{"title":"The Study on Resolutions of STRIDE Threat Model","authors":"Zhimin Yang, Zengguang Zhang","doi":"10.1109/ISITAE.2007.4409285","DOIUrl":null,"url":null,"abstract":"The database security is usually connected with the network security. This passage will discuss and study the resolution of threat model based on STRIDE. The B/S architecture is used to illustrate that what threat this architecture will be faced with. Aimed at the threats, the responding resolutions are also given to build more safe and credible system.","PeriodicalId":332503,"journal":{"name":"2007 First IEEE International Symposium on Information Technologies and Applications in Education","volume":"2019 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 First IEEE International Symposium on Information Technologies and Applications in Education","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISITAE.2007.4409285","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
The database security is usually connected with the network security. This passage will discuss and study the resolution of threat model based on STRIDE. The B/S architecture is used to illustrate that what threat this architecture will be faced with. Aimed at the threats, the responding resolutions are also given to build more safe and credible system.