-
1
-
-
34548185933
-
Towards security evaluation based on evidence information collection and impact analysis
-
Workshop on Empirical Evaluation of Dependability and Security (WEEDS), Philadelphia, PA, June 25-28
-
R. Savola, and J. Röning, "Towards security evaluation based on evidence information collection and impact analysis", Supplemental Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN), Workshop on Empirical Evaluation of Dependability and Security (WEEDS), Philadelphia, PA, June 25-28, 2006, pp. 113-118.
-
(2006)
Supplemental Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN)
, pp. 113-118
-
-
Savola, R.1
Röning, J.2
-
2
-
-
70449653741
-
Towards requirement driven evaluation of information security
-
Nov. Halden, Norway
-
R. Savola, "Towards Requirement Driven Evaluation of Information Security", Proceedings of the International Seminar on Dependable Requirements Engineering of Computerised Systems at Nuclear Power Plants, Institute for Energy Technology, OECD Halden Reactor Project, Nov. 27-29, 2006, Halden, Norway.
-
(2006)
Proceedings of the International Seminar on Dependable Requirements Engineering of Computerised Systems at Nuclear Power Plants, Institute for Energy Technology, OECD Halden Reactor Project
, pp. 27-29
-
-
Savola, R.1
-
4
-
-
2942753973
-
Specifying reusable security requirements
-
Jan/Feb
-
D. Firesmith, "Specifying Reusable Security Requirements", Journal of Object Technology, Vol. 3, No. 1, Jan/Feb 2004, pp. 61-75.
-
(2004)
Journal of Object Technology
, vol.3
, Issue.1
, pp. 61-75
-
-
Firesmith, D.1
-
7
-
-
34548147031
-
A survey of security metrics use in some finnish organizations
-
November 14-16
-
A. Sademies and R. Savola, "A survey of security metrics use in some Finnish organizations", Proceedings of the 2005 IT Governance International Conference, Auckl and, New Zealand, November 14-16, 2005, pp. 91-98.
-
(2005)
Proceedings of the 2005 IT Governance International Conference, Auckl and, New Zealand
, pp. 91-98
-
-
Sademies, A.1
Savola, R.2
-
8
-
-
70449687444
-
-
International Organization for Standardization, Information Technology - Code of Practice for Information Security Management
-
International Organization for Standardization, "ISO/IEC 17799", Information Technology - Code of Practice for Information Security Management 2005.
-
(2005)
ISO/IEC 17799
-
-
-
9
-
-
70449669935
-
-
International Organization for Standardization, Information Security Management Systems - Requirements
-
International Organization for Standardization, "ISO/IEC 27001", Information Security Management Systems - Requirements, 2005.
-
(2005)
ISO/IEC 27001
-
-
-
10
-
-
34548283756
-
-
International Organization for Standardization, Common Criteria for Information Technology Security Evaluation
-
International Organization for Standardization, "ISO/IEC 15408", Common Criteria for Information Technology Security Evaluation, 2005.
-
(2005)
ISO/IEC 15408
-
-
-
11
-
-
34548272305
-
-
International Organization for Standardization, IT Network Security - Network Security Management
-
International Organization for Standardization, "ISO/IEC 18028", IT Network Security - Network Security Management, 2005.
-
(2005)
ISO/IEC 18028
-
-
-
13
-
-
0036330173
-
Information security policy - What do international information security standards say?
-
K. Höne, and J. H. P. Eloff, "Information security policy - what do international information security standards say?", Computers & Security, Vol. 21, Issue 5, pp. 402-409.
-
Computers & Security
, vol.21
, Issue.5
, pp. 402-409
-
-
Höne, K.1
Eloff, J.H.P.2
-
15
-
-
70449669933
-
-
NetHawk, NetHawk RNC/Iub simulator, 2006, https://www.nethawk.fi/ products/nethawk-simulators/nethawk-rnciub-simulator/.
-
(2006)
NetHawk, NetHawk RNC/Iub Simulator
-
-
-
19
-
-
70449644004
-
-
NetHawk, NetHawk M5 analyser, 2006, https://www.nethawk.fi/products/ nethawk-analyser/nethawk-m5/.
-
(2006)
NetHawk, NetHawk M5 Analyser
-
-
-
20
-
-
70449653740
-
Security testing open GGSN: A case study
-
Las Vegaas, April 11-12
-
E. Tikkala, M. Rapeli, K. Karppinen and H. Honkanen, "Security Testing OpenGGSN: a Case Study", Proceedings of the 6th Annual Security Conference, Las Vegaas, April 11-12, 2007.
-
(2007)
Proceedings of the 6th Annual Security Conference
-
-
Tikkala, E.1
Rapeli, M.2
Karppinen, K.3
Honkanen, H.4
-
21
-
-
70449634007
-
-
reference:
-
FlawFinder. Web reference: http://www.dwheeler.com/flawfinder/.
-
FlawFinder. Web
-
-
-
22
-
-
70449631841
-
-
reference:
-
RATS. Web reference: http://www.securesoftware.com/
-
RATS. Web
-
-
-
23
-
-
70449653359
-
-
reference:
-
Valgrind. Web reference: http://valgrind.org/.
-
Valgrind. Web
-
-
-
24
-
-
34548254839
-
Practical security testing of telecommunications software - A case study
-
Morne, Mauritius, May 13-19
-
R. Savola and K. Karppinen, "Practical Security Testing of Telecommunications Software - A Case Study", Proceedings of the 3rd Advanced International Conference on Telecommunications (AICT 2007), Morne, Mauritius, May 13-19, 2007.
-
(2007)
Proceedings of the 3rd Advanced International Conference on Telecommunications (AICT 2007)
-
-
Savola, R.1
Karppinen, K.2
-
25
-
-
33646188481
-
Security engineering with patterns
-
Monticello, IL, September 11-15
-
M. Schumacher, and U. Roedig, "Security engineering with patterns", Proceedings of Pattern Languages of Programs, Monticello, IL, September 11-15, 2001.
-
(2001)
Proceedings of Pattern Languages of Programs
-
-
Schumacher, M.1
Roedig, U.2
|