Threat modeling approaches and tools for securing architectural designs of an e-banking application

Caroline Möckel*, Ali E. Abdallah

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    24 Citations (Scopus)
    Original languageEnglish
    Title of host publication2010 6th International Conference on Information Assurance and Security, IAS 2010
    Pages149-154
    Number of pages6
    DOIs
    Publication statusPublished (VoR) - 2010
    Event2010 6th International Conference on Information Assurance and Security, IAS 2010 - Atlanta, GA, United States
    Duration: 23 Aug 201025 Aug 2010

    Publication series

    Name2010 6th International Conference on Information Assurance and Security, IAS 2010

    Conference

    Conference2010 6th International Conference on Information Assurance and Security, IAS 2010
    Country/TerritoryUnited States
    CityAtlanta, GA
    Period23/08/1025/08/10

    Keywords

    • Data flow diagrams
    • Internet banking (key words)
    • Security design
    • Threat modeling
    • Threat modeling tools

    Fingerprint

    Dive into the research topics of 'Threat modeling approaches and tools for securing architectural designs of an e-banking application'. Together they form a unique fingerprint.

    Cite this