Proceedings of the 2002 ACM Symposium on Applied Computing - SAC '02 2002
DOI: 10.1145/508832.508843
|View full text |Cite
|
Sign up to set email alerts
|

Collaborative attack modeling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
42
0
2

Year Published

2005
2005
2007
2007

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 49 publications
(44 citation statements)
references
References 0 publications
0
42
0
2
Order By: Relevance
“…Attack tree (AT) representation originates from fault trees which have been used in analyzing failing conditions of complex systems [5]. Attack trees are first used by Schneier [3] to provide a formal way of describing the security of a system.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Attack tree (AT) representation originates from fault trees which have been used in analyzing failing conditions of complex systems [5]. Attack trees are first used by Schneier [3] to provide a formal way of describing the security of a system.…”
Section: Related Workmentioning
confidence: 99%
“…Preconditioning is addressed in [9] and [5] by use of petri nets. A petri net consists of places, transitions and arcs connecting them.…”
Section: Related Workmentioning
confidence: 99%
“…Schneier [33,34] first introduced the attack-tree method for threat modeling. Steffan and Schumacher [36] explore collaborative attack modeling based on shared knowledge about vulnerabilities. Roscoe et al [30] discuss threat models for ubiquitous systems.…”
Section: Related Workmentioning
confidence: 99%
“…Subsequently, Steffan and Schumacher [29] proposed a similarly abstract knowledgesharing approach to attack modeling that combines the freeform mechanisms of Wiki publishing systems with conditional transitions as may be found in Petri nets, albeit without formalized semantics.…”
Section: Related Workmentioning
confidence: 99%