Threat Trees

I've updated the use case dimensions provided by Thomas and made a first
stab at a threat tree.  I've primarily focused on site-impersonation attacks
because I believe they are the focus of this working group (happy to be
corrected).

The draft is at:

   <http://www.w3.org/2006/WSC/wiki/ThreatTrees>

This is in response to
  ACTION-95:     Review use cases, suggest reorganization, ...
  ACTION-124:    Initiate work on threat tree

Received on Monday, 12 March 2007 19:01:30 UTC