-
3
-
-
33745457297
-
Information assurance assessment: Lessons-learned and challenges
-
Williamsburg, VA
-
D. Bodeau Information assurance assessment: lessons-learned and challenges Proceedings of WISSSR, 2001 Williamsburg, VA 2001
-
(2001)
Proceedings of WISSSR, 2001
-
-
Bodeau, D.1
-
7
-
-
40949132579
-
A broad, quantitative model for making early requirements decisions
-
DOI 10.1109/MS.2008.29
-
M. Feather, S.L. Cornford, K.A. Hicks, J.D. Kiper, and T. Menzies T. A Broad Quantitative Model for Making Requirements Decisions IEEE Software 25 2 2008 49 56 (Pubitemid 351404575)
-
(2008)
IEEE Software
, vol.25
, Issue.2
, pp. 49-56
-
-
Feather, M.S.1
Cornford, S.L.2
Hicks, K.A.3
Kiper, J.D.4
Menzies, T.5
-
9
-
-
77956612506
-
The irreversible march of technology
-
Elsevier
-
Furnell, S.M.; 2009. The irreversible march of technology, Information Security Technical Report 14(4), 176-180, Elsevier.
-
(2009)
Information Security Technical Report
, vol.14
, Issue.4
, pp. 176-180
-
-
Furnell, S.M.1
-
10
-
-
33847635680
-
Early quality prediction of component-based systems - A generic framework
-
DOI 10.1016/j.jss.2006.08.014, PII S0164121206002238
-
L. Grunske Early quality prediction of component-based systems - a generic framework Journal of Systems and Software 80 5 2007 p.678 p.686 (Pubitemid 46367889)
-
(2007)
Journal of Systems and Software
, vol.80
, Issue.5
, pp. 678-686
-
-
Grunske, L.1
-
11
-
-
50049117473
-
Quantitative risk-based security prediction for component-based systems with explicitly modeled attack profiles
-
L. Grunske, and D. Joyce Quantitative risk-based security prediction for component-based systems with explicitly modeled attack profiles Journal of Systems and Software 81 8 2008 1327 1345
-
(2008)
Journal of Systems and Software
, vol.81
, Issue.8
, pp. 1327-1345
-
-
Grunske, L.1
Joyce, D.2
-
13
-
-
70350442547
-
On the operational security assurance evaluation of networked IT systems
-
5764/2009
-
A. Hecker, and M. Riguidel On the operational security assurance evaluation of networked IT systems Lecture Notes in Computer Science 2009 266 278 5764/2009
-
(2009)
Lecture Notes in Computer Science
, pp. 266-278
-
-
Hecker, A.1
Riguidel, M.2
-
14
-
-
27644590275
-
A consensus support system model for group decision-making problems with multigranular linguistic preference relations
-
DOI 10.1109/TFUZZ.2005.856561
-
E. Herrera-Viedma, L. Martinez, F. Mata, and F. Chiclana A consensus support system model for group decision-making problems with multi-granular linguistic preference relations IEEE Transactions on Fuzzy Systems 13 5 2005 644 658 (Pubitemid 41555591)
-
(2005)
IEEE Transactions on Fuzzy Systems
, vol.13
, Issue.5
, pp. 644-658
-
-
Herrera-Viedma, E.1
Martinez, L.2
Mata, F.3
Chiclana, F.4
-
18
-
-
77950516884
-
Eliciting security requirements and tracing them to design: An integration of common criteria, heuristics, and UMLsec
-
S.H. Houmb, S. Islam, E. Knauss, J. Jürjens, and K. Schneider Eliciting security requirements and tracing them to design: an integration of common criteria, heuristics, and UMLsec Requirements Engineering Journal (REJ) 15 1 2010 63 93
-
(2010)
Requirements Engineering Journal (REJ)
, vol.15
, Issue.1
, pp. 63-93
-
-
Houmb, S.H.1
Islam, S.2
Knauss, E.3
Jürjens, J.4
Schneider, K.5
-
22
-
-
77953158482
-
-
National Institute of Standards and Technology, Special publication #NISTIR 7564, NIST, Gaithersburg, MD
-
Jansen W.; 2009. Directions in Security Metrics Research. National Institute of Standards and Technology, Special publication #NISTIR 7564, NIST, Gaithersburg, MD.
