-
5
-
-
23844470859
-
A reference model for security level evaluation: Policy and fuzzy techniques
-
Casola V., et.al. (2005). A Reference Model for Security Level Evaluation: Policy and Fuzzy Techniques. Journal of Universal Computer Science, pages 150-174.
-
(2005)
Journal of Universal Computer Science
, pp. 150-174
-
-
Casola, V.1
-
6
-
-
84882690392
-
A SLA evaluation methodology in service oriented architectures
-
volume 23 of Springer Advances in Information Security
-
Casola V., et.al. (2006). A SLA evaluation methodology in Service Oriented Architectures. In Quality of Protection, volume 23 of Springer Advances in Information Security, pages 119-130.
-
(2006)
Quality of Protection
, pp. 119-130
-
-
Casola, V.1
-
7
-
-
38049094526
-
Interoperable Grid PKIs among untrusted domains: An architectural proposal
-
volume 4459 of Springer Lecture Notes in Computer Science
-
Casola, V., et.al. (2007). Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal. In Advances in Grid and Pervasive Computing, volume 4459 of Springer Lecture Notes in Computer Science, pages 39-51.
-
(2007)
Advances in Grid and Pervasive Computing
, pp. 39-51
-
-
Casola, V.1
-
9
-
-
84867658553
-
-
Online
-
Center for Internet Security (2009). User Guide for CISCAT. Online: http://benchmarks.cisecurity.org/enus/docs/user-guides/CIS-CAT-Users-Guide.pdf.
-
(2009)
User Guide for CISCAT
-
-
-
10
-
-
84867659939
-
-
Online
-
Cloud Security Alliance (2011a). Security metrics workgroup. Online: http://www.cloudsecurityalliance.org/Research.html.
-
(2011)
Security Metrics Workgroup
-
-
-
17
-
-
85014616232
-
Assessing the security of internet connected critical infrastructures (the CoMiFin project approach)
-
Ghani, H., et.al. (2010). Assessing the Security of Internet Connected Critical Infrastructures (The CoMiFin Project Approach). In Proc. of the Workshop on Security of the Internet of Things.
-
(2010)
Proc. of the Workshop on Security of the Internet of Things
-
-
Ghani, H.1
-
18
-
-
0033489646
-
Security service level agreements: Quantifiable security for the enterprise?
-
Henning, R. (1999). Security service level agreements: quantifiable security for the enterprise? In Proc. of the ACMWorkshop on New security paradigms, pages 54-60.
-
(1999)
Proc. of the ACMWorkshop on New Security Paradigms
, pp. 54-60
-
-
Henning, R.1
-
21
-
-
80054076363
-
A general method for assessment of security in complex services
-
volume 6994 of Springer Lecture Notes in Computer Science
-
Krautsevich, L., et.al. (2011). A general method for assessment of security in complex services. In Towards a Service-Based Internet, volume 6994 of Springer Lecture Notes in Computer Science, pages 153-164.
-
(2011)
Towards A Service-Based Internet
, pp. 153-164
-
-
Krautsevich, L.1
-
29
-
-
77950875313
-
Quantified security is a weak hypothesis: A critical survey of results and assumptions
-
Verendel, V. (2009). Quantified security is a weak hypothesis: a critical survey of results and assumptions. In Proc. of the ACM Workshop on new security paradigms, pages 37-50.
-
(2009)
Proc. of the ACM Workshop on New Security Paradigms
, pp. 37-50
-
-
Verendel, V.1
-
30
-
-
84867651895
-
-
Online
-
Weisstein, W. (2011a). Frobenius Norm. Online: http://mathworld.wolfram. com/FrobeniusNorm.html.
-
(2011)
Frobenius Norm
-
-
Weisstein, W.1
-
31
-
-
84867658559
-
-
Online
-
Weisstein, W. (2011b). L1-Norm. Online: http://mathworld.wolfram.com/L1- Norm.html.
-
(2011)
L1-Norm
-
-
Weisstein, W.1
|