Model-based security analysis in seven steps — a guided tour to the CORAS method (English)
- New search for: Braber, F.
- New search for: Hogganvik, I.
- New search for: Lund, M. S.
- New search for: Stølen, K.
- New search for: Vraalsen, F.
- New search for: Braber, F.
- New search for: Hogganvik, I.
- New search for: Lund, M. S.
- New search for: Stølen, K.
- New search for: Vraalsen, F.
In:
BT Technology Journal
;
25
, 1
;
101-117
;
2007
- Article (Journal) / Electronic Resource
-
Title:Model-based security analysis in seven steps — a guided tour to the CORAS method
-
Contributors:Braber, F. ( author ) / Hogganvik, I. ( author ) / Lund, M. S. ( author ) / Stølen, K. ( author ) / Vraalsen, F. ( author )
-
Published in:BT Technology Journal ; 25, 1 ; 101-117
-
Publisher:
- New search for: Kluwer Academic Publishers-Consultants Bureau
-
Place of publication:New York
-
Publication date:2007-01-01
-
Size:17 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 25, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 7
-
ForewordBerkeley-Herring, Kip et al. | 2007
- 8
-
EditorialKearney, Paul et al. | 2007
- 11
-
Dilemmas, uncertainty, risks, and board performanceGarratt, B. et al. | 2007
- 19
-
Information risk management and compliance — expect the unexpectedDrew, M. et al. | 2007
- 30
-
A framework for the management of information security risksJones, A. et al. | 2007
- 37
-
Building an information security Meta StandardRycroft, S. / Tully, M. et al. | 2007
- 41
-
A compliance office for heavily regulated enterprises — a best practice approach to meeting US FDA requirementsHimmelreich, J. K. et al. | 2007
- 50
-
How benchmarking can mitigate risk in business transformationAshford, B. et al. | 2007
- 58
-
Commercial implications of operational risk for service-based contractsBurrington, P. R. H. et al. | 2007
- 68
-
The role of systems and applications monitoring in operational risk managementEdmiston, A. H. et al. | 2007
- 79
-
Creating an effective security risk model for outsourcing decisionsColwill, C. / Gray, A. et al. | 2007
- 88
-
The BT Risk Cockpit — a visual approach to ORMEvans, G. / Benton, S. et al. | 2007
- 101
-
Model-based security analysis in seven steps — a guided tour to the CORAS methodBraber, F. / Hogganvik, I. / Lund, M. S. / Stølen, K. / Vraalsen, F. et al. | 2007
- 118
-
Security risk mitigation for information systemsPage, V. / Dixon, M. / Choudhury, I. et al. | 2007
- 128
-
Using assurance models to aid the risk and governance life cycleBaldwin, A. / Beres, Y. / Shiu, S. et al. | 2007
- 141
-
A risk-driven security analysis method and modelling languageKearney, P. / Brügger, L. et al. | 2007
- 154
-
Operational risk management with real-time business intelligenceAzvine, B. / Cui, Z. / Majeed, B. / Spott, M. et al. | 2007
- 168
-
Operational risk analysis in business processesJallow, A. K. / Majeed, B. / Vergidis, K. / Tiwari, A. / Roy, R. et al. | 2007
- 178
-
Managing the risks from information — through semantic information managementWarren, P. W. / Davies, N. J. et al. | 2007
- 192
-
Automated extraction of behavioural profiles from document usageWolthusen, S. D. et al. | 2007
- 201
-
Risk management — visual IDS countermeasuresRead, H. / Blyth, A. et al. | 2007
- 208
-
Horizon scanning and the business environment — the implications for risk managementBrown, D. et al. | 2007