-
1
-
-
77950331282
-
On Assurance, Measures, and Metrics: Definitions and Approaches. Proc. of Workshop on Information Security System Scoring and Ranking (WISSSR), ACSA and MITRE, Williamsburg, Virginia
-
May
-
J. I. Alger, On Assurance, Measures, and Metrics: Definitions and Approaches. Proc. of Workshop on Information Security System Scoring and Ranking (WISSSR), ACSA and MITRE, Williamsburg, Virginia, May, 2001, proceedings published 2002.
-
(2001)
proceedings published
-
-
Alger, J.I.1
-
2
-
-
47849108314
-
-
ANSI/ISA-TR99.00.01-2004: Security Technologies for Manufacturing and Control Systems Standards. American National Standards Institute, Washington, D.C., 2004.
-
ANSI/ISA-TR99.00.01-2004: Security Technologies for Manufacturing and Control Systems Standards. American National Standards Institute, Washington, D.C., 2004.
-
-
-
-
3
-
-
12344308304
-
Basic Concepts and Taxonomy of Dependable and Secure Computing
-
Jan/Mar
-
A. Avižienis, J.-C. Laprie, B. Randell and C. Landwehr, Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Trans. on Dependable and Secure Computing. Vol. 1, No. 1. Jan/Mar, 2004
-
(2004)
IEEE Trans. on Dependable and Secure Computing
, vol.1
, Issue.1
-
-
Avižienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
4
-
-
0021518088
-
A Methodology for Collecting Valid Software Engineering Data
-
November
-
V. R. Basili and D. M. Weiss, A Methodology for Collecting Valid Software Engineering Data. IEEE Transactions on Software Engineering, SE-10(6):728-738, November 1984.
-
(1984)
IEEE Transactions on Software Engineering
, vol.SE-10
, Issue.6
, pp. 728-738
-
-
Basili, V.R.1
Weiss, D.M.2
-
5
-
-
33747205462
-
On the Brittleness of Software and the Infeasibility of Security Metrics
-
Jul/Aug, p
-
S. M. Bellovin, On the Brittleness of Software and the Infeasibility of Security Metrics. IEEE Security & Privacy, Jul/Aug, p. 96, 2006
-
(2006)
IEEE Security & Privacy
, pp. 96
-
-
Bellovin, S.M.1
-
6
-
-
47849099639
-
SAMATE's Contribution to Information Assurance
-
P. E. Black, SAMATE's Contribution to Information Assurance. IAnewsletter, Vol. 9, No. 2, 2006.
-
(2006)
IAnewsletter
, vol.9
, Issue.2
-
-
Black, P.E.1
-
7
-
-
47849129010
-
-
P. Burris, C. King, C., A Few Good Security Metrics. METAGroup, Inc., Oct., 2000.
-
P. Burris, C. King, C., A Few Good Security Metrics. METAGroup, Inc., Oct., 2000.
-
-
-
-
8
-
-
47849100198
-
-
Canadian System Security Centre: The Canadian Trusted Computer Product Evaluation Criteria, Version 3.0e, January 1993, 233 p
-
Canadian System Security Centre: The Canadian Trusted Computer Product Evaluation Criteria, Version 3.0e, January 1993, 233 p.
-
-
-
-
9
-
-
38049172772
-
Experimental Evaluation of Network Security Through a Hierarchical Quantitative Metrics Model
-
Cambridge, MA
-
rd Int. Conf. Communication Network and Information Security (CNIS 2006), Cambridge, MA, 2006, pp. 156-164.
-
(2006)
rd Int. Conf. Communication Network and Information Security (CNIS
, pp. 156-164
-
-
El-Hassan, F.1
Matrawy, A.2
Seddigh, N.3
Nandy, B.4
-
11
-
-
47849132542
-
-
R. Henning et al., Proceedings of Workshop on Information Security System, Scoring and Ranking - Information System Security Attribute Quantification or Ordering (Commonly but improperly known as Security Metrics), ACSA and MITRE, Williamsburg, Virginia, May, 2001, proceedings published 2002.
-
R. Henning et al., Proceedings of Workshop on Information Security System, Scoring and Ranking - Information System Security Attribute Quantification or Ordering (Commonly but improperly known as "Security Metrics"), ACSA and MITRE, Williamsburg, Virginia, May, 2001, proceedings published 2002.
-
-
-
-
12
-
-
33745493480
-
SSE-CMM Security Metrics
-
Washington, D.C, June
-
G. Jelen, SSE-CMM Security Metrics. NIST and CSSPAB Workshop, Washington, D.C., June 2000.
-
(2000)
NIST and CSSPAB Workshop
-
-
Jelen, G.1
-
16
-
-
47849107779
-
-
Information Technology Security Evaluation Criteria (ITSEC) Version 1.2, Commission for the European Communities, 1991
-
Information Technology Security Evaluation Criteria (ITSEC) Version 1.2, Commission for the European Communities, 1991.
-
-
-
-
17
-
-
0142034936
-
Software Engineering - Product Quality - Part 1: Quality Model. International Organization of Standardization, 2001
-
ISO/IEC 9126-1
-
ISO/IEC 9126-1:2001. Software Engineering - Product Quality - Part 1: Quality Model. International Organization of Standardization, 2001.
