References
- National Institutes of Standards and Technology, "NIST Cloud Computing Standards Roadmap," Jul. 2013.
- Cloud Security Alliance, "Defined Categories of Security as a Service," 2016.
- Seung-Wan Son, Kwang-Seok Kim, Jung-Won Choi, and Gang-Soo Le, "Development of Managing Security Services System Protection Profile," Journal of Digital Contents Society, Vol.16 No.2, pp.345-353, 2015. https://doi.org/10.9728/dcs.2015.16.2.345
- Hye-Won KIM, Ho-Jun Yu, and Jae-Woo Lee, "Research on technical security threats of email cloud security service (E-mail SecaaS) Focusing on threat modeling techniques," Korea Institute of Information Security And Cryptology, pp.57-64(8). 2017.
- Jisoo Park and Seungjoo Kim, "Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria," Korea Information Processing Society, Vol.6, No.3 121-123. 2017.
- Korea Internet & Security Agency, "Casebook of Cloud Security Support Project," 2019.
- Jang Hwan, "Cloud SOC's forensic compliance reflects the shared responsibility model". Proc. Conference on Information Security and Cryptography, pp.41-44, 2020.
- Malik Nadeem Anwar, Mohammed Nazir, Adeeb, and Mansoor Ansari, "Modeling Security Threats for Smart Cities: A STRIDE-Based Approach," Proc. Smart Cities-Opportunities and Challenges, pp.387-396, 2020.
- In-Kyung Oh, Jae-Wan Seo, Min-Kyu Lee, Tae-Hoon Lee, Yu-Na Han, Ui-Seong Park, Han-Byeol Ji, Jong-Ho Lee, Kyu-Hyung Cho, and Kyounggon Kim, "Derivation of Security Requirements of Smart TV Based on STRIDE Threat Modeling," Journal of The Korea Institute of Information Security & Cryptology, Vol.30, No.2, pp.213-230, 2020. https://doi.org/10.13089/JKIISC.2020.30.2.213
- Eun-ju Park, Seung-joo Kim, "Derivation of Security Requirements of Smart Factory Based on STRIDE Threat Modeling," Journal of The Korea Institute of Information Security & Cryptology, Vol.27, No.6, pp.1467-1482, Dec. 2017. https://doi.org/10.13089/JKIISC.2017.27.6.1467
- Soo-young Kang and Seung-joo Kim, "Analysis of Security Requirements for Secure Update of IVI(In-Vehicle-Infotainment) Using Threat Modeling and Common Criteria," Journal of The Korea Institute of Information Security & Cryptology, Vol.29, No.3, pp.613-628, Jun. 2019. https://doi.org/10.13089/JKIISC.2019.29.3.613
- Jae-Ki Kim, Jeong-Hoon Shin, and Seung-Joo Kim, "Study on the Femtocell Vulnerability Analysis Using Threat Modeling," KIPS Transactions on Computer and Communication Systems, Vol.5, No.8 pp.197-210, Aug. 2016. https://doi.org/10.3745/KTCCS.2016.5.8.197
- Ye-Seul Cha and Seung-joo Kim, "A Study on Security Requirements of Electric Vehicle Charging Infrastructure Using Threat Modeling," Journal of The Korea Institute of Information Security & Cryptology, Vol.27, No.6, pp.1441-1455, Dec. 2017. https://doi.org/10.13089/JKIISC.2017.27.6.1441
- Hong Paul, Lee Sangmin, Park Minsu, and Kim Seungjoo, "Threat-Based Security Analysis for the Domestic Smart Home Appliance," KIPS Transactions on Computer and Communication Systems, Vol.6, No.3, pp.143-158, Mar. 2017. https://doi.org/10.3745/KTCCS.2017.6.3.143
- Tong Xin and Ban Xiaofang, "Online Banking Security Analysis based on STRIDE Threat Model," International Journal of Security and Its Applications, Vol.8, No.2, pp.271-282, 2014. https://doi.org/10.14257/ijsia.2014.8.2.28
- Seung-young Ma, Jung-ho Ju, and Jong-sub Moon, "The security requirements suggestion based on cloud computing security threats for server virtualization system," Journal of The Korea Institute of Information Security & Cryptology, Vol.25, No.1, pp.95-105, Feb. 2015. https://doi.org/10.13089/JKIISC.2015.25.1.95
- James Sanfilippo, Tamirat Abegaz, Bryson Payne, and Abi Salimi, "STRIDE-Based Threat Modeling for MySQL Databases," Proceedings of the Future Technologies Conference, pp.368-378, 2019.
- Jeong-Seok Jo and Jin Kwak, "STRIDE and HARM Based Cloud Network Vulnerability Detection Scheme," Journal of The Korea Institute of Information Security & Cryptology, VOL.29, NO.3, pp.599-612, Jun. 2019. https://doi.org/10.13089/JKIISC.2019.29.3.599
- The Open Web Application Security Project, "OWASP Top Ten Web Application Security Risks | OWASP" [Internet], https://owasp.org/www-project-top-ten.
- Telecommunications Technology Association, "TTA Inf ormation and Communication Glossary" [Internet], https://terms.tta.or.kr/main.do.