Myagmar, Suvda and Lee, Adam J and Yurcik, William
(2005)
Threat Modeling as a Basis for Security Requirements.
In:
Symposium on Requirements Engineering for Information Security (SREIS).
UNSPECIFIED.
ISBN UNSPECIFIED
![[img]](http://d-scholarship.pitt.edu/style/images/fileicons/text_plain.png) |
Plain Text (licence)
Available under License : See the attached license file.
Download (1kB)
|
Abstract
We routinely hear vendors claim that their systems are "secure." However, without knowing what assumptions are made by the vendor, it is hard to justify such a claim. Prior to claiming the security of a system, it is important to identify the threats to the system in question. Enumerating the threats to a system helps system architects develop realistic and meaningful security requirements.
Share
Citation/Export: |
|
Social Networking: |
|
Details
Metrics
Monthly Views for the past 3 years
Plum Analytics
Actions (login required)
 |
View Item |