{"title":"STRIDE威胁模型的求解方法研究","authors":"Zhimin Yang, Zengguang Zhang","doi":"10.1109/ISITAE.2007.4409285","DOIUrl":null,"url":null,"abstract":"The database security is usually connected with the network security. This passage will discuss and study the resolution of threat model based on STRIDE. The B/S architecture is used to illustrate that what threat this architecture will be faced with. Aimed at the threats, the responding resolutions are also given to build more safe and credible system.","PeriodicalId":332503,"journal":{"name":"2007 First IEEE International Symposium on Information Technologies and Applications in Education","volume":"2019 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"The Study on Resolutions of STRIDE Threat Model\",\"authors\":\"Zhimin Yang, Zengguang Zhang\",\"doi\":\"10.1109/ISITAE.2007.4409285\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The database security is usually connected with the network security. This passage will discuss and study the resolution of threat model based on STRIDE. The B/S architecture is used to illustrate that what threat this architecture will be faced with. Aimed at the threats, the responding resolutions are also given to build more safe and credible system.\",\"PeriodicalId\":332503,\"journal\":{\"name\":\"2007 First IEEE International Symposium on Information Technologies and Applications in Education\",\"volume\":\"2019 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-12-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 First IEEE International Symposium on Information Technologies and Applications in Education\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISITAE.2007.4409285\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 First IEEE International Symposium on Information Technologies and Applications in Education","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISITAE.2007.4409285","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The database security is usually connected with the network security. This passage will discuss and study the resolution of threat model based on STRIDE. The B/S architecture is used to illustrate that what threat this architecture will be faced with. Aimed at the threats, the responding resolutions are also given to build more safe and credible system.