메뉴 건너뛰기




Volumn 6633 LNCS, Issue , 2011, Pages 304-319

Formal analysis of security metrics and risk

Author keywords

[No Author keywords available]

Indexed keywords

FORMAL ANALYSIS; FORMAL DEFINITION; HARD TASK; SECURITY METRICS;

EID: 79958775085     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-21040-2_22     Document Type: Conference Paper
Times cited : (11)

References (27)
  • 1
    • 33846217033 scopus 로고    scopus 로고
    • Degradation models and implied lifetime distributions
    • Bae, S.J., et al.: Degradation models and implied lifetime distributions. Reliability Engineering & System Safety 92(5), 601-608 (2007)
    • (2007) Reliability Engineering & System Safety , vol.92 , Issue.5 , pp. 601-608
    • Bae, S.J.1
  • 4
    • 0034516080 scopus 로고    scopus 로고
    • Information security management: An approach to combine process certification and product evaluation
    • Eloff, M.M., von Solms, S.H.: Information security management: An approach to combine process certification and product evaluation. Computers & Security 19(8), 609-698 (2000)
    • (2000) Computers & Security , vol.19 , Issue.8 , pp. 609-698
    • Eloff, M.M.1    Von Solms, S.H.2
  • 9
    • 77953158482 scopus 로고    scopus 로고
    • Technical Report NISTIR 7564, National institute of Standards and Technology
    • Jansen, W.: Directions in security metric research. Technical Report NISTIR 7564, National institute of Standards and Technology (2009)
    • (2009) Directions in Security Metric Research
    • Jansen, W.1
  • 11
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker behavior
    • Jonsson, E., Olovsson, T.: A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering 23(4), 235-245 (1997)
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.4 , pp. 235-245
    • Jonsson, E.1    Olovsson, T.2
  • 16
    • 34547444679 scopus 로고    scopus 로고
    • Technical Report CMU-CS- 05-155, School of Computer Science. Carnegie Mellon University
    • Manadhata, P., Wing, J.M.: An attack surface metric. Technical Report CMU-CS- 05-155, School of Computer Science. Carnegie Mellon University (2005)
    • (2005) An Attack Surface Metric
    • Manadhata, P.1    Wing, J.M.2
  • 17
    • 67650131779 scopus 로고    scopus 로고
    • Technical Report CMU-CS-07-146, School of Computer Science. Carnegie Mellon University
    • Manadhata, P.K., et al.: An approach to measuring a systems attack surface. Technical Report CMU-CS-07-146, School of Computer Science. Carnegie Mellon University (2007)
    • (2007) An Approach to Measuring A Systems Attack Surface
    • Manadhata, P.K.1
  • 18
    • 0032298158 scopus 로고    scopus 로고
    • The lognormal distribution of software failure rates: Application to software reliability growth modeling
    • November
    • Mullen, R.: The lognormal distribution of software failure rates: application to software reliability growth modeling. In: The Ninth International Symposium on Software Reliability Engineering, pp. 134-142 (November 1998)
    • (1998) The Ninth International Symposium on Software Reliability Engineering , pp. 134-142
    • Mullen, R.1
  • 19
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Ortalo, R., et al.: Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering 25(5), 633-650 (1999)
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1
  • 20
    • 34547454437 scopus 로고    scopus 로고
    • A weakest-adversary security metric for network configuration security analysis
    • ACM Press, New York
    • Pamula, J., et al.: A weakest-adversary security metric for network configuration security analysis. In: QoP 2006: Proceedings of the 2nd ACMWorkshop on Quality of Protection, pp. 31-38. ACM Press, New York (2006)
    • (2006) QoP 2006: Proceedings of the 2nd ACMWorkshop on Quality of Protection , pp. 31-38
    • Pamula, J.1
  • 21
    • 84944051648 scopus 로고    scopus 로고
    • How to buy better testing
    • Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. Springer, Heidelberg
    • Schechter, S.E.: How to buy better testing. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol. 2437, pp. 73-87. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2437 , pp. 73-87
    • Schechter, S.E.1
  • 22
    • 3042857071 scopus 로고    scopus 로고
    • On risk: Perception and direction
    • Stewart, A.: On risk: perception and direction. Computers & Security 23(5), 362-370 (2004)
    • (2004) Computers & Security , vol.23 , Issue.5 , pp. 362-370
    • Stewart, A.1
  • 27
    • 33750984193 scopus 로고    scopus 로고
    • Minimum-cost network hardening using attack graphs
    • Wang, L., et al.: Minimum-cost network hardening using attack graphs. Computer Communications 29(18), 3812-3824 (2006)
    • (2006) Computer Communications , vol.29 , Issue.18 , pp. 3812-3824
    • Wang, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.