메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 488-497

Developing secure networked web-based systems using model-based risk assessment and UMLsec

Author keywords

[No Author keywords available]

Indexed keywords

MODELING LANGUAGES; SOFTWARE ENGINEERING; UNIFIED MODELING LANGUAGE;

EID: 84944688537     PISSN: 15301362     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/APSEC.2003.01254404     Document Type: Conference Paper
Times cited : (7)

References (27)
  • 2
    • 0001094070 scopus 로고
    • The use of the ccta risk analysis and management methodology cramm in health information systems
    • K. Lun, P. Degoulet, T. Piemme, and O. Rien-hoff, editors, Amsterdam, North Holland Publishing Co
    • B. Barber and J. Davey. The use of the ccta risk analysis and management methodology cramm in health information systems. In K. Lun, P. Degoulet, T. Piemme, and O. Rien-hoff, editors, MEDINFO 92, pages 1589-1593, Amsterdam, 1992. North Holland Publishing Co.
    • (1992) MEDINFO 92 , pp. 1589-1593
    • Barber, B.1    Davey, J.2
  • 7
    • 0021635235 scopus 로고
    • The logic flowgraph: A new approach to process failure modeling and diagnonsis for disturbance analysis applications
    • S. Guarro and D. Okrent. The logic flowgraph: A new approach to process failure modeling and diagnonsis for disturbance analysis applications. Nuclear Technology, page 67, 1984.
    • (1984) Nuclear Technology , pp. 67
    • Guarro, S.1    Okrent, D.2
  • 12
    • 79955163100 scopus 로고    scopus 로고
    • UMLsec: Extending UML for secure systems development
    • J.-M. Jézéquel, H. Hussmann, and S. Cook, editors, Dresden, Sept. 30 - Oct. 4, Springer
    • J. Jürjens. UMLsec: Extending UML for secure systems development. In J.-M. Jézéquel, H. Hussmann, and S. Cook, editors, UML 2002 - The Unified Modeling Language, volume 2460 of LNCS, pages 412-425, Dresden, Sept. 30 - Oct. 4 2002. Springer.
    • (2002) UML 2002 - The Unified Modeling Language, Volume 2460 of LNCS , pp. 412-425
    • Jürjens, J.1
  • 16
    • 0023427061 scopus 로고
    • Application of goal tree-success tree model as the knowledge-base of operator advisory system
    • I. Kim and M. Modarres. Application of Goal Tree-Success Tree Model as the Knowledge-Base of Operator Advisory System. Nuclear Engineering & Design J., 104:67-81, 1987.
    • (1987) Nuclear Engineering & Design J. , vol.104 , pp. 67-81
    • Kim, I.1    Modarres, M.2
  • 18
    • 84902976571 scopus 로고    scopus 로고
    • Structuring and design of reactive systems using RSDS and B
    • LNCS. Springer-Verlag
    • K. Lano, K. Androutsopoulos, and D. Clark. Structuring and Design of Reactive Systems using RSDS and B. In FASE 2000, LNCS. Springer-Verlag, 2000.
    • (2000) FASE 2000
    • Lano, K.1    Androutsopoulos, K.2    Clark, D.3
  • 19
    • 85134575114 scopus 로고    scopus 로고
    • A proposal for a lightweight rigorous UML-based development method for reliable systems
    • Lecture Notes in Informatics, German Computer Society GI, UML 2001 satellite workshop
    • R. Paige and J. Ostroff. A proposal for a lightweight rigorous UML-based development method for reliable systems. In Workshop on Practical UML-Based Rigorous Development Methods, Lecture Notes in Informatics, pages 192-207. German Computer Society (GI), 2001. UML 2001 satellite workshop.
    • (2001) Workshop on Practical UML-based Rigorous Development Methods , pp. 192-207
    • Paige, R.1    Ostroff, J.2
  • 22
    • 20444404422 scopus 로고    scopus 로고
    • The CORAS Approach for Model-based Risk Management applied to e-Commerce Domain
    • Kluwer
    • D. Raptis, T. Dimitrakos, B. Gran, and K. Stølen. The CORAS Approach for Model-based Risk Management applied to e-Commerce Domain. In Proc. CMS-2002, pages 169-181. Kluwer, 2002.
    • (2002) Proc. CMS-2002 , pp. 169-181
    • Raptis, D.1    Dimitrakos, T.2    Gran, B.3    Stølen, K.4
  • 24
    • 0034497420 scopus 로고    scopus 로고
    • Eliciting security requirements by misuse cases
    • Sydney, Australia, Los Alamitos, CA: IEEE Computer Society Press
    • G. Sindre and A. Opdahl. Eliciting Security Requirements by Misuse Cases. In Proc. TOOLS-PACIFIC 2000, pages 120-131, Sydney, Australia, 2000. Los Alamitos, CA: IEEE Computer Society Press.
    • (2000) Proc. TOOLS-PACIFIC 2000 , pp. 120-131
    • Sindre, G.1    Opdahl, A.2
  • 26
    • 84944709560 scopus 로고    scopus 로고
    • Experience from using model-based risk assessment to evaluate the security of a telemedicine application
    • K. Stølen and E. Mantzoranis. Experience from using model-based risk assessment to evaluate the security of a telemedicine application. In Proc. TICD-2002, 2002.
    • (2002) Proc. TICD-2002
    • Stølen, K.1    Mantzoranis, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.