메뉴 건너뛰기




Volumn , Issue , 2006, Pages 332-357

The CORAS methodology: Model-based Risk Assessment Using UML and UP

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85189788266     PISSN: None     EISSN: None     Source Type: Book    
DOI: None     Document Type: Chapter
Times cited : (36)

References (30)
  • 2
    • 0001094070 scopus 로고
    • The use of the CCTA risk analysis and management methodology CRAMM
    • North Holland
    • Barber, B., & Davey, J. (1992). The use of the CCTA risk analysis and management methodology CRAMM. Proc. MEDINFO92, North Holland (pp. 1589-1593).
    • (1992) Proc. MEDINFO92 , pp. 1589-1593
    • Barber, B.1    Davey, J.2
  • 5
    • 0012035309 scopus 로고    scopus 로고
    • Structuring use cases with goals
    • Sep/Oct: 35-40, Nov/Dec
    • Cockburn, A. (1997). Structuring use cases with goals. Journal of Object-oriented Programming, Sep/Oct: 35-40, Nov/Dec: 56-62.
    • (1997) Journal of Object-oriented Programming , pp. 56-62
    • Cockburn, A.1
  • 7
    • 85189807168 scopus 로고    scopus 로고
    • On the World Wide Web
    • Communications-Electronics Security Group. (2002). Information security evaluation criteria. On the World Wide Web:: http://www.cesg.gov.uk/assurance/iacs/itsec/index.htm
    • (2002) Information security evaluation criteria
  • 8
    • 85189787736 scopus 로고    scopus 로고
    • Control objectives for information and related technology. COBIT. On the World Wide Web
    • Control objectives for information and related technology. COBIT. On the World Wide Web: http://www.isaca.org/ct_denld.htm
  • 10
    • 85189764605 scopus 로고    scopus 로고
    • Intrusion detection message exchange format (IDMEF)
    • (December 28)
    • Curry, D., & Debar Merrill Lynch, H. (December 28, 2001). Intrusion detection message exchange format (IDMEF). Working draft.
    • (2001) Working draft
    • Curry, D.1    Debar Merrill Lynch, H.2
  • 11
    • 0003042004 scopus 로고    scopus 로고
    • Ponder: A language for specifying security and management policies for distributed systems
    • Department of Computing, Imperial College, London
    • Damianou, N., Dulay, N., Lupu, E., & Sloman, M. (2000). Ponder: A language for specifying security and management policies for distributed systems. The Language Specification-Version 2.2. Research Report DoC 2000/1, Department of Computing, Imperial College, London.
    • (2000) The Language Specification-Version 2.2. Research Report DoC 2000/1
    • Damianou, N.1    Dulay, N.2    Lupu, E.3    Sloman, M.4
  • 12
    • 63149118000 scopus 로고    scopus 로고
    • Stochastic models and mobile E-commerce: Are stochastic models usable in the analysis of risk in mobile c-commerce?
    • 0stfold University College, Faculty of Computer Sciences, Halden, Norway
    • Houmb, S. H. (2002). Stochastic models and mobile E-commerce: Are stochastic models usable in the analysis of risk in mobile c-commerce? Unpublished Master's Thesis, 0stfold University College, Faculty of Computer Sciences, Halden, Norway.
    • (2002) Unpublished Master's Thesis
    • Houmb, S.H.1
  • 15
    • 85189823689 scopus 로고    scopus 로고
    • Information technology-Security techniques-
    • ISO/IEC (1999). Information technology-Security techniques-Evaluation Criteria for IT Security ISO/IEC, 15408-1.
    • (1999) Evaluation Criteria for IT Security ISO/IEC , pp. 15408-15401
  • 20
    • 0016444204 scopus 로고
    • A reliability model for systems with Markov structure
    • Littlewood, B. (1975). A reliability model for systems with Markov structure. Appl. Stat. 24 (pp. 172-177).
    • (1975) Appl. Stat. 24 , pp. 172-177
    • Littlewood, B.1
  • 21
    • 85189768283 scopus 로고    scopus 로고
    • XML Metadata Interchange (XMI)
    • OMG. (1999). XML Metadata Interchange (XMI).
    • (1999)
  • 24
    • 85189769673 scopus 로고    scopus 로고
    • Reactive System Design Support, RSDS. On the World Wide Web
    • Reactive System Design Support, RSDS. On the World Wide Web: http://www.dcs.kcl.ac.uk


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.