DocumentCode :
1951402
Title :
Threat Risk Modeling
Author :
Al-Fedaghi, Sabah ; Alrashed, Asad A.
Author_Institution :
Comput. Eng. Dept., Kuwait Univ., Safat, Kuwait
fYear :
2010
fDate :
26-28 Feb. 2010
Firstpage :
405
Lastpage :
411
Abstract :
Application development security utilizes a list of threats that identify and organize application security classes of attack. The developed system is decomposed into relevant components and then each component is analyzed for threats. Data flow diagrams (DFDs) are typically used to graphically represent a system. In this paper we propose a flow-based model as an alternative methodology for identification and classification of threats.
Keywords :
data flow analysis; formal specification; security of data; application development security; application security classes; data flow diagrams; flow based model; threat classification; threat identification; threat risk modeling; Application software; Availability; Communication system security; Computer industry; Computer networks; Computer security; Data security; Design for disassembly; Flow graphs; Programming; application development security; data flow; threat classification;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication Software and Networks, 2010. ICCSN '10. Second International Conference on
Conference_Location :
Singapore
Print_ISBN :
978-1-4244-5726-7
Electronic_ISBN :
978-1-4244-5727-4
Type :
conf
DOI :
10.1109/ICCSN.2010.29
Filename :
5437700
Link To Document :
بازگشت