-
1
-
-
84904154606
-
SAM: Security Adaptation Manager
-
H. Hinton, C. Cowan, L. Delcambre and S. Bowers. "SAM: Security Adaptation Manager," Proceedings of 15th Annual Computer Security Applications Conference 1999 (ACSAC '99), pp. 361-370, 1999.
-
(1999)
Proceedings of 15th Annual Computer Security Applications Conference 1999 (ACSAC '99)
, pp. 361-370
-
-
Hinton, H.1
Cowan, C.2
Delcambre, L.3
Bowers, S.4
-
4
-
-
37049033281
-
Adaptive SSL: Design, Implementation and Overhead Analysis
-
C. J. Lamprecht and A. P. A. van Moorsel. "Adaptive SSL: Design, Implementation and Overhead Analysis," First International Conference on Self-Adaptive and Self-Organizing Systems, 2007. SASO '07., pp. 289-294, 2007.
-
(2007)
First International Conference on Self-Adaptive and Self-Organizing Systems, 2007. SASO '07
, pp. 289-294
-
-
Lamprecht, C.J.1
Van Moorsel, A.P.A.2
-
6
-
-
78449239377
-
Quality Model
-
ISO/IEC 9126-1:2001
-
ISO/IEC 9126-1:2001. Software Engineering - Product Quality - Part 1: Quality Model. 2001,
-
(2001)
Software Engineering - Product Quality
, Issue.PART 1
-
-
-
7
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
A. Avižienis, J. -. Laprie, B. Randell and C. Landwehr, "Basic concepts and taxonomy of dependable and secure computing," IEEE Transactions on Dependable and Secure Computing, vol. 1, pp. 11-33, 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, pp. 11-33
-
-
Avižienis, A.1
Laprie, J.2
Randell, B.3
Landwehr, C.4
-
8
-
-
79952053482
-
Introduction and General Model
-
ISO/IEC 15408-1:2009, International Organization of Standardization
-
ISO/IEC 15408-1:2009, Common Criteria for Information Technology Security Evaluation - Part 1: Introduction and General Model. International Organization of Standardization, 2009,
-
(2009)
Common Criteria for Information Technology Security Evaluation
, Issue.PART 1
-
-
-
12
-
-
84889580469
-
The impact of maintainability on component-based software systems
-
M. Matinlassi and E. Niemelä. "The impact of maintainability on component-based software systems," 29th Euromicro Conference, pp. 25-32, 2003.
-
(2003)
29th Euromicro Conference
, pp. 25-32
-
-
Matinlassi, M.1
Niemelä, E.2
-
13
-
-
79952047281
-
Knowledge Dichotomy and Semantic Knowledge Management
-
J. Zhou. "Knowledge Dichotomy and Semantic Knowledge Management," Industrial Applications of Semantic Web, pp. 305-316, 2005.
-
(2005)
Industrial Applications of Semantic Web
, pp. 305-316
-
-
Zhou, J.1
-
14
-
-
49049087973
-
A systematic review and comparison of security ontologies
-
C. Blanco, J. Lasheras, R. Valencia-García, E. Fernández-Medina, A. Toval and M. Piattini. "A systematic review and comparison of security ontologies," 3rd International Conference on Availability, Security, and Reliability (ARES 2008), pp. 813-820, 2008.
-
(2008)
3rd International Conference on Availability, Security, and Reliability (ARES 2008)
, pp. 813-820
-
-
Blanco, C.1
Lasheras, J.2
Valencia-García, R.3
Fernández-Medina, E.4
Toval, A.5
Piattini, M.6
-
18
-
-
33646699357
-
Security Ontology for annotating resources
-
A. Kim, J. Luo and M. Kang. "Security Ontology for annotating resources," LNCS, vol. 3761, pp. 1483-1499, 2005.
-
(2005)
LNCS
, vol.3761
, pp. 1483-1499
-
-
Kim, A.1
Luo, J.2
Kang, M.3
-
19
-
-
79952065811
-
An ontology of information security
-
A. Herzog, N. Shahmehri and C. Duma. "An ontology of information security," Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues pp. 278-301. 2009.
-
(2009)
Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues
, pp. 278-301
-
-
Herzog, A.1
Shahmehri, N.2
Duma, C.3
-
20
-
-
77950991593
-
On-Line and off-line security measurement framework for mobile ad hoc networks
-
R. M. Savola and H. Abie. "On-Line and off-line security measurement framework for mobile ad hoc networks," Journal of Networks, 4(7), pp. 565-579, 2009.
-
(2009)
Journal of Networks
, vol.4
, Issue.7
, pp. 565-579
-
-
Savola, R.M.1
Abie, H.2
-
22
-
-
15944391638
-
Measuring IT security - A method based on Common Criteria's security functional requirements
-
A. Hunstad, J. Hallberg and R. Andersson. "Measuring IT security - A method based on Common Criteria's security functional requirements," 5th Annual IEEE System, Man and Cybernetics Information Assurance Workshop (SMC), pp. 226-233, 2004.
-
(2004)
5th Annual IEEE System, Man and Cybernetics Information Assurance Workshop (SMC)
, pp. 226-233
-
-
Hunstad, A.1
Hallberg, J.2
Andersson, R.3
-
24
-
-
79952065195
-
Semantic Information Interoperability in Smart Spaces
-
A. Evesti, M. Eteläperä, J. Kiljander, J. Kuusijärvi, A. Purhonen and S. Stenudd, "Semantic Information Interoperability in Smart Spaces," 8th International Conference on Mobile and Ubiquitous Multimedia (MUM'09), 22-25 Nov. 2009.
-
8th International Conference on Mobile and Ubiquitous Multimedia (MUM'09), 22-25 Nov. 2009
-
-
Evesti, A.1
Eteläperä, M.2
Kiljander, J.3
Kuusijärvi, J.4
Purhonen, A.5
Stenudd, S.6
-
25
-
-
79952044949
-
-
Smart-M3
-
Smart-M3, http://sourceforge.net/projects/smart-m3/
-
-
-
|