메뉴 건너뛰기




Volumn , Issue , 2011, Pages

A visualization and modeling tool for security metrics and measurements management

Author keywords

risk management; security assurance; security metrics; visualization

Indexed keywords

INFORMATION-SECURITY MEASUREMENT; MODELING TOOL; SECURITY ASSURANCE; SECURITY METRICS; SECURITY OBJECTIVES; SOFTWARE INTENSIVE SYSTEMS;

EID: 80053954598     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISSA.2011.6027518     Document Type: Conference Paper
Times cited : (28)

References (33)
  • 1
    • 79952066716 scopus 로고    scopus 로고
    • Security-measurability-enhancing mechanisms for a distributed adaptive security monitoring system
    • R. Savola and P. Heinonen, "Security-measurability-enhancing mechanisms for a distributed adaptive security monitoring system", SECURWARE '10, Venice/Mestre, Italy, Jul. 18-25, 2010, pp. 25-34.
    • SECURWARE '10, Venice/Mestre, Italy, Jul. 18-25, 2010 , pp. 25-34
    • Savola, R.1    Heinonen, P.2
  • 2
    • 78149392355 scopus 로고    scopus 로고
    • A security metrics taxonomization model for software-intensive systems
    • Dec.
    • R. Savola, "A security metrics taxonomization model for software-intensive systems," Journal of Information Processing Systems, Vol. 5, No. 4, Dec. 2009, pp. 197-206.
    • (2009) Journal of Information Processing Systems , vol.5 , Issue.4 , pp. 197-206
    • Savola, R.1
  • 4
    • 78149478612 scopus 로고    scopus 로고
    • A taxonomical approach for information security metrics development
    • R. Savola, "A taxonomical approach for information security metrics development," NORDSEC '07, 2007.
    • (2007) NORDSEC '07
    • Savola, R.1
  • 7
    • 78149392139 scopus 로고    scopus 로고
    • On the feasibility of utilizing security metrics in software-intensive systems
    • Jan.
    • R. Savola, "On the feasibility of utilizing security metrics in software-intensive systems," International Journal of Computer Science and Network Security, Vol. 10, No. 1, Jan. 2010, pp. 230-239.
    • (2010) International Journal of Computer Science and Network Security , vol.10 , Issue.1 , pp. 230-239
    • Savola, R.1
  • 11
    • 77950875313 scopus 로고    scopus 로고
    • Quantified security is a weak hypothesis: A critical survey of results and assumptions
    • V. Verendel, "Quantified security is a weak hypothesis: a critical survey of results and assumptions," New Security Paradigms Workshop, Oxford, U.K., 2009, pp. 37-50.
    • New Security Paradigms Workshop, Oxford, U.K., 2009 , pp. 37-50
    • Verendel, V.1
  • 12
    • 67649952327 scopus 로고    scopus 로고
    • A novel security metrics taxonomy for R&D organisations
    • R. Savola, "A novel security metrics taxonomy for R&D organisations,"ISSA '08, 2008, pp. 379-390.
    • (2008) ISSA '08 , pp. 379-390
    • Savola, R.1
  • 17
    • 77958019527 scopus 로고    scopus 로고
    • Development of measurable security for a distributed messaging system
    • March
    • R. Savola and H. Abie, "Development of measurable security for a distributed messaging system," International Journal on Advances in Security, Vol. 2, No. 4, 2009, pp. 358-380 (March 2010).
    • (2009) International Journal on Advances in Security , vol.2 , Issue.4 , pp. 358-380
    • Savola, R.1    Abie, H.2
  • 18
    • 70449502638 scopus 로고    scopus 로고
    • Identification of basic measurable security components for a distributed messaging system
    • R. Savola and H. Abie, "Identification of basic measurable security components for a distributed messaging system," SECURWARE '09, Athens/Glyfada, Greece, Jun. 18-23, 2009, pp. 121-128.
    • SECURWARE '09, Athens/Glyfada, Greece, Jun. 18-23, 2009 , pp. 121-128
    • Savola, R.1    Abie, H.2
  • 22
    • 77958006342 scopus 로고    scopus 로고
    • Definition of core requirements and a reference architecture for a dependable, secure and adaptive distributed monitoring framework
    • T. Kanstrén and R. Savola, "Definition of core requirements and a reference architecture for a dependable, secure and adaptive distributed monitoring framework", DEPEND '10, Venice/Mestre, Italy, Jul. 18-25, 2010, pp. 154-163.
    • DEPEND '10, Venice/Mestre, Italy, Jul. 18-25, 2010 , pp. 154-163
    • Kanstrén, T.1    Savola, R.2
  • 24
    • 77954001520 scopus 로고    scopus 로고
    • Electronic authentication guideline
    • National Institute of Standards and Technology, U.S. Department of Commerce, Draft, Dec. 8
    • W.E. Burr et al., "Electronic authentication guideline," National Institute of Standards and Technology, U.S. Department of Commerce, NIST Special Publication 800-63-1, Draft, Dec. 8, 2008, 97 p.
    • (2008) NIST Special Publication 800-63-1 , pp. 97
    • Burr, W.E.1
  • 25
    • 80053983247 scopus 로고    scopus 로고
    • Accessed: April 29, 2011
    • SecViz - Security Visualization. http://www.secviz.org/node/89 [Accessed: April 29, 2011].
    • SecViz - Security Visualization


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.