • (2013) Comput. Netw , vol.57 , Issue.5 , pp. 1344-1371
    • Wang, W.1    Lu, Z.2
  • 14
    • 67650822699 scopus 로고    scopus 로고
    • Security and privacy challenges in the smart grid
    • McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Secur. Priv. 7(3), 75–77 (2009)
    • (2009) IEEE Secur. Priv , vol.7 , Issue.3 , pp. 75-77
    • McDaniel, P.1    McLaughlin, S.2
  • 16
    • 80051515778 scopus 로고    scopus 로고
    • Developer-driven threat modeling: Lessons learned in the trenches
    • Dhillon, D.: Developer-driven threat modeling: lessons learned in the trenches. IEEE Secur. Priv. 9(4), 41–47 (2011)
    • (2011) IEEE Secur. Priv , vol.9 , Issue.4 , pp. 41-47
    • Dhillon, D.1
  • 17
    • 84927609305 scopus 로고    scopus 로고
    • ISO/IEC: Information technology - Security techniques - Information security management systems - Requirements. ISO/IEC 27001, International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC), Geneva, Switzerland
    • ISO/IEC: Information technology - Security techniques - Information security management systems - Requirements. ISO/IEC 27001, International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC), Geneva, Switzerland (2005)
    • (2005)
  • 23
    • 84874407212 scopus 로고    scopus 로고
    • Pattern-based context establishment for service-oriented architectures
    • In: Heisel, M. (ed.), Springer, Heidelberg
    • Beckers, K., Faßbender, S., Heisel, M., Meis, R.: Pattern-based context establishment for service-oriented architectures. In: Heisel, M. (ed.) Software Service and Application Engineering. LNCS, vol. 7365, pp. 81–101. Springer, Heidelberg (2012)
    • (2012) Software Service and Application Engineering. LNCS , vol.7365 , pp. 81-101
    • Beckers, K.1    Faßbender, S.2    Heisel, M.3    Meis, R.4
  • 24
    • 84858326746 scopus 로고    scopus 로고
    • A pattern-based method for identifying and analyzing laws
    • In: Regnell, B., Damian, D. (eds.), Springer, Heidelberg
    • Beckers, K., Faßbender, S., Küster, J.-C., Schmidt, H.: A pattern-based method for identifying and analyzing laws. In: Regnell, B., Damian, D. (eds.) REFSQ 2011. LNCS, vol. 7195, pp. 256–262. Springer, Heidelberg (2012)
    • (2012) REFSQ 2011. LNCS, , vol.7195 , pp. 256-262
    • Beckers, K.1    Faßbender, S.2    Küster, J.-C.3    Schmidt, H.4
  • 25
    • 84927639340 scopus 로고    scopus 로고
    • BSI: Protection Profile for the Gateway of a Smart Metering System (Gateway PP). Version 01.01.01(final draft), Bundesamt f¨ur Sicherheit in der Informationstechnik (BSI) - Federal Office for Information Security Germany, Bonn, Germany (2011)
    • BSI: Protection Profile for the Gateway of a Smart Metering System (Gateway PP). Version 01.01.01(final draft), Bundesamt f¨ur Sicherheit in der Informationstechnik (BSI) - Federal Office for Information Security Germany, Bonn, Germany (2011). https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/SmartMeter/PP-SmartMeter.pdf? blob=publicationFile
  • 26
    • 84927662407 scopus 로고    scopus 로고
    • BSI: Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP). Version 1.0), Bundesamt f¨ur Sicherheit in der Informationstechnik (BSI) - Federal Office for Information Security Germany, Bonn, Germany (2013)
    • BSI: Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP). Version 1.0, Bundesamt f¨ur Sicherheit in der Informationstechnik (BSI) - Federal Office for Information Security Germany, Bonn, Germany (2013). https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/SmartMeter/PPSecurity%20Module.pdf?blob=publicationFile
  • 27
    • 84927650874 scopus 로고    scopus 로고
    • OPEN node project: Evaluation of general requirements according state of the art. Technical report, OPEN node, project
    • OPEN node project: Evaluation of general requirements according state of the art. Technical report, OPEN node project (2010)
    • (2010)
  • 28
    • 84927671940 scopus 로고    scopus 로고
    • OPEN node project: Functional Use cases. Technical report,, OPEN node project
    • OPEN node project: Functional Use cases. Technical report, OPEN node project (2011)
    • (2011)
  • 29
    • 84927603015 scopus 로고    scopus 로고
    • OPEN meter project: D1.1 Requirements of AMI. Technical report, OPEN meter project
    • OPEN meter project: D1.1 Requirements of AMI. Technical report, OPEN meter project (2009)
    • (2009)
  • 30
    • 84927596988 scopus 로고    scopus 로고
    • Department of Energy and Climate Change: Smart metering implementation programme, response to prospectus consultation, overview document. Technical report, Office of Gas and Electricity Markets
    • Department of Energy and Climate Change: Smart metering implementation programme, response to prospectus consultation, overview document. Technical report, Office of Gas and Electricity Markets (2011)
    • (2011)
  • 31
    • 84927632427 scopus 로고    scopus 로고
    • Department of Energy and Climate Change: Smart metering implementation programme, response to prospectus consultation, design requirements. Technical report, Office of Gas and Electricity Markets
    • Department of Energy and Climate Change: Smart metering implementation programme, response to prospectus consultation, design requirements. Technical report, Office of Gas and Electricity Markets (2011)
    • (2011)
  • 32
    • 78649355842 scopus 로고    scopus 로고
    • Autonomous demand-side management based on game-theoretic energy consumption scheduling for the future smart grid
    • Mohsenian-Rad, A.H., Wong, V., Jatskevich, J., Schober, R., Leon-Garcia, A.: Autonomous demand-side management based on game-theoretic energy consumption scheduling for the future smart grid. IEEE Trans. Smart Grid 1(3), 320–331 (2010)
    • (2010) IEEE Trans. Smart Grid , vol.1 , Issue.3 , pp. 320-331
    • Mohsenian-Rad, A.H.1    Wong, V.2    Jatskevich, J.3    Schober, R.4    Leon-Garcia, A.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.