-
(2009)
Directions in Security Metrics Research
-
-
Jansen, W.1
-
29
-
-
38649124635
-
A new evaluation strategy based on combining CC and SSE-CMM for security systems and products
-
DOI 10.1109/GCC.2006.12, 4031487, Proceedings - Fifth International Conference on Grid and Cooperative Computing, GCC 2006
-
T. Liang, and Z. Ming-Tian A new evaluation strategy based on combining CC and SSE-CMM for security systems and products Proceedings of the fifth International Conference on Grid and Cooperative Computing Hunan, China 2006 395 403 (Pubitemid 351165011)
-
(2006)
Proceedings - Fifth International Conference on Grid and Cooperative Computing, GCC 2006
, pp. 395-403
-
-
Liang, T.1
Ming-Tian, Z.2
-
32
-
-
34548508691
-
Security Attack Testing (SAT)-testing the security of information systems at design time
-
DOI 10.1016/j.is.2007.03.002, PII S0306437907000117
-
H. Mouratidis, and P. Giorgini Security Attack Testing (SAT) - testing the security of information systems at design time Information System 32 8 2007 1166 1183 (Pubitemid 47379495)
-
(2007)
Information Systems
, vol.32
, Issue.8
, pp. 1166-1183
-
-
Mouratidis, H.1
Giorgini, P.2
-
35
-
-
58049139930
-
Deployment of a security assurance monitoring framework for telecommunication service infrastructures on a VoIP system
-
M. Ouedraogo, D. Khadraoui, B. De Rémont, E. Dubois, and H. Mouratidis Deployment of a security assurance monitoring framework for telecommunication service infrastructures on a VoIP system Proceedings of the Second International Conference on New Technologies, Mobility and Security, Tangier, Morocco 2008 98 102
-
(2008)
Proceedings of the Second International Conference on New Technologies, Mobility and Security, Tangier, Morocco
, pp. 98-102
-
-
Ouedraogo, M.1
Khadraoui, D.2
De Rémont, B.3
Dubois, E.4
Mouratidis, H.5
-
36
-
-
80755136267
-
-
PhD thesis School of Architecture, Computing and Engineering, University of East London, England, UK
-
Ouedraogo, M.; 2011. Valuation and reporting of security assurance at operational systems level, PhD thesis School of Architecture, Computing and Engineering, University of East London, England, UK.
-
(2011)
Valuation and Reporting of Security Assurance at Operational Systems Level
-
-
Ouedraogo, M.1
-
38
-
-
74549200704
-
Using Nagios to monitor faults in a self-healing environment
-
University of Helsinki
-
M.A. Pervilä Using Nagios to monitor faults in a self-healing environment Seminar on Self-Healing Systems 2007 University of Helsinki
-
(2007)
Seminar on Self-Healing Systems
-
-
Pervilä, M.A.1
-
39
-
-
51849089070
-
A near real-time system for security assurance assessment
-
Bucharest, Romania
-
N. Pham, L. Baud, P. Bellot, and M. Riguidel A near real-time system for security assurance assessment Proceedings of the third International Conference on Internet Monitoring and Protection Bucharest, Romania 2008 152 160
-
(2008)
Proceedings of the Third International Conference on Internet Monitoring and Protection
, pp. 152-160
-
-
Pham, N.1
Baud, L.2
Bellot, P.3
Riguidel, M.4
-
40
-
-
80755173578
-
-
Samhain. (accessed 10.11.10)
-
Samhain. http://www.la-samhain.de/samhain/ (accessed 10.11.10).
