Threats and countermeasures schema

作者: Michael Dunner , Srinath Vasireddy , John Meier

DOI:

关键词:

摘要: An threats and countermeasures schema that can incorporate expertise into an application engineering activity is provided. For example, a be applied to threat modeling component converge knowledge the by identifying categories, vulnerabilities, attacks based upon type, user objective, etc. The novel create common framework converges with respect any (e.g. modeling). include lists of acted upon. As well, list attacks. Additionally, context precision mechanism employed automatically and/or dynamically determine environment. This used generate appropriate determined type.

参考文章(54)
John Meier, Server security schema ,(2006)
Andrew Ginter, Kegan Kawano, Brad McMillan, Tom Hutchinson, Andy Mah, Adam Muegge, Rui Manuel Lopes, Erik Hope, Brett Jensen, Periodic filesystem integrity checks ,(2005)
Michael Dunner, Srinath Vasireddy, John Meier, Blaine Wastell, Security engineering and the application life cycle ,(2006)
Edward W. Balunas, Lloyd E. Smith, Program planning management system ,(1997)
Charles W. Knouse, Francisco J. Villavicencio, Authorization services with external authentication ,(2002)
Ram Gopal Lakshmi Narayanan, Preventing stack buffer overflow attacks ,(2002)