نتایج جستجو برای: روش coras

تعداد نتایج: 369610  

2003
Soldal Lund Ida Hogganvik Fredrik Seehusen Ketil Stølen Jan Øyvind Aagedal

Traditional system documentation focuses on the behaviour or functionality we would like the system or application to provide. However, it is equally important to document the undesirable behaviour; what happens when things goes wrong. Moreover, this documentation must be unambiguous and easy to read and understand for the different stakeholders involved. SINTEF has developed a graphical langua...

2015

This chapter presents a guided tour of the CORAS method. As illustrated by Fig. 3.1, the CORAS method is divided into eight steps. The first four of these steps are introductory in the sense that we use them to establish a common understanding of the target of the analysis, and to make the target description that will serve as a basis for the subsequent risk identification. The introductory ste...

2004
Siv Hilde Houmb Ørjan Markhus Lillevik

Risk-driven development focus on identifying and treating risks as an integrated part of the development process. One then obtain an adequate security level by treating security issues at the right time for the correct cost throughout the development. The EU IST-project CORAS has developed an integrate risk management and system development process for security-critical systems based on AS/NZS ...

2005
Fredrik Vraalsen Mass Soldal Lund Tobias Mahler Xavier Parent Ketil Stølen

The paper makes two main contributions: (1) It presents experiences from using the CORAS language for security threat modelling to specify legal risk scenarios. These experiences are summarised in the form of requirements to a more expressive language providing specific support for the legal domain. (2) Its second main contribution is to present ideas towards the fulfilment of these requirement...

2007
F den Braber F Vraalsen

This paper presents the CORAS method for model-based security analysis. The presentation is case-driven. We follow two analysts in their interaction with an organisation by which they have been hired to carry out a security risk analysis. The analysis is divided into seven main steps, and the paper devotes a separate section to each of them. The paper focuses in particular on the use of the COR...

2006
Folker den Braber Gyrd Brændeland Heidi E. I. Dahl Iselin Engan Ida Hogganvik Mass S. Lund Bjørnar Solhaug Ketil Stølen Fredrik Vraalsen

Journal: :Risk analysis : an official publication of the Society for Risk Analysis 2011
Ida Hogganvik Grøndahl Mass Soldal Lund Ketil Stølen

Risk analysis involves people with different roles and competences. The validity of the outcome depends on that they are able to communicate; ideally between themselves, but at least with or via a risk analyst. The CORAS risk modeling language has been developed to facilitate communication between stakeholders involved in the various stages of risk analysis. This article reports the results fro...

2002
I. Djordjevic C. Gan E. Scharf R. Mondragon B. A. Gran M. Kristiansen T. Dimitrakos K. Stølen T. A. Opperud

This paper describes a novel framework for a risk management process involving a model-based approach, developed as the main objective of CORAS (IST-200

2002
Jan Øyvind Aagedal Folker den Braber Theodosis Dimitrakos Bjørn Axel Gran Dimitris Raptis Ketil Stølen

The main objective of the CORAS project is to provide methods and tools for precise, unambiguous, and efficient risk assessment of security critical systems. To this end, we advocate a model-based approach to risk assessment, and this paper attempts to define the required models for this. Whereas traditional risk assessment is performed without any formal description of the target of evaluation...

پایان نامه :موسسه آموزش عالی غیردولتی و غیرانتفاعی صنعتی فولاد - دانشکده مهندسی کامپیوتر 1393

امروزه اطلاعات به عنوان یکی از باارزش ترین دارایی های سازمان ها و سیستم های اطلاعاتی محسوب می شود، از این رو امنیت اطلاعات خود یک دغدغه و چالش جدی محسوب می شود. امنیت اطلاعات سازوکاری است که اطلاعات را در برابرگستره وسیعی از تهدیدها محافظت می کند. یکی از راه های دستیابی به امنیت اطلاعات ایجاد یک سیستم مدیریت امنیت اطلاعات (isms) مبتنی بر اساس یکی از استانداردهای موجود بین المللی است. یک نکته قا...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید