-
1
-
-
79958248566
-
Assessing the maintainability of software product line feature models using structural metrics
-
Bagheri, E., & Gasevic, D. (2010). Assessing the maintainability of software product line feature models using structural metrics. Software Quality Journal, 19(3), 579-612.
-
(2010)
Software Quality Journal
, vol.19
, Issue.3
, pp. 579-612
-
-
Bagheri, E.1
Gasevic, D.2
-
2
-
-
33747205462
-
On the brittleness of software and the infeasibility of security metrics
-
Bellovin, S. M. (2006). On the brittleness of software and the infeasibility of security metrics. IEEE Security & Privacy, 4(4), 96.
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.4
, pp. 96
-
-
Bellovin, S.M.1
-
3
-
-
33745457297
-
Information assurance assessment: Lessons-learned and challenges
-
Williamsburg, VA
-
Bodeau, D. (2001). Information assurance assessment: Lessons-learned and challenges. In Proceedings of WISSRR 2001, Williamsburg, VA.
-
(2001)
In Proceedings of WISSRR 2001
-
-
Bodeau, D.1
-
4
-
-
62649153775
-
Multi-agent based security assurance monitoring system for telecommunication infrastructures
-
Berkeley, California. Anaheim, CA, USA: ACTA Press
-
Bulut, E., Khadraoui, D., & Marquet, B. (2007). Multi-agent based security assurance monitoring system for telecommunication infrastructures. In Proceedings of the communication, network, and information security conference, Berkeley, California. Anaheim, CA, USA: ACTA Press.
-
(2007)
In Proceedings of the communication, network, and information security conference
-
-
Bulut, E.1
Khadraoui, D.2
Marquet, B.3
-
5
-
-
51349132904
-
Security metrics and evaluation of information systems security
-
Pretoria, South Africa: ISSA
-
Chaula, J. A., Yngström, L., & Kowalski, S. (2005). Security metrics and evaluation of information systems security. In Proceedings of the 4th annual conference on information security for South Africa (pp. 1-11). Pretoria, South Africa: ISSA.
-
(2005)
Proceedings of the 4th annual conference on information security for South Africa
, pp. 1-11
-
-
Chaula, J.A.1
Yngström, L.2
Kowalski, S.3
-
6
-
-
52549100186
-
On the effectiveness of early life cycle defect prediction with Bayesian Nets
-
Fenton, N. E., Neil, M., Marsh, W., Hearty, P., Radlinski, L., & Krause, P. (2008). On the effectiveness of early life cycle defect prediction with Bayesian Nets. Empirical Software Engineering, 13(5), 499-537.
-
(2008)
Empirical Software Engineering
, vol.13
, Issue.5
, pp. 499-537
-
-
Fenton, N.E.1
Neil, M.2
Marsh, W.3
Hearty, P.4
Radlinski, L.5
Krause, P.6
-
8
-
-
77956120738
-
Structured assurance case methodology for assessing software trustworthiness
-
Singapore: IEEE Computer Society
-
Fong, E., Kass, M., Rhodes, T., & Boland, F. (2010). Structured assurance case methodology for assessing software trustworthiness. In Proceedings of the 2010 fourth international conference on secure software integration and reliability improvement companion (pp. 32-33). Singapore: IEEE Computer Society.
-
(2010)
Proceedings of the 2010 fourth international conference on secure software integration and reliability improvement companion
, pp. 32-33
-
-
Fong, E.1
Kass, M.2
Rhodes, T.3
Boland, F.4
-
9
-
-
77956612506
-
The irreversible march of technology
-
Furnell, S. M. (2009). The irreversible march of technology. Information Security Technical Report, 14(4), 176-180.
-
(2009)
Information Security Technical Report
, vol.14
, Issue.4
, pp. 176-180
-
-
Furnell, S.M.1
-
10
-
-
49049107220
-
-
Available at, Accessed 10 May 2011
-
Goertzel, K. M., Winograd, T., McKinley, H. L., Oh, L. J., Colon, M., McGibbon, T., et al. (2007). Software security assurance: State of the art report. Available at: http://iac. dtic. mil/iatac/download/security. pdf. Accessed 10 May 2011.
-
(2007)
Software security assurance: State of the art report
-
-
Goertzel, K.M.1
Winograd, T.2
McKinley, H.L.3
Oh, L.J.4
Colon, M.5
McGibbon, T.6
-
12
-
-
50049117473
-
Quantitative risk-based security prediction for component-based systems with explicitly modeled attack profiles
-
Grunske, L., & Joyce, D. (2008). Quantitative risk-based security prediction for component-based systems with explicitly modeled attack profiles. Journal of Systems and Software, 81(8), 1327-1345.
