-
1
-
-
70349248827
-
-
CVE - Common Vulnerabilities and Exposures. http://cve.mitre.org/. accessed at 2008-05-27.
-
CVE - Common Vulnerabilities and Exposures. http://cve.mitre.org/. accessed at 2008-05-27.
-
-
-
-
2
-
-
70349233295
-
Analysing Risk-Countermeasure in Organizations: A Quantitative Approach
-
Technical Report DIT-07-047, DIT, University of Trento, July
-
Y. Asnar and P. Giorgini. Analysing Risk-Countermeasure in Organizations: a Quantitative Approach. Technical Report DIT-07-047, DIT - University of Trento, July 2007.
-
(2007)
-
-
Asnar, Y.1
Giorgini, P.2
-
3
-
-
34548171255
-
From Trust to Dependability through Risk Analysis
-
IEEE Press
-
Y. Asnar, P. Giorgini, F. Massacci, and N. Zannone. From Trust to Dependability through Risk Analysis. In Proceedings of the Second International Conference on Availability, Reliability and Security. IEEE Press, 2007.
-
(2007)
Proceedings of the Second International Conference on Availability, Reliability and Security
-
-
Asnar, Y.1
Giorgini, P.2
Massacci, F.3
Zannone, N.4
-
8
-
-
0003038679
-
Exposition of a New Theory on the Measurement of Risk
-
original 1738
-
D. Bernoulli. Exposition of a New Theory on the Measurement of Risk. Econometrica, 22:23-36, 1954. (original 1738).
-
(1954)
Econometrica
, vol.22
, pp. 23-36
-
-
Bernoulli, D.1
-
9
-
-
0000694646
-
Perceived risk and its components: A model and empirical test
-
J. R. Bettman. Perceived risk and its components: A model and empirical test. Journal of Marketing Research, 10:184-190, 1973.
-
(1973)
Journal of Marketing Research
, vol.10
, pp. 184-190
-
-
Bettman, J.R.1
-
10
-
-
70349230283
-
-
CERT. Cert statistics. http://www.cert.org/stats/. accessed at 2008-05-27.
-
CERT. Cert statistics. http://www.cert.org/stats/. accessed at 2008-05-27.
-
-
-
-
11
-
-
16844361812
-
-
COSO, Committee of Sponsoring Organizations of the Treadway Commission, September
-
COSO. Enterprise Risk Management - Integrated Framework. Committee of Sponsoring Organizations of the Treadway Commission, September 2004.
-
(2004)
Enterprise Risk Management - Integrated Framework
-
-
-
12
-
-
70349256711
-
-
F. den Braber, T. Dimitrakos, B. A. Gran, M. S. Lund, K. Stølen, and J. Ø. Aagedal. The CORAS Methodology: Model-Based Risk Assessment using UML and UP. In UML and the Unified Process, pages 332-357. Idea Group Publishing, 2003.
-
F. den Braber, T. Dimitrakos, B. A. Gran, M. S. Lund, K. Stølen, and J. Ø. Aagedal. The CORAS Methodology: Model-Based Risk Assessment using UML and UP. In UML and the Unified Process, pages 332-357. Idea Group Publishing, 2003.
-
-
-
-
13
-
-
70349236405
-
-
DoD. Military Standard, Procedures for Performing a Failure Mode, Effects, and Critical Analysis. MIL-STD-1629A, 1980.
-
DoD. Military Standard, Procedures for Performing a Failure Mode, Effects, and Critical Analysis. MIL-STD-1629A, 1980.
-
-
-
-
14
-
-
16244392439
-
Towards a Unified Approach to the Representation of, and Reasoning with, Probabilistic Risk Information about Software and its System Interface
-
IEEE Computer Society Press, November
-
M. S. Feather. Towards a Unified Approach to the Representation of, and Reasoning with, Probabilistic Risk Information about Software and its System Interface. In Proceedings of the 15th IEEE International Symposium on Software Software Reliability Engineering, pages 391-402. IEEE Computer Society Press, November 2004.
