Threat modeling: Designing for security A Shostack John Wiley & Sons, 2014 | 1333 | 2014 |
Computer security A Shostack, D Allouch US Patent 6,298,445, 2001 | 682 | 2001 |
Threat modeling-uncover security design flaws using the stride approach S Hernan, S Lambert, T Ostwald, A Shostack MSDN Magazine-Louisville, 68-75, 2006 | 378 | 2006 |
Experiences Threat Modeling at Microsoft. A Shostack MODSEC@ MoDELS 2008, 35, 2008 | 297 | 2008 |
Timing the Application of Security Patches for Optimal Uptime. S Beattie, S Arnold, C Cowan, P Wagle, C Wright, A Shostack LISA 2, 233-242, 2002 | 246 | 2002 |
Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education T Denning, A Lerner, A Shostack, T Kohno Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 195 | 2013 |
Privacy engineering for digital rights management systems J Feigenbaum, MJ Freedman, T Sander, A Shostack ACM Workshop on Digital Rights Management, 76-105, 2001 | 147 | 2001 |
Breaking up is hard to do: modeling security threats for smart cards B Schneier, A Shostack USENIX Workshop on Smart Card Technology, Chicago, Illinois, USA, http://www …, 1999 | 142 | 1999 |
Freedom network 1.0 architecture and protocols I Goldberg, A Shostack Zero-Knowledge Systems White Paper, 1999 | 122 | 1999 |
Freedom systems 2.0 architecture P Boucher, A Shostack, I Goldberg | 104 | 2000 |
Freedom 2.1 security issues and analysis A Back, I Goldberg, A Shostack White Paper, http://www. freedom. net/info/whitepapers/Freedom_Security2-l. pdf, 2001 | 103 | 2001 |
The new school of information security A Shostack, A Stewart Pearson Education, 2008 | 94 | 2008 |
Freedom systems 2.0 architecture. White paper, Zero Knowledge Systems P Boucher, A Shostack, I Goldberg Inc., December, 2000 | 86 | 2000 |
Elevation of privilege: Drawing developers into threat modeling A Shostack 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014 | 73 | 2014 |
Trust, ethics, and privacy I Goldberg, A Hill, A Shostack BUL Rev. 81, 407, 2001 | 64 | 2001 |
What Price Privacy? and why identity theft is about neither identity nor theft A Shostack, P Syverson Economics of Information Security, 129-142, 2004 | 50 | 2004 |
Quantifying patch management A Shostack Secure Business Quarterly 3 (2), 1-4, 2003 | 28 | 2003 |
Freedom network 1.0 architecture I Goldberg, A Shostack November, 1999 | 27 | 1999 |
Economic barriers to the deployment of existing privacy technologies (position paper) J Feigenbaum, M Freedman, T Sander, A Shostack Proceedings of the Workshop on Economics of Information Security, 2002 | 24 | 2002 |
Paying for privacy: Consumers and infrastructures A Shostack 2nd Annual Workshop on Economics and Information Security-WEIS 3, 2003 | 19 | 2003 |