-
1
-
-
77950331282
-
On assurance, measures, and metrics: Definitions and approaches
-
ACSAC
-
J. I. Alger, "On assurance, measures, and metrics: Definitions and approaches," in Proceedings of the 1st ISSRR Workshop, ACSAC, 2001.
-
(2001)
Proceedings of the 1st ISSRR Workshop
-
-
Alger, J.I.1
-
2
-
-
84878731710
-
Security assertions, criteria, and metrics: Developed for the IRS
-
ACSAC
-
P. Bicknell, "Security assertions, criteria, and metrics: Developed for the IRS," in Proceedings of the 1st ISSRR Workshop, ACSAC.
-
Proceedings of the 1st ISSRR Workshop
-
-
Bicknell, P.1
-
3
-
-
33745435096
-
Current trends and advances in information assurance metrics
-
Privacy, Security, and Trust
-
N. Seddigh, P. Pieda, A. Matrawy, B. Nandy, J. Lambadaris, and A. Hatfield, "Current trends and advances in information assurance metrics," in Proceedings of the Second Annual Conference on Privacy, Security and Trust, pp. 197-204, Privacy, Security, and Trust. 2004.
-
(2004)
Proceedings of the Second Annual Conference on Privacy, Security and Trust
, pp. 197-204
-
-
Seddigh, N.1
Pieda, P.2
Matrawy, A.3
Nandy, B.4
Lambadaris, J.5
Hatfield, A.6
-
5
-
-
33745440857
-
Security metrology and the monty hall problem
-
ACSAC, April
-
B. S. Yee, "Security metrology and the monty hall problem," in Proceedings of the 1st ISSRR Workshop, ACSAC, April 2001.
-
(2001)
Proceedings of the 1st ISSRR Workshop
-
-
Yee, B.S.1
-
6
-
-
33745458331
-
Quantitative measures of assurance: Prophecy, process, or pipedream?
-
ACS AC, May
-
J. McHugh, "Quantitative measures of assurance: Prophecy, process, or pipedream?," in Proceedings of the 1st ISSRR Workshop, ACS AC, May 2001.
-
(2001)
Proceedings of the 1st ISSRR Workshop
-
-
McHugh, J.1
-
7
-
-
33745439613
-
Are measures and metrics for trusted information systems possible?
-
ACSAC, May
-
R. B. Vaughn, "Are measures and metrics for trusted information systems possible?," in Proceedings of the 1st ISSRR Workshop, ACSAC, May 2001.
-
(2001)
Proceedings of the 1st ISSRR Workshop
-
-
Vaughn, R.B.1
-
8
-
-
4243150787
-
Analyzing security costs
-
June
-
R. T. Mercuri, "Analyzing security costs," Communications of the ACM, vol. 46, pp. 15-18, June 2003.
-
(2003)
Communications of the ACM
, vol.46
, pp. 15-18
-
-
Mercuri, R.T.1
-
9
-
-
33745457297
-
Information assurance assessment: Lessons-learned and challenges
-
ACSAC, May
-
D. J. Bodeau, "Information assurance assessment: Lessons-learned and challenges," in Proceedings of the 1st ISSRR Workshop, ACSAC, May 2001.
-
(2001)
Proceedings of the 1st ISSRR Workshop
-
-
Bodeau, D.J.1
-
10
-
-
15944391638
-
Measuring IT security - A method based on common criteria's security functional requirements
-
IEEE
-
A. Hunstad, J. Halberg, and R. Andersson, "Measuring IT security - a method based on common criteria's security functional requirements," in Proceedings from the fifth IEEE Systems. Man and Cybernetics Information Assurance Workshop, IEEE, IEEE, 2004.
-
(2004)
Proceedings from the Fifth IEEE Systems. Man and Cybernetics Information Assurance Workshop, IEEE
-
-
Hunstad, A.1
Halberg, J.2
Andersson, R.3
-
12
-
-
33745470373
-
The case against numerical measures for information assurance
-
ACSAC, May
-
D. McCallam. "The case against numerical measures for information assurance," in Proceedings of the 1st ISSRR Workshop, ACSAC, May 2001.
-
(2001)
Proceedings of the 1st ISSRR Workshop
-
-
McCallam, D.1
-
14
-
-
33745457070
-
-
Nessus. http://www.nessus.org.
-
-
-
-
15
-
-
33745466469
-
Visionael security audit
-
Visionael Corporation
-
"Visionael security audit," tech. rep., Visionael Corporation. http://www.visionael.com/.
-
Tech. Rep.
-
-
-
16
-
-
12244283592
-
-
National Institute for Standards Publication 800-55, July
-
M. Swanson, N. Bartol, J. Sabato, J. Hash, and L. Graffo, "Security metrics guide for information technology systems." National Institute for Standards Publication 800-55, July 2003.
-
(2003)
Security Metrics Guide for Information Technology Systems
-
-
Swanson, M.1
Bartol, N.2
Sabato, J.3
Hash, J.4
Graffo, L.5
-
17
-
-
33745477774
-
Infosec assessment methodology
-
National Security Agency
-
"Infosec assessment methodology," tech. rep., National Security Agency. http://www.iatrp.com/iam.cfm.
-
Tech. Rep.
-
-
|