-
(2004)
Proceedings of the 15th IEEE International Symposium on Software Software Reliability Engineering
, pp. 391-402
-
-
Feather, M.S.1
-
15
-
-
0347380853
-
Risk Management is Still Where the Money is
-
D. Geer. Risk Management is Still Where the Money is. Computer, 36:129-131, 2003.
-
(2003)
Computer
, vol.36
, pp. 129-131
-
-
Geer, D.1
-
16
-
-
27644537252
-
Modeling Security Requirements Through Ownership, Permission and Delegation
-
IEEE Computer Society Press
-
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone. Modeling Security Requirements Through Ownership, Permission and Delegation. In Proceedings of the 13th IEEE International Requirements Engineering Conference, pages 167-176. IEEE Computer Society Press, 2005.
-
(2005)
Proceedings of the 13th IEEE International Requirements Engineering Conference
, pp. 167-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
17
-
-
70349241039
-
-
T. I. G. Institute. CoBIT - Framework Control Objectives Management Guidelines Maturity Models, 4.1 edition.
-
T. I. G. Institute. CoBIT - Framework Control Objectives Management Guidelines Maturity Models, 4.1 edition.
-
-
-
-
18
-
-
84901518187
-
Risk Management-Vocabulary-Guidelines for Use in Standards
-
ISO/IEC
-
ISO/IEC. Risk Management-Vocabulary-Guidelines for Use in Standards. ISO/IEC Guide 73, 2002.
-
(2002)
ISO/IEC Guide
, vol.73
-
-
-
19
-
-
34147093788
-
Management of Information and Communication Technology Security - Part 1: Concepts and Models for Information and Communication Technology Security Management
-
ISO/IEC, ISO/IEC 13335
-
ISO/IEC. Management of Information and Communication Technology Security - Part 1: Concepts and Models for Information and Communication Technology Security Management. ISO/IEC 13335, 2004.
-
(2004)
-
-
-
20
-
-
33644658584
-
Information Technology - Security Techniques - Information Security Management Systems - Requirements
-
ISO/IEC, ISO/IEC 27001
-
ISO/IEC. Information Technology - Security Techniques - Information Security Management Systems - Requirements. ISO/IEC 27001, 2005.
-
(2005)
-
-
-
21
-
-
51349104654
-
Information Technology - Security Techniques - Information Security Risk Management
-
ISO/IEC, ISO/IEC 27005
-
ISO/IEC. Information Technology - Security Techniques - Information Security Risk Management. ISO/IEC 27005, 2008.
-
(2008)
-
-
-
23
-
-
70349253467
-
-
A. Jøsang, D. Bradley, and S. J. Knapskog. Belief-Based Risk Analysis. In Proceedings of the 2nd Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation, pages 63-68, Darlinghurst, Australia, Australia, 2004. Australian Computer Society, Inc.
-
A. Jøsang, D. Bradley, and S. J. Knapskog. Belief-Based Risk Analysis. In Proceedings of the 2nd Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation, pages 63-68, Darlinghurst, Australia, Australia, 2004. Australian Computer Society, Inc.
-
-
-
-
24
-
-
35048832333
-
Analysing the Relationship Between Risk and Trust
-
Proceedings of the Second International Conference on Trust Management, of, Springer-Verlag
-
A. Jøsang and S. Presti. Analysing the Relationship Between Risk and Trust. In Proceedings of the Second International Conference on Trust Management, volume 2995 of Lecture Notes in Computer Science, pages 135-145. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2995
, pp. 135-145
-
-
Jøsang, A.1
Presti, S.2
-
26
-
-
33751061515
-
Risk and Restitution: Assessing How Users Establish Online Trust
-
October
-
H. Lacoheea, A. Phippenb, and S. Furnell. Risk and Restitution: Assessing How Users Establish Online Trust. Computers & Security, 25(7):286-293, October 2006.
