Information systems security design methods: implications for information systems development
ACM Computing Surveys (CSUR)
Towards Development of Secure Systems Using UMLsec
FASE '01 Proceedings of the 4th International Conference on Fundamental Approaches to Software Engineering
Threat Modeling
Specifying Information-Flow Controls
ICDCSW '05 Proceedings of the Second International Workshop on Security in Distributed Computing Systems (SDCS) (ICDCSW'05) - Volume 02
Applying Security Design Analysis to a service-based system: Research Articles
Software—Practice & Experience - Grid Security
Model based security risk analysis for web applications: the CORAS approach
EuroWeb'02 Proceedings of the 2002 international conference on EuroWeb
XRound: A reversible template language and its application in model-based security analysis
Information and Software Technology
Hi-index | 0.00 |
Systematic security risk analysis requires an information model which integrates the system design, the security environment (the attackers, security goals etc) and proposed security requirements. Such a model must be scalable to accommodate large systems, and support the efficient discovery of threat paths and the production of risk-based metrics; the modeling approach must balance complexity, scalability and expressiveness. This paper describes such a model; novel features include combining formal information modeling with informal requirements traceability to support the specification of security requirements on incompletely specified services, and the typing of information flow to quantify path exploitability and model communications security.