Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Fredrik Vraalsen"'
Publikováno v:
BT Technology Journal. 25:101-117
This paper presents the CORAS method for model-based security analysis. The presentation is case-driven. We follow two analysts in their interaction with an organisation by which they have been hired to carry out a security risk analysis. The analysi
Publikováno v:
Journal of Cases on Information Technology. 7:110-130
During a field trial performed at the Norwegian telecom company NetCom from May 2003 to July 2003, a methodology for model-based risk analysis was assessed. The chosen methodology was the CORAS methodology (CORAS, 2000), which has been developed in a
Autor:
Tobias Mahler, Fredrik Vraalsen
This chapter gives an introduction to the CORAS approach for model-based security risk analysis. It presents a guided walkthrough of the CORAS risk analysis process based on examples from risk analysis of security, trust and legal issues in a collabo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::41a5f60ca6b61f081872d7935f43597c
https://doi.org/10.4018/9781599040905.ch018.ch000
https://doi.org/10.4018/9781599040905.ch018.ch000
Autor:
Fredrik Vraalsen, Tobias Mahler
Publikováno v:
IFIP — The International Federation for Information Processing ISBN: 0387282599
PRO-VE
PRO-VE
Establishing and operating a virtual organization implies a number of challenges from many different perspectives, including socio-economic, organizational, legal and computational issues. This paper focuses on the legal aspects with a particular vie
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ebe8311cb9f8d82b0054986a93e7411e
https://doi.org/10.1007/0-387-29360-4_54
https://doi.org/10.1007/0-387-29360-4_54
Publikováno v:
Mobile Information Systems ISBN: 0387228519
MOBIS
MOBIS
Maintenance workers in the oil and process industry have typically had minimal IT support, relying on paper-based solutions both for the information they need to bring into the field and for data capture. This paper proposes a mobile context aware sy
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e5ba9518779a2ffe324d6c88152f599e
https://doi.org/10.1007/0-387-22874-8_6
https://doi.org/10.1007/0-387-22874-8_6
During a field trial performed at the Norwegian telecom company NetCom from May 2003 to July 2003, a methodology for model-based risk analysis was assessed. The chosen methodology was the CORAS methodology (CORAS, 2000), which has been developed in a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::309466ed8696a8ba448775308d1cac9a
https://doi.org/10.4018/978-1-59904-408-8.ch007
https://doi.org/10.4018/978-1-59904-408-8.ch007
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540260424
iTrust
iTrust
The paper makes two main contributions: (1) It presents experiences from using the CORAS language for security threat modelling to specify legal risk scenarios. These experiences are summarised in the form of requirements to a more expressive languag
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::24522518aa90e221f7b7a7026623c799
https://doi.org/10.1007/11429760_4
https://doi.org/10.1007/11429760_4
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540260424
iTrust
iTrust
The CORAS Tool for model-based security risk analysis supports documentation and reuse of risk analysis results through integration of different risk analysis and software development techniques and tools. Built-in consistency checking facilitates th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5b2d098f83ea2e9671317caadf882696
https://doi.org/10.1007/11429760_30
https://doi.org/10.1007/11429760_30
Publikováno v:
Encyclopedia of Information Science and Technology (III)
Today, most business processes and communications as well as a lot of everyday life situations involve IT technology. Apart from requirements on functionality, this development of IT systems has increased the need for security. Security issues are re
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ecab727edc78c38470fe288adabbdc1f
https://doi.org/10.4018/978-1-59140-553-5.ch275
https://doi.org/10.4018/978-1-59140-553-5.ch275
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540429494
GRID
GRID
Given the dynamic nature of grid resources, adaptation is required to sustain a predictable level of application performance. A prerequisite of adaptation is the recognition of changing conditions. In this paper we introduce an application signature
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::431e1e83cb383f3b597fb7035532e13e
https://doi.org/10.1007/3-540-45644-9_15
https://doi.org/10.1007/3-540-45644-9_15