Towards Security Risk-oriented Mal Activity Diagram

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Security Risk-oriented Mal Activity Diagram

Recently security has became one of the major concern in Information System (IS) development. Different security modeling language or security extension is used to model security features of IS. Mal Activity Diagram (MAD) is used at the design stage to represent security aspect. But it cannot model all the security risk management concepts. Without full coverage of concepts, it is not possible ...

متن کامل

Towards Computer-oriented Security Patterns

Security patterns are a mature paradigm for the development of secure systems. For years, security patterns have proven their usefulness, and have demonstrated that their use, especially at the software architecture level, provides important advantages. Security patterns have also proven their value as a communication vehicle and as an educational tool. However, the ever-growing complexity and ...

متن کامل

Towards the QCD phase diagram

We summarize our recent results on the phase diagram of QCD with N f = 2+1 quark flavors, as a function of temperature T and quark chemical potential μ . Using staggered fermions, lattices with temporal extent Nt = 4, and the exact RHMC algorithm, we first determine the critical line in the quark mass plane (mu,d ,ms) where the finite temperature transition at μ = 0 is second order. We confirm ...

متن کامل

Security Risk Assessment: Towards a Justification for the Security Risk Factor Table Model

One of the widely used methods to gauge risk is the Security Risk Factor Table (SRFT) model. While this model has been empirically successful, its use is limited by the fact that its formulas do not have a theoretical explanation – and thus, there is no guarantee that these formulas will work in other situations as well. In this paper, we provide a theoretical explanation for the SFRT formulas....

متن کامل

A Component-oriented Approach to Security Risk Assessment

Security risk assessments are costly and time consuming and cannot be carried out from scratch each time a component is being reused in a new setting. This calls for a component-oriented approach tightly integrating security assessment in the system development and maintenance process. Such an approach requires a strategy for inferring useful information about the security of a composite compon...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2012

ISSN: 0975-8887

DOI: 10.5120/8931-3010