메뉴 건너뛰기




Volumn , Issue , 2010, Pages 1833-1839

Ontology-based generation of IT-security metrics

Author keywords

compliance; economics; metrics; security

Indexed keywords

COMPLIANCE; CONTROL IMPLEMENTATION; DEGREE OF AUTOMATION; INDUSTRY STANDARDS; INFORMATION SECURITY; IT SECURITY; LEGAL REGULATION; ONTOLOGY-BASED; RESEARCH RESULTS;

EID: 77954700790     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1774088.1774478     Document Type: Conference Paper
Times cited : (22)

References (12)
  • 2
    • 78049400376 scopus 로고    scopus 로고
    • BERR. Technical report, Department for Business Enterprise and Regulatory Reform (BERR), April
    • BERR. 2008 information security breaches survey. Technical report, Department for Business Enterprise and Regulatory Reform (BERR), April 2008.
    • (2008) 2008 Information Security Breaches Survey
  • 4
    • 70350663440 scopus 로고    scopus 로고
    • Performance measurement guide for information security
    • National Institute of Standards and Technology (NIST), July
    • E. Chew, M. Swanson, K. Stine, N. Bartol, A. Brown, and W. Robinson. Performance measurement guide for information security. NIST Special Publication 800-55, National Institute of Standards and Technology (NIST), July 2008.
    • (2008) NIST Special Publication 800-55
    • Chew, E.1    Swanson, M.2    Stine, K.3    Bartol, N.4    Brown, A.5    Robinson, W.6
  • 8
    • 58849149565 scopus 로고    scopus 로고
    • Improved security trough information security governance
    • January
    • A. C. Johnston and R. Hale. Improved security trough information security governance. Communications of the ACM, 52(1):126-129, January 2009.
    • (2009) Communications of the ACM , vol.52 , Issue.1 , pp. 126-129
    • Johnston, A.C.1    Hale, R.2
  • 11
    • 0033325475 scopus 로고    scopus 로고
    • Experiments with quantitative evaluation tools for monitoring operational security
    • R. Ortalo, Y. Deswarte, and M. Kaaniche. Experiments with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 25(5):633-650, 1999.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.