메뉴 건너뛰기




Volumn 85, Issue 1, 2012, Pages 193-208

Appraisal and reporting of security assurance at operational systems level

Author keywords

Measurement; Metrics specification; Probes; Risk; Security assurance; Security mechanisms; Verification of security; Verification process quality

Indexed keywords

INSURANCE COMPANIES; METRICS SPECIFICATION; OPERATIONAL SYSTEMS; RUNTIME SYSTEMS; SECURITY ASSURANCE; SECURITY MECHANISM; VERIFICATION PROCESS QUALITY;

EID: 80755140556     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2011.08.013     Document Type: Article
Times cited : (22)

References (54)
  • 3
    • 33745457297 scopus 로고    scopus 로고
    • Information assurance assessment: Lessons-learned and challenges
    • Williamsburg, VA
    • D. Bodeau Information assurance assessment: lessons-learned and challenges Proceedings of WISSSR, 2001 Williamsburg, VA 2001
    • (2001) Proceedings of WISSSR, 2001
    • Bodeau, D.1
  • 7
    • 40949132579 scopus 로고    scopus 로고
    • A broad, quantitative model for making early requirements decisions
    • DOI 10.1109/MS.2008.29
    • M. Feather, S.L. Cornford, K.A. Hicks, J.D. Kiper, and T. Menzies T. A Broad Quantitative Model for Making Requirements Decisions IEEE Software 25 2 2008 49 56 (Pubitemid 351404575)
    • (2008) IEEE Software , vol.25 , Issue.2 , pp. 49-56
    • Feather, M.S.1    Cornford, S.L.2    Hicks, K.A.3    Kiper, J.D.4    Menzies, T.5
  • 9
    • 77956612506 scopus 로고    scopus 로고
    • The irreversible march of technology
    • Elsevier
    • Furnell, S.M.; 2009. The irreversible march of technology, Information Security Technical Report 14(4), 176-180, Elsevier.
    • (2009) Information Security Technical Report , vol.14 , Issue.4 , pp. 176-180
    • Furnell, S.M.1
  • 10
    • 33847635680 scopus 로고    scopus 로고
    • Early quality prediction of component-based systems - A generic framework
    • DOI 10.1016/j.jss.2006.08.014, PII S0164121206002238
    • L. Grunske Early quality prediction of component-based systems - a generic framework Journal of Systems and Software 80 5 2007 p.678 p.686 (Pubitemid 46367889)
    • (2007) Journal of Systems and Software , vol.80 , Issue.5 , pp. 678-686
    • Grunske, L.1
  • 11
    • 50049117473 scopus 로고    scopus 로고
    • Quantitative risk-based security prediction for component-based systems with explicitly modeled attack profiles
    • L. Grunske, and D. Joyce Quantitative risk-based security prediction for component-based systems with explicitly modeled attack profiles Journal of Systems and Software 81 8 2008 1327 1345
    • (2008) Journal of Systems and Software , vol.81 , Issue.8 , pp. 1327-1345
    • Grunske, L.1    Joyce, D.2
  • 13
    • 70350442547 scopus 로고    scopus 로고
    • On the operational security assurance evaluation of networked IT systems
    • 5764/2009
    • A. Hecker, and M. Riguidel On the operational security assurance evaluation of networked IT systems Lecture Notes in Computer Science 2009 266 278 5764/2009
    • (2009) Lecture Notes in Computer Science , pp. 266-278
    • Hecker, A.1    Riguidel, M.2
  • 14
    • 27644590275 scopus 로고    scopus 로고
    • A consensus support system model for group decision-making problems with multigranular linguistic preference relations
    • DOI 10.1109/TFUZZ.2005.856561
    • E. Herrera-Viedma, L. Martinez, F. Mata, and F. Chiclana A consensus support system model for group decision-making problems with multi-granular linguistic preference relations IEEE Transactions on Fuzzy Systems 13 5 2005 644 658 (Pubitemid 41555591)
    • (2005) IEEE Transactions on Fuzzy Systems , vol.13 , Issue.5 , pp. 644-658
    • Herrera-Viedma, E.1    Martinez, L.2    Mata, F.3    Chiclana, F.4
  • 18
    • 77950516884 scopus 로고    scopus 로고
    • Eliciting security requirements and tracing them to design: An integration of common criteria, heuristics, and UMLsec
