Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Threat scenario-based security risk analysis using use case modeling in information systems

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Young-Gab-
dc.contributor.authorCha, Sungdeok-
dc.date.accessioned2021-09-06T08:22:02Z-
dc.date.available2021-09-06T08:22:02Z-
dc.date.created2021-06-19-
dc.date.issued2012-03-
dc.identifier.issn1939-0114-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/105352-
dc.description.abstractSuccessful Security Risk Analysis (SRA) enables us to develop a secure information management system and provides valuable analysis data for future risk estimation. One of the qualitative techniques for SRA is the scenario method. This provides a framework for our explorations that raises our awareness and appreciation of uncertainty. However, the existing scenario methods are too abstract to be applicable to some situations and have not been formalized in information systems (ISs) because they do not explicitly define artifacts or have any standard notation. Therefore, this paper proposes the improved scenario-based SRA approach, which can create SRA reports using threat scenario templates and manage security risk directly in ISs. Furthermore, in order to show how to apply the proposed method in a specific environment, especially in a Broadband convergence Network (BcN) environment, a case study is presented. Copyright (C) 2011 John Wiley & Sons, Ltd.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherWILEY-HINDAWI-
dc.titleThreat scenario-based security risk analysis using use case modeling in information systems-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Young-Gab-
dc.contributor.affiliatedAuthorCha, Sungdeok-
dc.identifier.doi10.1002/sec.321-
dc.identifier.scopusid2-s2.0-84863146130-
dc.identifier.wosid000300710800009-
dc.identifier.bibliographicCitationSECURITY AND COMMUNICATION NETWORKS, v.5, no.3, pp.293 - 300-
dc.relation.isPartOfSECURITY AND COMMUNICATION NETWORKS-
dc.citation.titleSECURITY AND COMMUNICATION NETWORKS-
dc.citation.volume5-
dc.citation.number3-
dc.citation.startPage293-
dc.citation.endPage300-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorsecurity risk analysis-
dc.subject.keywordAuthorqualitative risk analysis-
dc.subject.keywordAuthorscenario method-
dc.subject.keywordAuthoruse case modeling-
dc.subject.keywordAuthorBroadband convergence Network (BcN)-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Cha, Sung deok photo

Cha, Sung deok
컴퓨터학과
Read more

Altmetrics

Total Views & Downloads

BROWSE