-
(2001)
-
-
-
18
-
-
77957131675
-
Common Criteria for Information Technology Security Evaluation - Part 1: Introduction and General Model. International Organization of Standardization, 2005
-
ISO/IEC 15408-1
-
ISO/IEC 15408-1:2005. Common Criteria for Information Technology Security Evaluation - Part 1: Introduction and General Model. International Organization of Standardization, 2005.
-
(2005)
-
-
-
19
-
-
28044457328
-
Information Technology - Security Techniques Code of Practice for Information Security Management. International Organization of Standardization, 2005
-
ISO/IEC 17799
-
ISO/IEC 17799:2005. Information Technology - Security Techniques Code of Practice for Information Security Management. International Organization of Standardization, 2005.
-
(2005)
-
-
-
20
-
-
47849101954
-
-
E. B. Lennon Ed, August, National Institute of Standards and Technology
-
E. B. Lennon (Ed.), IT Security Metrics. ITL Bulletin, August 2003. National Institute of Standards and Technology, 2003.
-
(2003)
IT Security Metrics. ITL Bulletin
-
-
-
21
-
-
47849117993
-
-
SANS Institute Information Security Reading Room, June
-
S. C Payne, A Guide to Security Metrics. SANS Institute Information Security Reading Room, June 2006.
-
(2006)
A Guide to Security Metrics
-
-
Payne, S.C.1
-
22
-
-
47849107647
-
Guide for Assessing the Security Controls in Federal Information Systems
-
R. Ross, A. Johnson, S. Katzke, P. Toth, G. Rogers, Guide for Assessing the Security Controls in Federal Information Systems. National Institute of Standards and Technology Special Publication 800-53A, 2006.
-
(2006)
National Institute of Standards and Technology Special Publication 800-53A
-
-
Ross, R.1
Johnson, A.2
Katzke, S.3
Toth, P.4
Rogers, G.5
-
23
-
-
84884728299
-
Process Approach to Information Security Metrics in Finnish Industry and State Institutions. VTT
-
Publications 544. 89 p, app. 2 p
-
A. Sademies, Process Approach to Information Security Metrics in Finnish Industry and State Institutions. VTT Publications 544. 89 p. + app. 2 p., 2004.
-
(2004)
-
-
Sademies, A.1
-
24
-
-
33745435096
-
Current Trends and Advances in Information Assurance Metrics
-
Fredericton, NB, Oct
-
nd Annual Conference on Privacy, Security and Trust (PST 2004), Fredericton, NB, Oct., 2004.
-
(2004)
nd Annual Conference on Privacy, Security and Trust (PST
-
-
Seddigh, N.1
Pieda, P.2
Matrawy, A.3
Nandy, B.4
Lambadaris, I.5
Hatfield, A.6
-
26
-
-
47849120122
-
-
Security Self-Assessment Guide for Information Technology Systems. National Institute of Standards and Technology Special Publication 800-26, Nov
-
M. Swanson, Security Self-Assessment Guide for Information Technology Systems. National Institute of Standards and Technology Special Publication 800-26, Nov., 2001.
-
(2001)
-
-
Swanson, M.1
-
27
-
-
47849119083
-
-
M. Swanson, N. Bartol, J. Sabato, J. Hash, L. Graffo, Security Metrics Guide for Information Technology Systems. National Institute of Standards and Technology Special Publication 800-55, Jul., 2003.
-
M. Swanson, N. Bartol, J. Sabato, J. Hash, L. Graffo, Security Metrics Guide for Information Technology Systems. National Institute of Standards and Technology Special Publication 800-55, Jul., 2003.
-
-
-
-
28
-
-
47849117467
-
-
United States Department of Defense: Trusted Computer System Evaluation Criteria (TCSEC) Orange Book, DoD Standard, DoD 5200.28-std, 1985.
-
United States Department of Defense: Trusted Computer System Evaluation Criteria (TCSEC) "Orange Book", DoD Standard, DoD 5200.28-std, 1985.
-
-
-
-
29
-
-
47849107387
-
-
United States National Computer Security Center: Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria Version 1;NCSC-TG-005, 1987
-
United States National Computer Security Center: Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria Version 1;NCSC-TG-005, 1987.
-
-
-
-
30
-
-
47849090791
-
-
United States National Institute for Standards and Technology and National Security Agency, Federal Criteria for Information Technology Security, Draft Version 1.0, Jan. 1993, 2
-
United States National Institute for Standards and Technology and National Security Agency, Federal Criteria for Information Technology Security - Draft Version 1.0, Jan. 1993, 2 volumes.
-
-
-
-
32
-
-
47849119580
-
Security Metrology and the Monty Hall Problem. Proc. of Workshop on Information Security System Scoring and Ranking (WISSSR), ACSA and MITRE, Williamsburg, Virginia
-
May
-
B. S. Yee, Security Metrology and the Monty Hall Problem. Proc. of Workshop on Information Security System Scoring and Ranking (WISSSR), ACSA and MITRE, Williamsburg, Virginia, May, 2001, proceedings published 2002.
-
(2001)
proceedings published
-
-
Yee, B.S.1
|