-
(2006)
Computers & Security
, vol.25
, Issue.7
, pp. 286-293
-
-
Lacoheea, H.1
Phippenb, A.2
Furnell, S.3
-
29
-
-
48349135501
-
Bayesian probabilistic risk analysis
-
A. Mosleh, E. R. Hilton, and P. S. Browne. Bayesian probabilistic risk analysis. SIGMETRICS Perform. Eval. Rev., 13(1):5-12, 1985.
-
(1985)
SIGMETRICS Perform. Eval. Rev
, vol.13
, Issue.1
, pp. 5-12
-
-
Mosleh, A.1
Hilton, E.R.2
Browne, P.S.3
-
30
-
-
70349244180
-
-
P. G. Neumann. RISKS-LIST: RISKS-FORUM Digest. http://catless.ncl.ac.uk/ Risks/. accessed at 2008-05-27.
-
P. G. Neumann. RISKS-LIST: RISKS-FORUM Digest. http://catless.ncl.ac.uk/ Risks/. accessed at 2008-05-27.
-
-
-
-
32
-
-
70349259640
-
-
January, last access 04.08
-
B. Schneier. In Praise of Security Theater. http://www.schneier.com/blog/ , January 2007. last access 04.08.2008.
-
(2007)
Praise of Security Theater
-
-
Schneier, B.1
-
33
-
-
0041675012
-
Combination of Evidence in Dempster-Shafer Theory
-
Technical Report SAND 2002-0835, Sandia National Laboratories
-
K. Sentz and S. Ferson. Combination of Evidence in Dempster-Shafer Theory. Technical Report SAND 2002-0835, Sandia National Laboratories, 2002.
-
(2002)
-
-
Sentz, K.1
Ferson, S.2
-
35
-
-
0027769403
-
Perceived Risk, Trust, and Democracy
-
P. Slovic. Perceived Risk, Trust, and Democracy. Risk Analysis, 13(6):675-682, 1993.
-
(1993)
Risk Analysis
, vol.13
, Issue.6
, pp. 675-682
-
-
Slovic, P.1
-
37
-
-
9444250310
-
-
NASA
-
M. Stamatelatos, W. Vesely, J. Dugan, J. Fragola, J. Minarick, and J. Railsback. Fault Tree Handbook with Aerospace Applications. NASA, 2002.
-
(2002)
Fault Tree Handbook with Aerospace Applications
-
-
Stamatelatos, M.1
Vesely, W.2
Dugan, J.3
Fragola, J.4
Minarick, J.5
Railsback, J.6
-
38
-
-
70349245829
-
-
U.S. NCSA - NHTSA. Fatality Analysis Reporting System General Estimates System - 2006 Data Summary. http://www-nrd.nhtsa.dot.gov/CMSWeb/, 2008. last access 04.08.2008.
-
U.S. NCSA - NHTSA. Fatality Analysis Reporting System General Estimates System - 2006 Data Summary. http://www-nrd.nhtsa.dot.gov/CMSWeb/, 2008. last access 04.08.2008.
-
-
-
-
39
-
-
70349245828
-
-
U.S. NTSB. Aviation Accident Statistics. http://www.ntsb.gov/aviation/ Table2.htm, 2008. last access 04.08.2008.
-
U.S. NTSB. Aviation Accident Statistics. http://www.ntsb.gov/aviation/ Table2.htm, 2008. last access 04.08.2008.
-
-
-
-
42
-
-
0036394383
-
A Domain-Specific Risk-Attitude Scale: Measuring Risk Perceptions and Risk Behaviors
-
E. Weber, A. Blais, and N. Betz. A Domain-Specific Risk-Attitude Scale: Measuring Risk Perceptions and Risk Behaviors. Journal of Behavioral Decision Making, 15(4):263-290, 2002.
-
(2002)
Journal of Behavioral Decision Making
, vol.15
, Issue.4
, pp. 263-290
-
-
Weber, E.1
Blais, A.2
Betz, N.3
|