메뉴 건너뛰기




Volumn 5775 LNCS, Issue , 2009, Pages 89-102

Environment characterization and system modeling approach for the quantitative evaluation of security

Author keywords

[No Author keywords available]

Indexed keywords

ENVIRONMENTAL FACTORS; IMPLEMENTATION ERROR; INFORMATION SYSTEM SECURITY; NEW APPROACHES; QUANTITATIVE EVALUATION; SECURITY SYSTEM STATE; STOCHASTIC ACTIVITY NETWORKS; SYSTEM DESIGNERS; SYSTEM ENVIRONMENT; SYSTEM MODELING; SYSTEM VULNERABILITY;

EID: 70350452986     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04468-7_9     Document Type: Conference Paper
Times cited : (4)

References (31)
  • 1
    • 70350442536 scopus 로고
    • U.S. Department of Defence Trusted Computer Security Evaluation Criteria
    • U.S. Department of Defence Trusted Computer Security Evaluation Criteria (1985)
    • (1985)
  • 3
    • 70350446926 scopus 로고    scopus 로고
    • Common Criteria for Information Technology Security Evaluation 1996
    • Common Criteria for Information Technology Security Evaluation (1996)
  • 4
    • 70350450524 scopus 로고    scopus 로고
    • Requirements for Information security management systems
    • ISO/IEC 27001
    • ISO/IEC 27001:2005, Requirements for Information security management systems (2005)
    • (2005)
  • 5
    • 0003692134 scopus 로고    scopus 로고
    • Code of practice for information security management
    • ISO/IEC 27002
    • ISO/IEC 27002:2005, Code of practice for information security management (2005)
    • (2005)
  • 9
    • 33749052613 scopus 로고
    • Vers une évaluation quantitative de la sécurité informatique
    • Thèse de doctorat LAAS-CNRS , in french
    • Dacier, M.: Vers une évaluation quantitative de la sécurité informatique, Thèse de doctorat LAAS-CNRS (1994) (in french)
    • (1994)
    • Dacier, M.1
  • 11
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Ortalo, R., Deswarte, Y., Kaaniche, M.: Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering 25, 633-650 (1999)
    • (1999) IEEE Transactions on Software Engineering , vol.25 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 12
  • 17
    • 70350441558 scopus 로고    scopus 로고
    • Mell, P., Scarfone, K., Romanovsky, S.: CVSS v2 Complete Documentation. ccvs (June 2007)
    • Mell, P., Scarfone, K., Romanovsky, S.: CVSS v2 Complete Documentation. ccvs (June 2007)
  • 19
    • 34547974467 scopus 로고    scopus 로고
    • Estimating Software Vulnerabilities
    • Jones, J.R.: Estimating Software Vulnerabilities. IEEE Security and Privacy 5, 28-32 (2007)
    • (2007) IEEE Security and Privacy , vol.5 , pp. 28-32
    • Jones, J.R.1
  • 21
    • 84870666315 scopus 로고    scopus 로고
    • SecurityFocus, http://www.securityfocus.org
    • SecurityFocus
  • 22
    • 70350461634 scopus 로고
    • Conceptual Model and Architecture of MAFTIA, MAFTIA (Malicious and Accidental Fault Tolerance for Internet Applications) project deliverable D21
    • MAFTIA Consortium, 03011
    • MAFTIA Consortium, Conceptual Model and Architecture of MAFTIA, MAFTIA (Malicious and Accidental Fault Tolerance for Internet Applications) project deliverable D21, LAAS-CNRS Report 03011 (1993)
    • (1993) LAAS-CNRS Report
  • 25
    • 70350482434 scopus 로고    scopus 로고
    • Microsoft Security Bulletin MS02-039
    • Microsoft Security Bulletin MS02-039
  • 26
    • 70350461632 scopus 로고    scopus 로고
    • Computer Security Research, McAfee Avert Labs Blog
    • Computer Security Research - McAfee Avert Labs Blog
  • 28


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.