    • S.H. Houmb, S. Islam, E. Knauss, J. Jürjens, and K. Schneider Eliciting security requirements and tracing them to design: an integration of common criteria, heuristics, and UMLsec Requirements Engineering Journal (REJ) 15 1 2010 63 93
    • (2010) Requirements Engineering Journal (REJ) , vol.15 , Issue.1 , pp. 63-93
    • Houmb, S.H.1    Islam, S.2    Knauss, E.3    Jürjens, J.4    Schneider, K.5
  • 22
    • 77953158482 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Special publication #NISTIR 7564, NIST, Gaithersburg, MD
    • Jansen W.; 2009. Directions in Security Metrics Research. National Institute of Standards and Technology, Special publication #NISTIR 7564, NIST, Gaithersburg, MD.
    • (2009) Directions in Security Metrics Research
    • Jansen, W.1
  • 29
    • 38649124635 scopus 로고    scopus 로고
    • A new evaluation strategy based on combining CC and SSE-CMM for security systems and products
    • DOI 10.1109/GCC.2006.12, 4031487, Proceedings - Fifth International Conference on Grid and Cooperative Computing, GCC 2006
    • T. Liang, and Z. Ming-Tian A new evaluation strategy based on combining CC and SSE-CMM for security systems and products Proceedings of the fifth International Conference on Grid and Cooperative Computing Hunan, China 2006 395 403 (Pubitemid 351165011)
    • (2006) Proceedings - Fifth International Conference on Grid and Cooperative Computing, GCC 2006 , pp. 395-403
    • Liang, T.1    Ming-Tian, Z.2
  • 31
  • 32
    • 34548508691 scopus 로고    scopus 로고
    • Security Attack Testing (SAT)-testing the security of information systems at design time
    • DOI 10.1016/j.is.2007.03.002, PII S0306437907000117
    • H. Mouratidis, and P. Giorgini Security Attack Testing (SAT) - testing the security of information systems at design time Information System 32 8 2007 1166 1183 (Pubitemid 47379495)
    • (2007) Information Systems , vol.32 , Issue.8 , pp. 1166-1183
    • Mouratidis, H.1    Giorgini, P.2
  • 38
    • 74549200704 scopus 로고    scopus 로고
    • Using Nagios to monitor faults in a self-healing environment
    • University of Helsinki
    • M.A. Pervilä Using Nagios to monitor faults in a self-healing environment Seminar on Self-Healing Systems 2007 University of Helsinki
    • (2007) Seminar on Self-Healing Systems
    • Pervilä, M.A.1
  • 40
    • 80755173578 scopus 로고    scopus 로고
    • Samhain. (accessed 10.11.10)
    • Samhain. http://www.la-samhain.de/samhain/ (accessed 10.11.10).
  • 43
    • 17744373483 scopus 로고    scopus 로고
    • PhD thesis School of Computer Science Carnegie Mellon University
    • Sheyner, O.M.; 2004. Scenario Graphs and Attack Graphs. PhD thesis School of Computer Science Carnegie Mellon University.
    • (2004) Scenario Graphs and Attack Graphs
    • Sheyner, O.M.1
  • 50
    • 0034291619 scopus 로고    scopus 로고
    • Handling obstacles in goal-oriented requirements engineering
    • DOI 10.1109/32.879820
    • A. Van Lamsweerde, and E. Letier Handling obstacles in goal-oriented requirements engineering IEEE Transactions on Software Engineering Special Issue on Exception Handling 26 10 2000 978 1005 (Pubitemid 32031734)
    • (2000) IEEE Transactions on Software Engineering , vol.26 , Issue.10 , pp. 978-1005
    • Van Lamsweerde, A.1
  • 51
    • 84969544889 scopus 로고    scopus 로고
    • Information assurance measures and metrics - State of practice and proposed taxonomy
    • Hawaii
    • R.B. Vaughn, R. Henning, and A. Siraj Information assurance measures and metrics - state of practice and proposed taxonomy Proceedings of the IEEE/HICSS'03 Hawaii 2002
    • (2002) Proceedings of the IEEE/HICSS'03
    • Vaughn, R.B.1    Henning, R.2    Siraj, A.3
  • 53
    • 3042617182 scopus 로고    scopus 로고
    • A quantitative study of firewall configuration errors
    • A. Wool A quantitative study of firewall configuration errors Computer 37 6 2004 62 67
    • (2004) Computer , vol.37 , Issue.6 , pp. 62-67
    • Wool, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.