메뉴 건너뛰기




Volumn 8, Issue 4, 2010, Pages 46-54

Why measuring security is hard

Author keywords

measurement; security and privacy

Indexed keywords

SECURITY AND PRIVACY; SECURITY MEASUREMENT;

EID: 77955132888     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2010.60     Document Type: Article
Times cited : (86)

References (17)
  • 1
    • 12344308304 scopus 로고    scopus 로고
    • Basic concepts and taxonomy of dependable and secure computing
    • A. Avizienis et al., "Basic Concepts and Taxonomy of Dependable and Secure Computing," IEEE Trans. Dependable and Secure Computing, vol.1, no.1, 2004, pp. 11-33.
    • (2004) IEEE Trans. Dependable and Secure Computing , vol.1 , Issue.1 , pp. 11-33
    • Avizienis, A.1
  • 2
    • 67649659865 scopus 로고    scopus 로고
    • Useful cybersecurity metrics
    • July/Aug.
    • S.L. Pfleeger, "Useful Cybersecurity Metrics," IT Professional, July/Aug. 2009, pp. 38-45.
    • (2009) IT Professional , pp. 38-45
    • Pfleeger, S.L.1
  • 4
    • 0019058442 scopus 로고
    • Programs, life cycles, and laws of software evolution
    • M.M. Lehman, "Programs, Life Cycles, and Laws of Software Evolution," Proc. IEEE, vol.68, no.9, 1980, pp. 1060-1076.
    • (1980) Proc. IEEE , vol.68 , Issue.9 , pp. 1060-1076
    • Lehman, M.M.1
  • 5
    • 84962260018 scopus 로고    scopus 로고
    • Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation
    • IEEE CS Press
    • R.P. Lippmann et al., "Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation," Proc. 2000 DARPA Information Survivability Conf. and Exposition (DISCEX 00), IEEE CS Press, vol.2, pp. 12-26.
    • Proc. 2000 DARPA Information Survivability Conf. and Exposition (DISCEX 00) , vol.2 , pp. 12-26
    • Lippmann, R.P.1
  • 6
    • 0003231551 scopus 로고    scopus 로고
    • Why things bite back: Technology and the revenge of unintended consequences
    • E. Tenner, Why Things Bite Back: Technology and the Revenge of Unintended Consequences, Vintage Books, 1996.
    • (1996) Vintage Books
    • Tenner, E.1
  • 7
    • 77955160706 scopus 로고    scopus 로고
    • Trust and risk in the workplace
    • M. Whitty, Trust and Risk in the Workplace, SurfControl, 2007.
    • (2007) SurfControl
    • Whitty, M.1
  • 8
    • 77955132145 scopus 로고    scopus 로고
    • Practical principles for computer security
    • NATO Science Series, IOS Press
    • B. Lampson, "Practical Principles for Computer Security," Software System Reliability and Security: Proc. 2006 Marktoberdorf Summer School, NATO Science Series, IOS Press, 2006; http://research.microsoft.com/en- us/um/ people/blampson/74-PracticalPrinciplesSecurity/74- PracticalPrinciplesSecurity.pdf.
    • (2006) Software System Reliability and Security: Proc. 2006 Marktoberdorf Summer School
    • Lampson, B.1
  • 10
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
    • Ad vances in Cryptology-Crypto '96, Springer
    • P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Ad vances in Cryptology-Crypto '96, LNCS 1109, Springer, 1996, pp. 104-113; www.cryptography.com/public/pdf/ TimingAttacks.pdf.
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 11
    • 33846166742 scopus 로고    scopus 로고
    • The potential for underinvestment in internet security: Implications for regulatory policy
    • A. Garcia and B. Horowitz, "The Potential for Underinvestment in Internet Security: Implications for Regulatory Policy," J. Regulatory Economics, vol.31, no.1, 2007, pp. 37-51; http://ssrn.com/abstract=889071.
    • (2007) J. Regulatory Economics , vol.31 , Issue.1 , pp. 37-51
    • Garcia, A.1    Horowitz, B.2
  • 12
    • 0000420316 scopus 로고
    • Economics in the laboratory
    • V. Smith, "Economics in the Laboratory," J. Economic Perspectives, vol.8, no.1, 1994, pp. 113-131.
    • (1994) J. Economic Perspectives , vol.8 , Issue.1 , pp. 113-131
    • Smith, V.1
  • 13
    • 77955127926 scopus 로고    scopus 로고
    • Application of collaborative risk analysis to cyber security investment decisions
    • B. Horowitz and J. Crawford, "Application of Collaborative Risk Analysis to Cyber Security Investment Decisions," Financial Services Technology Consortium Innovation J., vol.2, no.1, 2007, pp. 2-5.
    • (2007) Financial Services Technology Consortium Innovation J. , vol.2 , Issue.1 , pp. 2-5
    • Horowitz, B.1    Crawford, J.2
  • 14
    • 0000125532 scopus 로고
    • Prospect theory: An analysis of decision under risk
    • D. Kahneman and A. Tversky, "Prospect Theory: An Analysis of Decision under Risk," Econometrica, vol.47, no.2, 1979, pp. 263-291.
    • (1979) Econometrica , vol.47 , Issue.2 , pp. 263-291
    • Kahneman, D.1    Tversky, A.2
  • 15
    • 77955158885 scopus 로고    scopus 로고
    • So you can't pick the hits?
    • Washington Post, 4 Jan.
    • D. Watts, "So You Can't Pick the Hits? Neither Can Anyone Else," Washington Post, 4 Jan. 2009, p. B04.
    • (2009) Neither Can Anyone Else
    • Watts, D.1
  • 16
    • 33750093555 scopus 로고    scopus 로고
    • Measuring relative attack surfaces
    • D.T. Lee et al., eds., Springer
    • M. Howard, J. Pincus, and J. Wing, "Measuring Relative Attack Surfaces," Computer Security in the 21st Century, D.T. Lee et al., eds., Springer, 2005, pp. 109-137.
    • (2005) Computer Security in the 21st Century , pp. 109-137
    • Howard, M.1    Pincus, J.2    Wing, J.3
  • 17
    • 84877999984 scopus 로고    scopus 로고
    • Milk or wine: Does software security improve with age?
    • Usenix
    • A. Ozment and S. Schechter, "Milk or Wine: Does Software Security Improve with Age?" Proc. 15th Usenix Security Symp., Usenix, 2006, pp. 93-104.
    • (2006) Proc. 15th Usenix Security Symp. , pp. 93-104
    • Ozment, A.1    Schechter, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.