2020
DOI: 10.1016/j.cose.2020.101755
|View full text |Cite
|
Sign up to set email alerts
|

A LINDDUN-Based framework for privacy threat analysis on identification and authentication processes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…In this way, threat modeling can help developers to write secure code, and at the same time, it can help penetration testers to carry out effective security testing. Commonly used threat modeling methods and technologies include STRIDE [14] , LINDDUN [15] , TRIKE [16] , ATTACK TREE [17] , DREAD [18] , VAST [19] , ATT&CK [20] , etc.…”
Section: Ivi Threat Analysismentioning
confidence: 99%
“…In this way, threat modeling can help developers to write secure code, and at the same time, it can help penetration testers to carry out effective security testing. Commonly used threat modeling methods and technologies include STRIDE [14] , LINDDUN [15] , TRIKE [16] , ATTACK TREE [17] , DREAD [18] , VAST [19] , ATT&CK [20] , etc.…”
Section: Ivi Threat Analysismentioning
confidence: 99%
“…In [67], Jordi Forne, Javier Parra-Arnau and Antonio Robles-Gonzalez investigated a LINDDUN extension that allows for a robust and systematically reproducible PTA (privacy threat analysis) of custom IA (identification and authentication) processes.…”
mentioning
confidence: 99%
“…Our guide scrutinizes the extension of the LINDDUN PTA framework [16] so that the auditor profit from the knowledge included by us and we also combine it with the decision support that we added. This second contribution is also in [26].…”
Section: Privacy Threat Analysis Of the Verification Process In The M...mentioning
confidence: 76%
“…We apply and discuss the extension of LINDDUN in a two-fold proof-of-concept (PoC) scenario, one with a password a second with smartcard authentication. This first contribution is in [26].…”
Section: Privacy Threat Analysis Of the Verification Process In The M...mentioning
confidence: 96%