-
1
-
-
78149392355
-
A security metrics taxonomization model for software-intensive systems
-
Dec.
-
R. Savola, "A security metrics taxonomization model for software-intensive systems," Journal of Information Processing Systems, Vol. 5, No. 4, Dec. 2009, pp. 197-206.
-
(2009)
Journal of Information Processing Systems
, vol.5
, Issue.4
, pp. 197-206
-
-
Savola, R.1
-
2
-
-
78149472349
-
Towards security effectiveness measurement utilizing risk-based security assurance
-
2-4 Aug.
-
R. Savola, H. Pentikäinen, and M. Ouedraogo, "Towards security effectiveness measurement utilizing risk-based security assurance," ISSA '10, 2-4 Aug., 2010.
-
(2010)
ISSA '10
-
-
Savola, R.1
Pentikäinen, H.2
Ouedraogo, M.3
-
4
-
-
77958019527
-
Development of measurable security for a distributed messaging system
-
R. Savola and H. Abie, "Development of measurable security for a distributed messaging system," International Journal on Advances in Security, Vol. 2, No. 4 (2009), 2010.
-
(2009)
International Journal on Advances in Security
, vol.2
, Issue.4
-
-
Savola, R.1
Abie, H.2
-
6
-
-
62649153775
-
Multi-agent based security assurance monitoring system for telecommunication infrastructures
-
Berkeley, CA, USA Sep. 24-27
-
E. Bulut, D. Khadraoui, and B. Marquet, "Multi-agent based security assurance monitoring system for telecommunication infrastructures", CNIS 2007, Berkeley, CA, USA Sep. 24-27, 2007, 6 p.
-
(2007)
CNIS 2007
, pp. 6
-
-
Bulut, E.1
Khadraoui, D.2
Marquet, B.3
-
7
-
-
70349117427
-
Object oriented software security estimation life cycle - Design phase perspective
-
S. Chandra and R. A. Khan, "Object oriented software security estimation life cycle - Design phase perspective", Journal of Software Engineering, 2008, Vol. 2, Issue 1, pp. 39-46.
-
(2008)
Journal of Software Engineering
, vol.2
, Issue.1
, pp. 39-46
-
-
Chandra, S.1
Khan, R.A.2
-
9
-
-
77953158482
-
-
U.S. National Institute of Standards and Technology, NISTIR 7564, Apr.
-
W. Jansen, "Directions in security metrics research," U.S. National Institute of Standards and Technology, NISTIR 7564, Apr. 2009, 21 p.
-
(2009)
Directions in Security Metrics Research
, pp. 21
-
-
Jansen, W.1
-
10
-
-
77950875313
-
Quantified security is a weak hypothesis
-
Oxford, U.K., 8-11, Sept.
-
V. Verendel, "Quantified security is a weak hypothesis," New Security Paradigms Workshop (NSPW '09), Oxford, U.K., 8-11, Sept. 2009.
-
(2009)
New Security Paradigms Workshop (NSPW '09)
-
-
Verendel, V.1
-
13
-
-
78149396361
-
-
Information Assurance Technology Analysis Center IATAC, May
-
N. Bartol, B. Bates, K.M. Goertzel, and T. Winograd, "Measuring cyber security and information assurance: a state-of-the-art report," Information Assurance Technology Analysis Center IATAC, May 2009.
-
(2009)
Measuring Cyber Security and Information Assurance: A State-of-the-Art Report
-
-
Bartol, N.1
Bates, B.2
Goertzel, K.M.3
Winograd, T.4
-
14
-
-
78649248918
-
-
Version 1.0. Available July 4
-
European Privacy Seal, "EuroPriSe criteria," Version 1.0. Available: www.european-privacy-seal.eu. [July 4, 2010].
-
(2010)
EuroPriSe Criteria
-
-
-
15
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
P. Samarati and L. Sweeney, "Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression," Technical Report, CMU, SRI, 1998.
