메뉴 건너뛰기




Volumn 10, Issue 4, 2012, Pages 433-453

Defining and computing a value based cyber-security measure

Author keywords

Algorithms; Cyber security metrics; Design; Economics; Experimentation; Information security; Measurement; Performance; Reliability; Risk management; Security; Theory; Verification

Indexed keywords


EID: 84870389187     PISSN: 16179846     EISSN: 16179854     Source Type: Journal    
DOI: 10.1007/s10257-011-0177-1     Document Type: Article
Times cited : (18)

References (13)
  • 4
    • 2942753973 scopus 로고    scopus 로고
    • Specifying reusable security requirements
    • Firesmith D (2004) Specifying reusable security requirements. J Object Technol 3(1): 61-75.
    • (2004) J Object Technol , vol.3 , Issue.1 , pp. 61-75
    • Firesmith, D.1
  • 5
    • 0003696352 scopus 로고    scopus 로고
    • Acme: architectural descriptions of component-based systems
    • G. T. Leavens and M. Sitaraman (Eds.), Cambridge: Cambridge University Press
    • Garlan D, Monroe RT, Wile D (2000) Acme: architectural descriptions of component-based systems. In: Leavens GT, Sitaraman M (eds) Foundations of component-based systems. Cambridge University Press, Cambridge, pp 47-68.
    • (2000) Foundations of Component-Based Systems , pp. 47-68
    • Garlan, D.1    Monroe, R.T.2    Wile, D.3
  • 6
    • 79960016261 scopus 로고    scopus 로고
    • Software architecture-based self-adaptation
    • In: Mieso Denko LYaYZ (ed), Springer, US, doi: 10. 1007/978-0-387-89828-5_2. ISBN 978-0-387-89827-8
    • Garlan D, Schmerl B, Cheng S-W (2009) Software architecture-based self-adaptation. In: Mieso Denko LYaYZ (ed) Autonomic computing and networking, vol 21. Springer, US. pp 31-55. doi: 10. 1007/978-0-387-89828-5_2. ISBN 978-0-387-89827-8.
    • (2009) Autonomic Computing and Networking , vol.21 , pp. 31-55
    • Garlan, D.1    Schmerl, B.2    Cheng, S.-W.3
  • 7
    • 58149425798 scopus 로고
    • A theory of human motivation
    • Maslow AH (1943) A theory of human motivation. Origin Pub Psychol Rev 50: 370-396.
    • (1943) Origin Pub Psychol Rev , vol.50 , pp. 370-396
    • Maslow, A.H.1
  • 9
    • 70350663438 scopus 로고    scopus 로고
    • Paper presented at the ICEIS 2003, proceedings of the 5th international conference on enterprise information systems, Angers, France, 22-26 April 2003
    • Sawma VD, Probert RL (2003) E-commerce authenication: an effective countermeasures design model. In: Paper presented at the ICEIS 2003, proceedings of the 5th international conference on enterprise information systems, Angers, France, 22-26 April 2003.
    • Probert RL (2003) E-commerce Authenication: An Effective Countermeasures Design Model
    • Sawma, V.D.1
  • 10
    • 70350634493 scopus 로고    scopus 로고
    • Requirements driven multiple view paradigm for developing security architecture
    • Sekaran KC (2007) Requirements driven multiple view paradigm for developing security architecture. PWASET Proc World Acad Sci Eng Technol 25: 156-159.
    • (2007) PWASET Proc World Acad Sci Eng Technol , vol.25 , pp. 156-159
    • Sekaran, K.C.1
  • 12
    • 84870389715 scopus 로고    scopus 로고
    • ®, Accessed 19 July 2010
    • ® (2010) Maslow's hierarchy of needs. http://en.wikipedia.org/wiki/Maslow%27s_hierarchy_of_needs. Accessed 19 July 2010.
    • (2010) Maslow's Hierarchy of Needs


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.