-
1
-
-
33750536792
-
Computer security is not a science
-
Landsdowne, VA
-
Greenwald, M., Gunter, C., Knutsson, B., Scedrov, A., Smith, J., & Zdancewic, S. (2003), Computer security is not a science, Large-Scale Network Security Workshop, Landsdowne, VA.
-
(2003)
Large-scale Network Security Workshop
-
-
Greenwald, M.1
Gunter, C.2
Knutsson, B.3
Scedrov, A.4
Smith, J.5
Zdancewic, S.6
-
3
-
-
15944391638
-
Measuring IT security - A method based on common criteria's security functional requirements
-
West Point, NY, June
-
Hunstad, A., Hallberg, J. & Andersson, R., Measuring IT security - a Method Based on Common Criteria's Security Functional Requirements, Proceedings of the 5th IEEE Workshop on Information Assurance. West Point, NY, June 2004.
-
(2004)
Proceedings of the 5th IEEE Workshop on Information Assurance
-
-
Hunstad, A.1
Hallberg, J.2
Andersson, R.3
-
4
-
-
33745478535
-
-
FOI-R-1468-SE, Linköping, Sweden
-
Hallberg, J., Hunstad, A., Bond, A., Peterson, M., Påhlsson, N., (2004). System IT Security Assessment, FOI-R-1468-SE, Linköping, Sweden.
-
(2004)
System IT Security Assessment
-
-
Hallberg, J.1
Hunstad, A.2
Bond, A.3
Peterson, M.4
Påhlsson, N.5
-
6
-
-
15944362322
-
Design for securability - Applying engineering principles to the design of security architectures
-
Boston, Nov. 6-8, 2002. Linköping, FOI 2002, (FOI-S-0721-SE)
-
Hunstad, A. & Hallberg, J. (2002). Design for securability - Applying engineering principles to the design of security architectures. ACSA workshop on the application of engineering principles to system security design. Boston, Nov. 6-8, 2002. Linköping, FOI 2002, 8 p. (FOI-S-0721-SE)
-
(2002)
ACSA Workshop on the Application of Engineering Principles to System Security Design
-
-
Hunstad, A.1
Hallberg, J.2
-
7
-
-
33745446322
-
-
WWW page (visited 2005-03-10)
-
Secmet (2004). Security metrics consortium. WWW page (visited 2005-03-10). http://www.secmet.org/
-
(2004)
Security Metrics Consortium
-
-
-
8
-
-
0035198176
-
Quality metrics for intranet applications
-
Leung, H. (2001). Quality metrics for intranet applications. Information & Management 38 (2001). Pages 137-152.
-
(2001)
Information & Management
, vol.38
, Issue.2001
, pp. 137-152
-
-
Leung, H.1
-
9
-
-
84969544889
-
Information assurance measures and metrics - State of practice and proposed taxonomy
-
Waikoloa, Hawaii, January 6-9, 2003
-
Vaughn, R., Henning, R., & Siraj, A. (2003). Information Assurance Measures and Metrics - State of Practice and Proposed Taxonomy. Proceedings of the Hawaii International Conference on System Sciences, Waikoloa, Hawaii, January 6-9, 2003.
-
(2003)
Proceedings of the Hawaii International Conference on System Sciences
-
-
Vaughn, R.1
Henning, R.2
Siraj, A.3
-
12
-
-
12244283592
-
-
NIST Special Publication 800-55, NIST, July 2003
-
Swanson, M., Bartol, N., Sabato, J., & Hash, J. (2003). Security metrics guide for information technology systems. NIST Special Publication 800-55, NIST, July 2003. http://csrc.nist.gov/publications/nistpubs/800-55/ sp800-55.pdf
-
(2003)
Security Metrics Guide for Information Technology Systems
-
-
Swanson, M.1
Bartol, N.2
Sabato, J.3
Hash, J.4
-
14
-
-
15944397932
-
Qualitative and quantitative analytical techniques for network security assessment
-
West Point, NY, June 2004
-
Clark, K., Tyree, S., Dawkins, J., & Hale, J. (2004). Qualitative and Quantitative Analytical Techniques for Network Security Assessment, Proceedings of the 5th IEEE Workshop on Information Assurance. West Point, NY, June 2004.
-
(2004)
Proceedings of the 5th IEEE Workshop on Information Assurance
-
-
Clark, K.1
Tyree, S.2
Dawkins, J.3
Hale, J.4
-
15
-
-
33745450569
-
-
FOI-R - 0712-SE, FOI, Linköping, Sweden
-
Hunstad, A. &. Hallberg, J. (2002), Modeling of Distributed Systems Focusing on IT Security Aspects, FOI-R - 0712-SE, FOI, Linköping, Sweden.
-
(2002)
Modeling of Distributed Systems Focusing on IT Security Aspects
-
-
Hunstad, A.1
Hallberg, J.2
-
16
-
-
15944405288
-
Analyzing the security and survivability of real-time control systems
-
West Point, NY, June 2004
-
Oman, P., Krings, A., Conte de Leon, D., & Alves-Foss, J. (2004). Analyzing the Security and Survivability of Real-time Control Systems. Proceedings of the 5th IEEE Workshop on Information Assurance. West Point, NY, June 2004.
-
(2004)
Proceedings of the 5th IEEE Workshop on Information Assurance
-
-
Oman, P.1
Krings, A.2
Conte De Leon, D.3
Alves-Foss, J.4
-
17
-
-
0011119081
-
Active security - A proactive approach for computer security systems
-
April 2000
-
Eschelbeck, G. (2000). Active Security - A proactive approach for computer security systems. Journal of Network and Computer Applications, Vol. 23, No.2, April 2000, pp. 109-130.
-
(2000)
Journal of Network and Computer Applications
, vol.23
, Issue.2
, pp. 109-130
-
-
Eschelbeck, G.1
-
18
-
-
0035004828
-
A systematic approach for analysis and design of secure health information systems
-
June 2001
-
Blobel, B. & Roger-France, F. (2001), A systematic approach for analysis and design of secure health information systems, International Journal of Medical Informatics, Vol. 62, Issue 1, pp. 51-78, June 2001.
-
(2001)
International Journal of Medical Informatics
, vol.62
, Issue.1
, pp. 51-78
-
-
Blobel, B.1
Roger-France, F.2
-
19
-
-
0034816038
-
A method for designing secure solutions
-
Armonk 2001
-
Whitmore, J.J (2001). A method for designing secure solutions. IBM Systems Journal, Armonk 2001, Vol. 40, Issue 3.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
-
-
Whitmore, J.J.1
|