-
1
-
-
58149203602
-
GEMOM - Significant and measurable progress beyond the state of the art
-
Abie, H., Dattani, I., Novkovic, M., Bigham, J., Topham, S., and Savola, R. 2008. "GEMOM - Significant and measurable progress beyond the state of the art," ICSNC'08.
-
(2008)
ICSNC'08
-
-
Abie, H.1
Dattani, I.2
Novkovic, M.3
Bigham, J.4
Topham, S.5
Savola, R.6
-
2
-
-
79952027575
-
Innovations and advances in adaptive secure message oriented middleware - The GEMOM project
-
Savola, R., Abie, H., Bigham, J., and Rotondi, D. 2010. "Innovations and advances in adaptive secure message oriented middleware - the GEMOM project," RDCS '10.
-
(2010)
RDCS '10
-
-
Savola, R.1
Abie, H.2
Bigham, J.3
Rotondi, D.4
-
3
-
-
77958019527
-
Development of measurable security for a distributed messaging system
-
Publ. 2010
-
Savola, R. and Abie, H. 2010. "Development of measurable security for a distributed messaging system," Int. Journal on Advances in Security, 2(4), 358-380, Publ. 2010.
-
(2010)
Int. Journal on Advances in Security
, vol.2
, Issue.4
, pp. 358-380
-
-
Savola, R.1
Abie, H.2
-
4
-
-
77749333086
-
Development of security metrics for a distributed messaging system
-
Savola, R. and Abie, H. 2009. "Development of security metrics for a distributed messaging system," AICT '09.
-
(2009)
AICT '09
-
-
Savola, R.1
Abie, H.2
-
5
-
-
78149364704
-
Adaptive security and trust management for autonomic message-oriented middleware
-
Abie, H. 2009. "Adaptive security and trust management for autonomic message-oriented middleware," TSP '09.
-
(2009)
TSP '09
-
-
Abie, H.1
-
6
-
-
78149392355
-
A security metrics taxonomization model for software-intensive systems
-
Savola, R. 2009. "A security metrics taxonomization model for software-intensive systems," Journal of Information Processing Systems, 5(4), 197-206.
-
(2009)
Journal of Information Processing Systems
, vol.5
, Issue.4
, pp. 197-206
-
-
Savola, R.1
-
7
-
-
79952066716
-
Security-measurability-enhancing mechanisms for a distributed adaptive security monitoring system
-
Savola, R. and Heinonen, P. 2010. "Security-measurability-enhancing mechanisms for a distributed adaptive security monitoring system," SECURWARE '10.
-
(2010)
SECURWARE '10
-
-
Savola, R.1
Heinonen, P.2
-
8
-
-
78149392354
-
-
Web-site: July 12
-
Society for Worldwide Interbank Financial Telecommunication (SWIFT). Web-site: www.swift.com [July 12, 2010].
-
(2010)
-
-
-
9
-
-
27544477471
-
-
National Institute of Standards and Technology, U.S. Department of Commerce, NIST SP 800-63-1, Draft
-
Burr, W.E. et al. 2008. "Electronic authentication guideline," National Institute of Standards and Technology, U.S. Department of Commerce, NIST SP 800-63-1, Draft.
-
(2008)
Electronic Authentication Guideline
-
-
Burr, W.E.1
-
10
-
-
21244462147
-
-
OASIS Standard 200401. Organization for the Advancement of Structured Information Standards
-
OASIS Standard 200401. 2004. "Web services security: SOAP message security 1.0," Organization for the Advancement of Structured Information Standards.
-
(2004)
Web Services Security: SOAP Message Security 1.0
-
-
-
12
-
-
34748901459
-
An authentication strength linked access control middleware for the grid
-
Chin, J., Parkin, M., Zhang, N., Nenadic, A., and Brooke, J.M. 2005. "An authentication strength linked access control middleware for the grid," SCS International Journal of Information Technology, 11(4), 1-12.
-
(2005)
SCS International Journal of Information Technology
, vol.11
, Issue.4
, pp. 1-12
-
-
Chin, J.1
Parkin, M.2
Zhang, N.3
Nenadic, A.4
Brooke, J.M.5
-
16
-
-
77953904148
-
Recommendation for key management - Part 1: General (Revised)
-
National Institute of Standards and Technology, U.S. Department of Commerce
-
Barker, E. et al. 2007. "Recommendation for key management - Part 1: General (Revised)," National Institute of Standards and Technology, U.S. Department of Commerce, NIST Special Publication 800-57.
-
(2007)
NIST Special Publication 800-57
-
-
Barker, E.1
-
17
-
-
84877918279
-
A secure environment for grid-based supply chains
-
Blasi, L., Arenas, A., Aziz, B., Mori, P., Rovati, U., Crispo, B., Martinelli, F., and Massonet, P. 2008. "A secure environment for grid-based supply chains," eChallenges '08.
-
(2008)
eChallenges '08
-
-
Blasi, L.1
Arenas, A.2
Aziz, B.3
Mori, P.4
Rovati, U.5
Crispo, B.6
Martinelli, F.7
Massonet, P.8
-
18
-
-
0346052082
-
Towards a framework for security measurement
-
Wang, C. and Wulf, W.A. 1997. "Towards a framework for security measurement," NISSC '07.
-
(1997)
NISSC '07
-
-
Wang, C.1
Wulf, W.A.2
-
19
-
-
78349259200
-
Quantified security is a weak hypothesis
-
Verendel, V. 2009. "Quantified security is a weak hypothesis," NSPW '09.
-
(2009)
NSPW '09
-
-
Verendel, V.1
-
21
-
-
70349117427
-
Object oriented software security estimation life cycle - Design phase perspective
-
Chandra, S. and Khan, R.A. 2008. "Object oriented software security estimation life cycle - Design phase perspective," Journal of Software Engineering, 2(1), 39-46.
-
(2008)
Journal of Software Engineering
, vol.2
, Issue.1
, pp. 39-46
-
-
Chandra, S.1
Khan, R.A.2
-
23
-
-
62649153775
-
Multiagent based security assurance monitoring system for telecommunication infrastructures
-
Bulut, E., Khadraoui, D., and Marquet, B. 2007. "Multiagent based security assurance monitoring system for telecommunication infrastructures, " CNIS '07.
-
(2007)
CNIS '07
-
-
Bulut, E.1
Khadraoui, D.2
Marquet, B.3
-
24
-
-
78149392139
-
On the feasibility of utilizing security metrics in software-intensive systems
-
Savola, R. 2010. "On the feasibility of utilizing security metrics in software-intensive systems," Int. Journal of Computer Science and Network Security, 10(1), 230-239.
-
(2010)
Int. Journal of Computer Science and Network Security
, vol.10
, Issue.1
, pp. 230-239
-
-
Savola, R.1
-
27
-
-
78149396361
-
-
IATAC
-
Bartol, N., Bates, B., Goertzel, K.M., and Winograd, T. 2009. "Measuring cyber security and information assurance: a state-of-the-art report," IATAC.
-
(2009)
Measuring Cyber Security and Information Assurance: A State-of-the-art Report
-
-
Bartol, N.1
Bates, B.2
Goertzel, K.M.3
Winograd, T.4
-
28
-
-
77953158482
-
-
U.S. National Institute of Standards and Technology, NISTIR 7564
-
Jansen, W. 2009. "Directions in security metrics research," U.S. National Institute of Standards and Technology, NISTIR 7564.
-
(2009)
Directions in Security Metrics Research
-
-
Jansen, W.1
|