-
(2008)
Journal of Systems and Software
, vol.81
, Issue.8
, pp. 1327-1345
-
-
Grunske, L.1
Joyce, D.2
-
13
-
-
70350442547
-
On the operational security assurance evaluation of networked IT systems
-
Lecture Notes in Computer Science, Berlin, Heidelberg: Springer
-
Hecker, A., & Riguidel, M. (2009). On the operational security assurance evaluation of networked IT systems. In Proceedings of the 9th international conference on smart spaces and next generation wired/wireless networking and second conference on smart spaces. Lecture Notes in Computer Science (Vol. 5764, pp. 266-278). Berlin, Heidelberg: Springer.
-
(2009)
Proceedings of the 9th international conference on smart spaces and next generation wired/wireless networking and second conference on smart spaces
, vol.5764
, pp. 266-278
-
-
Hecker, A.1
Riguidel, M.2
-
15
-
-
0003765587
-
-
ISO/IEC 15048, Geneva, Switzerland: International Organisation for Standardization and the International Electro-technical Commission
-
ISO/IEC 15408. (2006a). Common criteria for information technology, part 1-3, version 3. 1. Geneva, Switzerland: International Organisation for Standardization and the International Electro-technical Commission.
-
(2006)
Common Criteria for Information Technology, Part 1-3, Version 3.1
-
-
-
17
-
-
58049133103
-
-
ISO/IEC 15939, Geneva, Switzerland: International Organisation for Standardization and the International Electro-technical Commission
-
ISO/IEC 15939. (2007). Systems and software engineering-Measurement process. Geneva, Switzerland: International Organisation for Standardization and the International Electro-technical Commission.
-
(2007)
Systems and Software Engineering-Measurement Process
-
-
-
18
-
-
25144500054
-
-
ISO/IEC 21827, Geneva, Switzerland: International Organisation for Standardization and the International Electro-technical Commission
-
ISO/IEC 21827. (2008). Information technology-systems security engineering-capability maturity model (SSE-CMM). Geneva, Switzerland: International Organisation for Standardization and the International Electro-technical Commission.
-
(2008)
Information Technology-Systems Security Engineering-Capability Maturity Model (SSE-CMM)
-
-
-
19
-
-
77953158482
-
-
Gaithersburg, MD: National Institute of Standards and Technology Special publication# NISTIR 7564, NIST
-
Jansen, W. (2009). Directions in security metrics research. Gaithersburg, MD: National Institute of Standards and Technology Special publication# NISTIR 7564, NIST.
-
(2009)
Directions in Security Metrics Research
-
-
Jansen, W.1
-
21
-
-
77950592910
-
Security compliance: The next frontier in security research
-
New York: ACM
-
Julisch, K. (2008). Security compliance: The next frontier in security research. In Proceedings of the New Security Paradigms Workshop (pp. 71-74). New York: ACM.
-
(2008)
In Proceedings of the New Security Paradigms Workshop
, pp. 71-74
-
-
Julisch, K.1
-
23
-
-
84937653154
-
Towards a framework for software measurement validation
-
Kitchenham, B., Pfleeger, S., & Fenton, N. (1995). Towards a framework for software measurement validation. IEEE Transactions on Software Engineering, 21(12), 929-944.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.12
, pp. 929-944
-
-
Kitchenham, B.1
Pfleeger, S.2
Fenton, N.3
-
24
-
-
11144347895
-
-
Boston, Massachusetts, USA: Addison-Wesley
-
Klevinsky, T. J., Laliberte, S. A., & Gupta, A. (2002). Hack I. T.-security through penetration testing. Boston, Massachusetts, USA: Addison-Wesley.
-
(2002)
Hack I.T.-Security through Penetration Testing
-
-
Klevinsky, T.J.1
Laliberte, S.A.2
Gupta, A.3
-
25
-
-
0345097590
-
A CC-based security engineering process evaluation model
-
Dallas: IEEE Xplore
-
Lee, J., Lee, J., Lee, S., & Choi, B. (2003). A CC-based security engineering process evaluation model. In Proceedings of the 27th annual international computer software and applications conference (COMPSAC'03) (pp. 130-135). Dallas: IEEE Xplore.
