메뉴 건너뛰기




Volumn , Issue , 2010, Pages 25-34

Security-measurability-enhancing mechanisms for a distributed adaptive security monitoring system

Author keywords

Adaptive security management; Security metrics; Security monitoring

Indexed keywords

ADAPTIVE AND DISTRIBUTED; ADAPTIVE SECURITY; CRITICAL APPLICATIONS; SECURITY METRICS; SECURITY MONITORING; SELF-HEALING; SOFTWARE INTENSIVE SYSTEMS; SYSTEMATIC SECURITY;

EID: 79952066716     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECURWARE.2010.12     Document Type: Conference Paper
Times cited : (17)

References (39)
  • 3
    • 77953158482 scopus 로고    scopus 로고
    • U.S. National Institute of Standards and Technology (NIST), NISTIR 7564, Apr.
    • W. Jansen, "Directions in Security Metrics Research," U.S. National Institute of Standards and Technology (NIST), NISTIR 7564, Apr. 2009, 21 p.
    • (2009) Directions in Security Metrics Research , pp. 21
    • Jansen, W.1
  • 5
    • 77958019527 scopus 로고    scopus 로고
    • Development of Measurable Security for a Distributed Messaging System
    • March 2010
    • R. Savola and H. Abie, "Development of Measurable Security for a Distributed Messaging System," International Journal on Advances in Security, Vol. 2, No. 4, 2009, pp. 358-380 (March 2010).
    • (2009) International Journal on Advances in Security , vol.2 , Issue.4 , pp. 358-380
    • Savola, R.1    Abie, H.2
  • 7
    • 70449502638 scopus 로고    scopus 로고
    • Identification of Basic Measurable Security Components for a Distributed Messaging System
    • R. Savola and H. Abie, "Identification of Basic Measurable Security Components for a Distributed Messaging System," SECURWARE '09, Athens/Glyfada, Greece, Jun. 18-23, 2009, pp. 121-128.
    • SECURWARE '09, Athens/Glyfada, Greece, Jun. 18-23, 2009 , pp. 121-128
    • Savola, R.1    Abie, H.2
  • 11
    • 78149392355 scopus 로고    scopus 로고
    • A Security Metrics Taxonomization Model for Software- Intensive Systems
    • Dec.
    • R. Savola, "A Security Metrics Taxonomization Model for Software- Intensive Systems," Journal of Information Processing Systems, Vol. 5, No. 4, Dec. 2009, pp. 197-206.
    • (2009) Journal of Information Processing Systems , vol.5 , Issue.4 , pp. 197-206
    • Savola, R.1
  • 14
    • 84988573115 scopus 로고    scopus 로고
    • The Design and Implementation of Tripwire: A System Integrity Checker
    • Fairfax, VA, Nov. 2-4, 1994
    • G. H. Kim and E. H. Spafford, "The Design and Implementation of Tripwire: a System Integrity Checker," Computer and Communications Security, Fairfax, VA, Nov. 2-4, 1994, pp. 18-29.
    • Computer and Communications Security , pp. 18-29
    • Kim, G.H.1    Spafford, E.H.2
  • 15
  • 16
    • 34047178394 scopus 로고    scopus 로고
    • A Metrics Framework to Drive Application Security Improvement
    • Mar./Apr.
    • E. A. Nichols and G. Peterson, "A Metrics Framework to Drive Application Security Improvement," IEEE Security & Privacy, Mar./Apr. 2007, pp. 88-91.
    • (2007) IEEE Security & Privacy , pp. 88-91
    • Nichols, E.A.1    Peterson, G.2
  • 19
    • 0035499176 scopus 로고    scopus 로고
    • Managing Vulnerabilities in Networked Systems
    • Nov.
    • R. A. Martin, "Managing Vulnerabilities in Networked Systems," IEEE Computer Society Computer Magazine, Vol. 34, No. 11, Nov. 2001.
    • (2001) IEEE Computer Society Computer Magazine , vol.34 , Issue.11
    • Martin, R.A.1
  • 21
  • 22
    • 79952052010 scopus 로고    scopus 로고
    • Web Application Security Consortium (WASC), Version 2.0. [Online]. Available: April 14
    • Web Application Security Consortium (WASC), "Threat Classification," Version 2.0. [Online]. Available: www.webappsec.org [April 14, 2010].
    • (2010) Threat Classification
  • 23
    • 79952054193 scopus 로고    scopus 로고
    • Online. Available: April 14
    • SANS Institute, "The Top Cyber Security Security Risks." [Online]. Available: www.sans.org/top-cyber-security-risks/ [April 14, 2010].
    • (2010) The Top Cyber Security Security Risks
  • 26
    • 78149392139 scopus 로고    scopus 로고
    • On the Feasibility of Utilizing Security Metrics in Software-Intensive Systems
    • Jan.
    • R. Savola, "On the Feasibility of Utilizing Security Metrics in Software-Intensive Systems," International Journal of Computer Science and Network Security, Vol. 10, No. 1, Jan. 2010, pp. 230-239.
    • (2010) International Journal of Computer Science and Network Security , vol.10 , Issue.1 , pp. 230-239
    • Savola, R.1
  • 27
    • 77958006342 scopus 로고    scopus 로고
    • Definition of Core Requirements and a Reference Architecture for a Dependable, Secure and Adaptive Distributed Monitoring Framework
    • T. Kanstrén and R. Savola, "Definition of Core Requirements and a Reference Architecture for a Dependable, Secure and Adaptive Distributed Monitoring Framework," DEPEND 2010, Venice, Italy, July 18-25, 2010, 10 p.
    • DEPEND 2010, Venice, Italy, July 18-25, 2010 , pp. 10
    • Kanstrén, T.1    Savola, R.2
  • 28
    • 79952061492 scopus 로고    scopus 로고
    • Security Monitoring in Heterogeneous Globally Distributed Environments
    • P. Venables, "Security Monitoring in Heterogeneous Globally Distributed Environments," Information Security Technical Report, Vol. 3, No. 4, 1998, pp. 15-31.
    • (1998) Information Security Technical Report , vol.3 , Issue.4 , pp. 15-31
    • Venables, P.1
  • 29
    • 36849071900 scopus 로고    scopus 로고
    • Constructing Scalable Overlays for Pub-Sub with Many Topics - Problems, Algorithms and Evaluation
    • G. Chockler, R. Melamed, Y. Tock, R. Vitenberg, "Constructing Scalable Overlays for Pub-Sub with Many Topics - Problems, Algorithms and Evaluation," PODC '07, Portland, Oregon, USA, 2007, pp. 109-118.
    • PODC '07, Portland, Oregon, USA, 2007 , pp. 109-118
    • Chockler, G.1    Melamed, R.2    Tock, Y.3    Vitenberg, R.4
  • 31
    • 79952056159 scopus 로고    scopus 로고
    • Insecure.org. [Online]. Available: April 14
    • Insecure.org. [Online]. Available: www.insecure.org [April 14, 2010].
    • (2010)
  • 33
    • 79952054656 scopus 로고    scopus 로고
    • Annales UMCS
    • Published in
    • Published in Annales UMCS, Informatica, AI 8, pp. 186-201.
    • Informatica, AI , vol.8 , pp. 186-201
  • 39
    • 34748910209 scopus 로고    scopus 로고
    • Technical Report MSU-CSE-03-35, Michigan State University, East Lansing, Michigan, Dec.
    • S. Sadjadi, "A Survey of Adaptive Middleware," Technical Report MSU-CSE-03-35, Michigan State University, East Lansing, Michigan, Dec. 2003.
    • (2003) A Survey of Adaptive Middleware
    • Sadjadi, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.