-
(1998)
Technical Report, CMU, SRI
-
-
Samarati, P.1
Sweeney, L.2
-
17
-
-
0002265410
-
The platform for privacy preferences
-
Feb.
-
J. Reagle and L. F. Cranor, "The platform for privacy preferences," Communications of the ACM, 42(2), pp. 48-55, Feb. 1997.
-
(1997)
Communications of the ACM
, vol.42
, Issue.2
, pp. 48-55
-
-
Reagle, J.1
Cranor, L.F.2
-
18
-
-
78649237057
-
Privacy metrics and boundaries
-
Erasmus Research Institute of Management (ERIM)
-
L.-F. Pau, "Privacy metrics and boundaries," Research Paper ERS-2005-013-LIS, Erasmus Research Institute of Management (ERIM).
-
Research Paper ERS-2005-013-LIS
-
-
Pau, L.-F.1
-
19
-
-
77954051808
-
-
U.S. National Institute of Standards and Technology, Information Technology Laboratory. Version 15, 7 Oct.
-
P. Mell and T. Grance, "The NIST definition of cloud computing," U.S. National Institute of Standards and Technology, Information Technology Laboratory. Version 15, 7 Oct. 2009.
-
(2009)
The NIST Definition of Cloud Computing
-
-
Mell, P.1
Grance, T.2
-
20
-
-
78649543654
-
Cloud computing: An auditor's perspective
-
S. Gadia, "Cloud computing: an auditor's perspective," ISACA Journal, Vol. 6, 2009.
-
(2009)
ISACA Journal
, vol.6
-
-
Gadia, S.1
-
22
-
-
77950567715
-
Privacy in the clouds: Risks to privacy and confidentiality from cloud computing
-
Feb. 23
-
R. Gellman, "Privacy in the clouds: risks to privacy and confidentiality from cloud computing," World Privacy Forum (WPF) Report, Feb. 23, 2009.
-
(2009)
World Privacy Forum (WPF) Report
-
-
Gellman, R.1
-
23
-
-
77954695824
-
-
Version 1.0. Downloaded from July 4
-
Cloud Security Alliance, "Top threats to cloud computing", Version 1.0. Downloaded from: www.cloudsecurityalliance.org [July 4, 2010].
-
(2010)
Top Threats to Cloud Computing
-
-
-
24
-
-
70449480067
-
CVSS: A common vulnerability scoring system
-
M. Schiffman, G. Eschelbeck, D. Ahmad, A. Wright, and S. Romanosky, "CVSS: A Common Vulnerability Scoring System", National Infrastructure Advisory Council (NIAC), 2004.
-
(2004)
National Infrastructure Advisory Council (NIAC)
-
-
Schiffman, M.1
Eschelbeck, G.2
Ahmad, D.3
Wright, A.4
Romanosky, S.5
-
25
-
-
77949789493
-
-
NIST Special Publ. 800-117 (Draft), U.S. National Institute of Standards and Technology
-
M. Barrett, C. Johnson, P. Mell, S. Quinn, and K. Scarfone, "Guide to adopting and using the Security Content Automation Protocol (SCAP)", NIST Special Publ. 800-117 (Draft), U.S. National Institute of Standards and Technology, 2009.
-
(2009)
Guide to Adopting and Using the Security Content Automation Protocol (SCAP)
-
-
Barrett, M.1
Johnson, C.2
Mell, P.3
Quinn, S.4
Scarfone, K.5
-
26
-
-
78149392139
-
On the feasibility of utilizing security metrics in software-intensive systems
-
Jan.
-
R. Savola, "On the feasibility of utilizing security metrics in software-intensive systems," International Journal of Computer Science and Network Security, Vol. 10, No. 1, Jan. 2010, pp. 230-239.
-
(2010)
International Journal of Computer Science and Network Security
, vol.10
, Issue.1
, pp. 230-239
-
-
Savola, R.1
|