2011
DOI: 10.1007/978-3-642-12323-8
|View full text |Cite
|
Sign up to set email alerts
|

Model-Driven Risk Analysis

Abstract: The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Cover design: KünkelLopka GmbH, HeidelbergPrinted on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com) PrefaceExposure to risk is inescapable in most domains. People and families, enterprises, governments, priva… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
82
0
7

Year Published

2012
2012
2019
2019

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 208 publications
(89 citation statements)
references
References 26 publications
0
82
0
7
Order By: Relevance
“…CORAS is an established model-driven risk analysis approach based on the ISO 31000 standard on risk management [1,17]. It offers a customised language for threat and risk modelling and guidelines on how to use the language.…”
Section: Coras Evaluation Findingsmentioning
confidence: 99%
See 1 more Smart Citation
“…CORAS is an established model-driven risk analysis approach based on the ISO 31000 standard on risk management [1,17]. It offers a customised language for threat and risk modelling and guidelines on how to use the language.…”
Section: Coras Evaluation Findingsmentioning
confidence: 99%
“…The CORAS modelling language defines four kinds of diagrams (asset, threat, risk and treatment diagrams) as part of its model-based approach to support visualisation in all steps of the process. A detailed description of the CORAS steps can be found in [1] and [17,Chap. 3].…”
Section: Coras Evaluation Findingsmentioning
confidence: 99%
“…Assets and threats are represented as lifelines. Inspired by CORAS [12], we distinguish between three types of threats; deliberate threats (the leftmost lifeline in the Notation column), accidental threats (the center lifeline in the Notation column) and non-human threats (the rightmost lifeline in the Notation column). Manipulations and unwanted incidents are represented as messages.…”
Section: Inmentioning
confidence: 99%
“…In order to accomplish the risk identification in step 7B, we relied on a threat modeling approach, particularly the Coras approach [11] due to its flexibility to be used in service environments. We also hinge on the context's essential elements and the relevant security requirements to identify the risks, which consist of threat scenarios, threats, vulnerabilities and unwanted incidents.…”
Section: Phase 2: Risk Managementmentioning
confidence: 99%