메뉴 건너뛰기




Volumn , Issue , 2007, Pages 60-66

Towards a security metrics taxonomy for the information and communication technology industry

Author keywords

Information security; Security metrics; Taxonomy

Indexed keywords

BRIDGES; INDUSTRIAL MANAGEMENT; SECURITY OF DATA; SOFTWARE ENGINEERING; SURVEYS;

EID: 47849102178     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSEA.2007.79     Document Type: Conference Paper
Times cited : (48)

References (32)
  • 1
    • 77950331282 scopus 로고    scopus 로고
    • On Assurance, Measures, and Metrics: Definitions and Approaches. Proc. of Workshop on Information Security System Scoring and Ranking (WISSSR), ACSA and MITRE, Williamsburg, Virginia
    • May
    • J. I. Alger, On Assurance, Measures, and Metrics: Definitions and Approaches. Proc. of Workshop on Information Security System Scoring and Ranking (WISSSR), ACSA and MITRE, Williamsburg, Virginia, May, 2001, proceedings published 2002.
    • (2001) proceedings published
    • Alger, J.I.1
  • 2
    • 47849108314 scopus 로고    scopus 로고
    • ANSI/ISA-TR99.00.01-2004: Security Technologies for Manufacturing and Control Systems Standards. American National Standards Institute, Washington, D.C., 2004.
    • ANSI/ISA-TR99.00.01-2004: Security Technologies for Manufacturing and Control Systems Standards. American National Standards Institute, Washington, D.C., 2004.
  • 4
    • 0021518088 scopus 로고
    • A Methodology for Collecting Valid Software Engineering Data
    • November
    • V. R. Basili and D. M. Weiss, A Methodology for Collecting Valid Software Engineering Data. IEEE Transactions on Software Engineering, SE-10(6):728-738, November 1984.
    • (1984) IEEE Transactions on Software Engineering , vol.SE-10 , Issue.6 , pp. 728-738
    • Basili, V.R.1    Weiss, D.M.2
  • 5
    • 33747205462 scopus 로고    scopus 로고
    • On the Brittleness of Software and the Infeasibility of Security Metrics
    • Jul/Aug, p
    • S. M. Bellovin, On the Brittleness of Software and the Infeasibility of Security Metrics. IEEE Security & Privacy, Jul/Aug, p. 96, 2006
    • (2006) IEEE Security & Privacy , pp. 96
    • Bellovin, S.M.1
  • 6
    • 47849099639 scopus 로고    scopus 로고
    • SAMATE's Contribution to Information Assurance
    • P. E. Black, SAMATE's Contribution to Information Assurance. IAnewsletter, Vol. 9, No. 2, 2006.
    • (2006) IAnewsletter , vol.9 , Issue.2
    • Black, P.E.1
  • 7
    • 47849129010 scopus 로고    scopus 로고
    • P. Burris, C. King, C., A Few Good Security Metrics. METAGroup, Inc., Oct., 2000.
    • P. Burris, C. King, C., A Few Good Security Metrics. METAGroup, Inc., Oct., 2000.
  • 8
    • 47849100198 scopus 로고    scopus 로고
    • Canadian System Security Centre: The Canadian Trusted Computer Product Evaluation Criteria, Version 3.0e, January 1993, 233 p
    • Canadian System Security Centre: The Canadian Trusted Computer Product Evaluation Criteria, Version 3.0e, January 1993, 233 p.
  • 11
    • 47849132542 scopus 로고    scopus 로고
    • R. Henning et al., Proceedings of Workshop on Information Security System, Scoring and Ranking - Information System Security Attribute Quantification or Ordering (Commonly but improperly known as Security Metrics), ACSA and MITRE, Williamsburg, Virginia, May, 2001, proceedings published 2002.
    • R. Henning et al., Proceedings of Workshop on Information Security System, Scoring and Ranking - Information System Security Attribute Quantification or Ordering (Commonly but improperly known as "Security Metrics"), ACSA and MITRE, Williamsburg, Virginia, May, 2001, proceedings published 2002.
  • 12
    • 33745493480 scopus 로고    scopus 로고
    • SSE-CMM Security Metrics
    • Washington, D.C, June
    • G. Jelen, SSE-CMM Security Metrics. NIST and CSSPAB Workshop, Washington, D.C., June 2000.
    • (2000) NIST and CSSPAB Workshop
    • Jelen, G.1
  • 16
    • 47849107779 scopus 로고    scopus 로고
    • Information Technology Security Evaluation Criteria (ITSEC) Version 1.2, Commission for the European Communities, 1991
    • Information Technology Security Evaluation Criteria (ITSEC) Version 1.2, Commission for the European Communities, 1991.
  • 17
    • 0142034936 scopus 로고    scopus 로고
    • Software Engineering - Product Quality - Part 1: Quality Model. International Organization of Standardization, 2001
    • ISO/IEC 9126-1
