SeaMonster: Providing tool support for security modeling

作者: Daniele G. Spampinato , Per Håkon Meland , Egil Trygve Baadshaug , Egil Trygve Baadshaug

DOI:

关键词: Computer scienceSoftware security assuranceSecurity information and event managementComputer securityWorld Wide Web

摘要:

参考文章(13)
Seth Fogie, Anton Rager, Robert Hansen, Petko D. Petkov, Jeremiah Grossman, XSS Attacks: Cross Site Scripting Exploits and Defense ,(2007)
Tom Fagerhaug, Bjørn Andersen, Root Cause Analysis: Simplified Tools and Techniques ,(1999)
M. Howard, Building more secure software with improved development processes ieee symposium on security and privacy. ,vol. 2, pp. 63- 65 ,(2004) , 10.1109/MSP.2004.95
G. McGraw, From the ground up: the DIMACS software security workshop ieee symposium on security and privacy. ,vol. 1, pp. 59- 66 ,(2003) , 10.1109/MSECP.2003.1193213
Stephen Gilmore, Jane Hillston, Marina Ribaudo, PEPA Nets: A Structured Performance Modelling Formalism Lecture Notes in Computer Science. pp. 111- 130 ,(2002) , 10.1007/3-540-46029-2_7
Shanai Ardi, David Byers, Nahid Shahmehri, Towards a structured unified process for software security Proceedings of the 2006 international workshop on Software engineering for secure systems - SESS '06. pp. 3- 10 ,(2006) , 10.1145/1137627.1137630
David Byers, Shanai Ardi, Nahid Shahmehri, Claudiu Duma, Modeling Software VulnerabilitiesWith Vulnerability Cause Graphs international conference on software maintenance. pp. 411- 422 ,(2006) , 10.1109/ICSM.2006.40
J. McDermott, C. Fox, Using abuse case models for security requirements analysis annual computer security applications conference. pp. 55- 64 ,(1999) , 10.1109/CSAC.1999.816013