메뉴 건너뛰기




Volumn , Issue , 2008, Pages 412-419

On system security metrics and the definition approaches

Author keywords

[No Author keywords available]

Indexed keywords

IS SECURITIES; SECURITY METRIC; SYSTEM SECURITIES;

EID: 55849106311     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECURWARE.2008.37     Document Type: Conference Paper
Times cited : (14)

References (15)
  • 3
    • 55849084512 scopus 로고    scopus 로고
    • WISSRR Workshop Proceedings, Security System Scoring and Ranking, ACSA, May 2001.
    • WISSRR Workshop Proceedings, "Security System Scoring and Ranking", ACSA, May 2001.
  • 4
    • 84964465779 scopus 로고    scopus 로고
    • Information Assurance through Kolmogorov Complexity
    • Anaheim, California
    • Scott Evans, Stephen F. Bush, and John Hershey, "Information Assurance through Kolmogorov Complexity", DISCEX-II 2001, June 2001, Anaheim, California.
    • (2001) DISCEX-II 2001, June
    • Evans, S.1    Bush, S.F.2    Hershey, J.3
  • 5
    • 55849143498 scopus 로고    scopus 로고
    • NIST 800-26, Swanson M., Security Metrics Guide for Information Technology Systems, National Institute of Standards and Technology Special Publication #800-26. Novembre 2001.
    • NIST 800-26, Swanson M., "Security Metrics Guide for Information Technology Systems", National Institute of Standards and Technology Special Publication #800-26. Novembre 2001.
  • 6
    • 55849115482 scopus 로고    scopus 로고
    • NIST 800-55, Swanson M., Nadya B., Sabato J., Hash J., Graffo L., Security Metrics Guide for Information Technology Systems, National Institute of Standards and Technology Special Publication #800-26, 2003.
    • NIST 800-55, Swanson M., Nadya B., Sabato J., Hash J., Graffo L., "Security Metrics Guide for Information Technology Systems", National Institute of Standards and Technology Special Publication #800-26, 2003.
  • 9
    • 55849137855 scopus 로고    scopus 로고
    • Kotenko I., Stepashkin M., Security metrics for judging the security level of computer networks on the base of attack graph construction, in Russian, original title: , INSIDE, N°3, 2006.
    • Kotenko I., Stepashkin M., "Security metrics for judging the security level of computer networks on the base of attack graph construction", in Russian, original title: "", INSIDE, N°3, 2006.
  • 11
    • 33845957375 scopus 로고    scopus 로고
    • Service oriented modeling of communication infrastructure for assurance
    • A. Zuccato, B. Marquet, S. Papillon, M. Alden, "Service oriented modeling of communication infrastructure for assurance", IEEE IA Workshop, 2006.
    • (2006) IEEE IA Workshop
    • Zuccato, A.1    Marquet, B.2    Papillon, S.3    Alden, M.4
  • 12
    • 55849147225 scopus 로고    scopus 로고
    • P. Mell, K. Scarfone, S. Romanosky, A Complete Guide to the Common Vulnerability Scoring System Version 2.0, FIRST, http://www.first.org/ cvss/.
    • P. Mell, K. Scarfone, S. Romanosky, "A Complete Guide to the Common Vulnerability Scoring System Version 2.0", FIRST, http://www.first.org/ cvss/.
  • 15
    • 33747205462 scopus 로고    scopus 로고
    • On the brittleness of software and the infeasibility of security metrics
    • Stephen Bellovin, "On the brittleness of software and the infeasibility of security metrics", IEEE Security and Privacy, 2006.
    • (2006) IEEE Security and Privacy
    • Bellovin, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.