A risk-centric defensive architecture for threat modelling in e-government application
暂无分享,去创建一个
[1] Mathias Ekstedt,et al. A probabilistic relational model for security risk analysis , 2010, Comput. Secur..
[2] Andreas L. Opdahl,et al. Experimental comparison of attack trees and misuse cases for security threat identification , 2009, Inf. Softw. Technol..
[3] Dianxiang Xu,et al. A Threat Model Driven Approach for Security Testing , 2007, Third International Workshop on Software Engineering for Secure Systems (SESS'07: ICSE Workshops 2007).
[4] Donatello Santoro,et al. On federated single sign-on in e-government interoperability frameworks , 2016 .
[5] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2004, Requirements Engineering.
[6] Adnan Masood,et al. Static analysis for web service security - Tools & techniques for a secure development life cycle , 2015, 2015 IEEE International Symposium on Technologies for Homeland Security (HST).
[7] M. Prasanna,et al. Generation of Test Case using Automation in Software Systems – A Review , 2015 .
[8] Tony Ucedavélez,et al. Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis , 2015 .
[9] Inger Anne Tøndel,et al. Idea: Reusability of Threat Models - Two Approaches with an Experimental Evaluation , 2010, ESSoS.
[10] Guttorm Sindre,et al. Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks , 2012, Int. J. Secur. Softw. Eng..
[11] Durga Prasad Mohapatra,et al. Risk analysis: a guiding force in the improvement of testing , 2013, IET Softw..
[12] Wouter Joosen,et al. A descriptive study of Microsoft’s threat modeling technique , 2015, Requirements Engineering.
[13] V Maheshwari,et al. Integrating risk assessment and threat modeling within SDLC process , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).
[14] Dianxiang Xu,et al. Automated Security Test Generation with Formal Threat Models , 2012, IEEE Transactions on Dependable and Secure Computing.
[15] Dianxiang Xu,et al. Towards an Enhanced Design Level Security: Integrating Attack Trees with Statecharts , 2011, 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement.
[16] Xiaoqin Zeng,et al. Uml-Based Modeling and Analysis of Security Threats , 2010, Int. J. Softw. Eng. Knowl. Eng..