-
-
-
-
42
-
-
33745435096
-
Current trends and advances in information assurance metrics
-
N. Seddigh, P. Pieda, A. Matrawy, B. Nandy, L. Lambadaris, and A. Hatfield Current trends and advances in information assurance metrics Proceedings of Privacy Security and Trust Conference 2004 197 205
-
(2004)
Proceedings of Privacy Security and Trust Conference
, pp. 197-205
-
-
Seddigh, N.1
Pieda, P.2
Matrawy, A.3
Nandy, B.4
Lambadaris, L.5
Hatfield, A.6
-
43
-
-
17744373483
-
-
PhD thesis School of Computer Science Carnegie Mellon University
-
Sheyner, O.M.; 2004. Scenario Graphs and Attack Graphs. PhD thesis School of Computer Science Carnegie Mellon University.
-
(2004)
Scenario Graphs and Attack Graphs
-
-
Sheyner, O.M.1
-
44
-
-
84908880017
-
Information assurance metrics: Prophecy, process, or pipedream? Panel workshop
-
Baltimore, USA
-
M.J. Skroch, J. McHugh, and J.M. Wiliams Information assurance metrics: prophecy, process, or pipedream? Panel workshop Proceedings of National Information System Security Conference Baltimore, USA 2000
-
(2000)
Proceedings of National Information System Security Conference
-
-
Skroch, M.J.1
McHugh, J.2
Wiliams, J.M.3
-
47
-
-
1842829828
-
-
NIST 800-30, Gaithersburg, MD
-
Stoneburner, G.; Goguen, A.; Feringa, A.; 2002. Risk management guide for Information Technology systems, recommendations of the National Institute of Standards and Technology, NIST 800-30, Gaithersburg, MD.
-
(2002)
Risk Management Guide for Information Technology Systems, Recommendations of the National Institute of Standards and Technology
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
49
-
-
12244283592
-
-
NIST Special publication #800-55, Gaithersburg, MD
-
Swanson, M.; Nadya, B.; Sabato, J.; Hash, J.; Graffo, L.; 2003. Security Metrics Guide for Information Technology Systems, NIST Special publication #800-55, Gaithersburg, MD.
-
(2003)
Security Metrics Guide for Information Technology Systems
-
-
Swanson, M.1
Nadya, B.2
Sabato, J.3
Hash, J.4
Graffo, L.5
-
50
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
DOI 10.1109/32.879820
-
A. Van Lamsweerde, and E. Letier Handling obstacles in goal-oriented requirements engineering IEEE Transactions on Software Engineering Special Issue on Exception Handling 26 10 2000 978 1005 (Pubitemid 32031734)
-
(2000)
IEEE Transactions on Software Engineering
, vol.26
, Issue.10
, pp. 978-1005
-
-
Van Lamsweerde, A.1
-
51
-
-
84969544889
-
Information assurance measures and metrics - State of practice and proposed taxonomy
-
Hawaii
-
R.B. Vaughn, R. Henning, and A. Siraj Information assurance measures and metrics - state of practice and proposed taxonomy Proceedings of the IEEE/HICSS'03 Hawaii 2002
-
(2002)
Proceedings of the IEEE/HICSS'03
-
-
Vaughn, R.B.1
Henning, R.2
Siraj, A.3
-
52
-
-
80755187372
-
-
WISSSR - Workshop on Information, Security System Scoring and Ranking May 21-23, 2001, Williamsburg, VA
-
WISSSR - Workshop on Information, Security System Scoring and Ranking, 2001. Information System Security Attribute Quantification or Ordering (Commonly but improperly know as security metrics) - Workshop Proceedings, May 21-23, 2001, Williamsburg, VA.
-
(2001)
Information System Security Attribute Quantification or Ordering (Commonly but Improperly Know As Security Metrics) - Workshop Proceedings
-
-
-
53
-
-
3042617182
-
A quantitative study of firewall configuration errors
-
A. Wool A quantitative study of firewall configuration errors Computer 37 6 2004 62 67
-
(2004)
Computer
, vol.37
, Issue.6
, pp. 62-67
-
-
Wool, A.1
|