    • ISO/IEC 9126-1:2001. Software Engineering - Product Quality - Part 1: Quality Model. International Organization of Standardization, 2001.
    • (2001)
  • 18
    • 77957131675 scopus 로고    scopus 로고
    • Common Criteria for Information Technology Security Evaluation - Part 1: Introduction and General Model. International Organization of Standardization, 2005
    • ISO/IEC 15408-1
    • ISO/IEC 15408-1:2005. Common Criteria for Information Technology Security Evaluation - Part 1: Introduction and General Model. International Organization of Standardization, 2005.
    • (2005)
  • 19
    • 28044457328 scopus 로고    scopus 로고
    • Information Technology - Security Techniques Code of Practice for Information Security Management. International Organization of Standardization, 2005
    • ISO/IEC 17799
    • ISO/IEC 17799:2005. Information Technology - Security Techniques Code of Practice for Information Security Management. International Organization of Standardization, 2005.
    • (2005)
  • 20
    • 47849101954 scopus 로고    scopus 로고
    • E. B. Lennon Ed, August, National Institute of Standards and Technology
    • E. B. Lennon (Ed.), IT Security Metrics. ITL Bulletin, August 2003. National Institute of Standards and Technology, 2003.
    • (2003) IT Security Metrics. ITL Bulletin
  • 21
    • 47849117993 scopus 로고    scopus 로고
    • SANS Institute Information Security Reading Room, June
    • S. C Payne, A Guide to Security Metrics. SANS Institute Information Security Reading Room, June 2006.
    • (2006) A Guide to Security Metrics
    • Payne, S.C.1
  • 23
    • 84884728299 scopus 로고    scopus 로고
    • Process Approach to Information Security Metrics in Finnish Industry and State Institutions. VTT
    • Publications 544. 89 p, app. 2 p
    • A. Sademies, Process Approach to Information Security Metrics in Finnish Industry and State Institutions. VTT Publications 544. 89 p. + app. 2 p., 2004.
    • (2004)
    • Sademies, A.1
  • 26
    • 47849120122 scopus 로고    scopus 로고
    • Security Self-Assessment Guide for Information Technology Systems. National Institute of Standards and Technology Special Publication 800-26, Nov
    • M. Swanson, Security Self-Assessment Guide for Information Technology Systems. National Institute of Standards and Technology Special Publication 800-26, Nov., 2001.
    • (2001)
    • Swanson, M.1
  • 27
    • 47849119083 scopus 로고    scopus 로고
    • M. Swanson, N. Bartol, J. Sabato, J. Hash, L. Graffo, Security Metrics Guide for Information Technology Systems. National Institute of Standards and Technology Special Publication 800-55, Jul., 2003.
    • M. Swanson, N. Bartol, J. Sabato, J. Hash, L. Graffo, Security Metrics Guide for Information Technology Systems. National Institute of Standards and Technology Special Publication 800-55, Jul., 2003.
  • 28
    • 47849117467 scopus 로고    scopus 로고
    • United States Department of Defense: Trusted Computer System Evaluation Criteria (TCSEC) Orange Book, DoD Standard, DoD 5200.28-std, 1985.
    • United States Department of Defense: Trusted Computer System Evaluation Criteria (TCSEC) "Orange Book", DoD Standard, DoD 5200.28-std, 1985.
  • 29
    • 47849107387 scopus 로고    scopus 로고
    • United States National Computer Security Center: Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria Version 1;NCSC-TG-005, 1987
    • United States National Computer Security Center: Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria Version 1;NCSC-TG-005, 1987.
  • 30
    • 47849090791 scopus 로고    scopus 로고
    • United States National Institute for Standards and Technology and National Security Agency, Federal Criteria for Information Technology Security, Draft Version 1.0, Jan. 1993, 2
    • United States National Institute for Standards and Technology and National Security Agency, Federal Criteria for Information Technology Security - Draft Version 1.0, Jan. 1993, 2 volumes.
  • 32
    • 47849119580 scopus 로고    scopus 로고
    • Security Metrology and the Monty Hall Problem. Proc. of Workshop on Information Security System Scoring and Ranking (WISSSR), ACSA and MITRE, Williamsburg, Virginia
    • May
    • B. S. Yee, Security Metrology and the Monty Hall Problem. Proc. of Workshop on Information Security System Scoring and Ranking (WISSSR), ACSA and MITRE, Williamsburg, Virginia, May, 2001, proceedings published 2002.
    • (2001) proceedings published
    • Yee, B.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.