메뉴 건너뛰기




Volumn , Issue , 2010, Pages 197-204

Applicability of security metrics for adaptive security management in a universal banking hub system

Author keywords

adaptive security; security measures; security metrics

Indexed keywords

ADAPTIVE SECURITY; DISTRIBUTED MIDDLEWARE; HIGH STANDARDS; HUB SYSTEMS; SECURITY MEASURE; SECURITY METRICS; TRUST METRICS;

EID: 78149384657     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1842752.1842792     Document Type: Conference Paper
Times cited : (7)

References (28)
  • 2
    • 79952027575 scopus 로고    scopus 로고
    • Innovations and advances in adaptive secure message oriented middleware - The GEMOM project
    • Savola, R., Abie, H., Bigham, J., and Rotondi, D. 2010. "Innovations and advances in adaptive secure message oriented middleware - the GEMOM project," RDCS '10.
    • (2010) RDCS '10
    • Savola, R.1    Abie, H.2    Bigham, J.3    Rotondi, D.4
  • 3
    • 77958019527 scopus 로고    scopus 로고
    • Development of measurable security for a distributed messaging system
    • Publ. 2010
    • Savola, R. and Abie, H. 2010. "Development of measurable security for a distributed messaging system," Int. Journal on Advances in Security, 2(4), 358-380, Publ. 2010.
    • (2010) Int. Journal on Advances in Security , vol.2 , Issue.4 , pp. 358-380
    • Savola, R.1    Abie, H.2
  • 4
    • 77749333086 scopus 로고    scopus 로고
    • Development of security metrics for a distributed messaging system
    • Savola, R. and Abie, H. 2009. "Development of security metrics for a distributed messaging system," AICT '09.
    • (2009) AICT '09
    • Savola, R.1    Abie, H.2
  • 5
    • 78149364704 scopus 로고    scopus 로고
    • Adaptive security and trust management for autonomic message-oriented middleware
    • Abie, H. 2009. "Adaptive security and trust management for autonomic message-oriented middleware," TSP '09.
    • (2009) TSP '09
    • Abie, H.1
  • 6
    • 78149392355 scopus 로고    scopus 로고
    • A security metrics taxonomization model for software-intensive systems
    • Savola, R. 2009. "A security metrics taxonomization model for software-intensive systems," Journal of Information Processing Systems, 5(4), 197-206.
    • (2009) Journal of Information Processing Systems , vol.5 , Issue.4 , pp. 197-206
    • Savola, R.1
  • 7
    • 79952066716 scopus 로고    scopus 로고
    • Security-measurability-enhancing mechanisms for a distributed adaptive security monitoring system
    • Savola, R. and Heinonen, P. 2010. "Security-measurability-enhancing mechanisms for a distributed adaptive security monitoring system," SECURWARE '10.
    • (2010) SECURWARE '10
    • Savola, R.1    Heinonen, P.2
  • 8
    • 78149392354 scopus 로고    scopus 로고
    • Web-site: July 12
    • Society for Worldwide Interbank Financial Telecommunication (SWIFT). Web-site: www.swift.com [July 12, 2010].
    • (2010)
  • 9
    • 27544477471 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, U.S. Department of Commerce, NIST SP 800-63-1, Draft
    • Burr, W.E. et al. 2008. "Electronic authentication guideline," National Institute of Standards and Technology, U.S. Department of Commerce, NIST SP 800-63-1, Draft.
    • (2008) Electronic Authentication Guideline
    • Burr, W.E.1
  • 10
    • 21244462147 scopus 로고    scopus 로고
    • OASIS Standard 200401. Organization for the Advancement of Structured Information Standards
    • OASIS Standard 200401. 2004. "Web services security: SOAP message security 1.0," Organization for the Advancement of Structured Information Standards.
    • (2004) Web Services Security: SOAP Message Security 1.0
  • 14
    • 0000010648 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • Lenstra, A.K. and Verheul, E.R. 2000. "Selecting cryptographic key sizes," PKC '00.
    • (2000) PKC '00
    • Lenstra, A.K.1    Verheul, E.R.2
  • 16
    • 77953904148 scopus 로고    scopus 로고
    • Recommendation for key management - Part 1: General (Revised)
    • National Institute of Standards and Technology, U.S. Department of Commerce
    • Barker, E. et al. 2007. "Recommendation for key management - Part 1: General (Revised)," National Institute of Standards and Technology, U.S. Department of Commerce, NIST Special Publication 800-57.
    • (2007) NIST Special Publication 800-57
    • Barker, E.1
  • 18
    • 0346052082 scopus 로고    scopus 로고
    • Towards a framework for security measurement
    • Wang, C. and Wulf, W.A. 1997. "Towards a framework for security measurement," NISSC '07.
    • (1997) NISSC '07
    • Wang, C.1    Wulf, W.A.2
  • 19
    • 78349259200 scopus 로고    scopus 로고
    • Quantified security is a weak hypothesis
    • Verendel, V. 2009. "Quantified security is a weak hypothesis," NSPW '09.
    • (2009) NSPW '09
    • Verendel, V.1
  • 21
    • 70349117427 scopus 로고    scopus 로고
    • Object oriented software security estimation life cycle - Design phase perspective
    • Chandra, S. and Khan, R.A. 2008. "Object oriented software security estimation life cycle - Design phase perspective," Journal of Software Engineering, 2(1), 39-46.
    • (2008) Journal of Software Engineering , vol.2 , Issue.1 , pp. 39-46
    • Chandra, S.1    Khan, R.A.2
  • 23
    • 62649153775 scopus 로고    scopus 로고
    • Multiagent based security assurance monitoring system for telecommunication infrastructures
    • Bulut, E., Khadraoui, D., and Marquet, B. 2007. "Multiagent based security assurance monitoring system for telecommunication infrastructures, " CNIS '07.
    • (2007) CNIS '07
    • Bulut, E.1    Khadraoui, D.2    Marquet, B.3
  • 24
    • 78149392139 scopus 로고    scopus 로고
    • On the feasibility of utilizing security metrics in software-intensive systems
    • Savola, R. 2010. "On the feasibility of utilizing security metrics in software-intensive systems," Int. Journal of Computer Science and Network Security, 10(1), 230-239.
    • (2010) Int. Journal of Computer Science and Network Security , vol.10 , Issue.1 , pp. 230-239
    • Savola, R.1
  • 28
    • 77953158482 scopus 로고    scopus 로고
    • U.S. National Institute of Standards and Technology, NISTIR 7564
    • Jansen, W. 2009. "Directions in security metrics research," U.S. National Institute of Standards and Technology, NISTIR 7564.
    • (2009) Directions in Security Metrics Research
    • Jansen, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.