Threat modeling: Designing for security A Shostack John Wiley & Sons, 2014 | 1108 | 2014 |
Computer security A Shostack, D Allouch US Patent 6,298,445, 2001 | 666 | 2001 |
Threat modeling-uncover security design flaws using the stride approach S Hernan, S Lambert, T Ostwald, A Shostack MSDN Magazine-Louisville, 68-75, 2006 | 349 | 2006 |
Experiences Threat Modeling at Microsoft. A Shostack MODSEC@ MoDELS 2008, 35, 2008 | 256 | 2008 |
Timing the Application of Security Patches for Optimal Uptime. S Beattie, S Arnold, C Cowan, P Wagle, C Wright, A Shostack LISA 2, 233-242, 2002 | 240 | 2002 |
Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education T Denning, A Lerner, A Shostack, T Kohno Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 156 | 2013 |
Privacy engineering for digital rights management systems J Feigenbaum, MJ Freedman, T Sander, A Shostack Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM …, 2002 | 143 | 2002 |
Breaking up is hard to do: modeling security threats for smart cards B Schneier, A Shostack USENIX Symposium on Smart Cards, 1999 | 137 | 1999 |
Freedom 2.1 security issues and analysis A Back, I Goldberg, A Shostack White Paper, http://www. freedom. net/info/whitepapers/Freedom_Security2-l. pdf, 2001 | 107 | 2001 |
Freedom systems 2.0 architecture P Boucher, A Shostack, I Goldberg | 103 | 2000 |
The new school of information security A Shostack, A Stewart Pearson Education, 2008 | 88 | 2008 |
Freedom systems 2.0 architecture. White paper, Zero Knowledge Systems P Boucher, A Shostack, I Goldberg Inc., December, 2000 | 86 | 2000 |
Elevation of privilege: Drawing developers into threat modeling A Shostack 2014 {USENIX} Summit on Gaming, Games, and Gamification in Security …, 2014 | 67 | 2014 |
Trust, ethics, and privacy I Goldberg, A Hill, A Shostack BUL Rev. 81, 407, 2001 | 61 | 2001 |
Freedom network 1.0 architecture and protocols I Goldberg, A Shostack Zero-Knowledge Systems White Paper, 1999 | 56 | 1999 |
What Price Privacy? and why identity theft is about neither identity nor theft A Shostack, P Syverson Economics of Information Security, 129-142, 2004 | 46 | 2004 |
Quantifying patch management A Shostack Secure Business Quarterly 3 (2), 1-4, 2003 | 26 | 2003 |
Freedom network 1.0 architecture I Goldberg, A Shostack November, 1999 | 26 | 1999 |
Economic barriers to the deployment of existing privacy technologies (position paper) J Feigenbaum, M Freedman, T Sander, A Shostack Proceedings of the Workshop on Economics of Information Security, 2002 | 25 | 2002 |
Identifying application program threats through structural analysis I Medvedev, A Shostack, LW Osterman US Patent App. 12/146,581, 2009 | 17 | 2009 |