-
(2003)
Proceedings of the 27th annual international computer software and applications conference (COMPSAC'03)
, pp. 130-135
-
-
Lee, J.1
Lee, J.2
Lee, S.3
Choi, B.4
-
28
-
-
84870196046
-
Security assurance profile for large and heterogeneous telecom and IT infrastructures
-
Orlando, Florida, USA, Accessed 15 March 2011
-
Marquet, B., Dubus, S., & Blad, C. (2010). Security assurance profile for large and heterogeneous telecom and IT infrastructures. In Proceedings of the 7th international symposium on risk management and cyber-informatics (RMCI'10), Orlando, Florida, USA. http://www. iiis. org/CDs2010/CD2010SCI/RMCI_2010/PapersPdf/RA432SS. pdf. Accessed 15 March 2011.
-
(2010)
Proceedings of the 7th international symposium on risk management and cyber-informatics (RMCI'10)
-
-
Marquet, B.1
Dubus, S.2
Blad, C.3
-
29
-
-
38649124635
-
A new evaluation strategy based on combining CC and SSE-CMM for security systems and products
-
Washington, DC: IEEE Computer Society
-
Liang T., & Ming-Tian, Z. (2006). A new evaluation strategy based on combining CC and SSE-CMM for security systems and products. In Proceedings of 5th international conference on grid and cooperative computing (GCC'06) (pp. 395-403). Washington, DC: IEEE Computer Society.
-
(2006)
Proceedings of 5th international conference on grid and cooperative computing (GCC'06)
, pp. 395-403
-
-
Liang, T.1
Ming-Tian, Z.2
-
30
-
-
34249004734
-
Secure Tropos: A security-oriented extension of the Tropos methodology
-
Mouratidis, H., & Giorgini, P. (2007). Secure Tropos: A security-oriented extension of the Tropos methodology. International Journal of Software Engineering and Knowledge Engineering, 17(2), 285-309.
-
(2007)
International Journal of Software Engineering and Knowledge Engineering
, vol.17
, Issue.2
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, P.2
-
31
-
-
84872679417
-
-
NASA, 8 w/Change 1, National Aeronautics and Space Administration. Available at, Accessed 15 March 2011
-
NASA. (2004). Software assurance standard, NASA technical standard, NASA-STD-8739. 8 w/Change 1, National Aeronautics and Space Administration. Available at: http://www. hq. nasa. gov/office/codeq/doctree/87398. pdf. Accessed 15 March 2011.
-
(2004)
Software assurance standard, NASA technical standard, NASA-STD-8739
-
-
-
33
-
-
80755140556
-
Appraisal and reporting of security assurance at operational systems level
-
doi: 10. 1016/j. jss. 2011. 08. 013
-
Ouedraogo, M., Khadraoui, D., Mouratidis, H., & Dubois, E. (2011). Appraisal and reporting of security assurance at operational systems level. Journal of Software and Systems. doi: 10. 1016/j. jss. 2011. 08. 013.
-
(2011)
Journal of Software and Systems
-
-
Ouedraogo, M.1
Khadraoui, D.2
Mouratidis, H.3
Dubois, E.4
-
34
-
-
77956395450
-
A framework for security assurance of access control enforcement code
-
Pavlich-Mariscal, J. A., Demurjian, S. A., & Michel, L. D. (2010). A framework for security assurance of access control enforcement code. Computers & Security, 29(7), 770-784.
-
(2010)
Computers & Security
, vol.29
, Issue.7
, pp. 770-784
-
-
Pavlich-Mariscal, J.A.1
Demurjian, S.A.2
Michel, L.D.3
-
35
-
-
47849117993
-
A guide to security metrics
-
Accessed 15 March 2011
-
Payne, S. C. (2006). A guide to security metrics. SANS Institute InfoSec Reading Room. http://www. sans. org/reading_room/whitepapers/auditing/guide-security-metrics_55. Accessed 15 March 2011.
-
(2006)
SANS Institute InfoSec Reading Room
-
-
Payne, S.C.1
-
36
-
-
51849089070
-
A near real-time system for security assurance assessment
-
Bucharest, Romania: IEEE Computer Society
-
Pham, N., Baud, L., Bellot, P., & Riguidel, M. (2008). A near real-time system for security assurance assessment. In Proceedings of the 3rd international conference on internet monitoring and protection (pp. 152-160). Bucharest, Romania: IEEE Computer Society.
-
(2008)
In Proceedings of the 3rd international conference on internet monitoring and protection
, pp. 152-160
-
-
Pham, N.1
Baud, L.2
Bellot, P.3
Riguidel, M.4
-
37
-
-
77952076962
-
Software assurance using structured assurance case models
-
Rhodes, T., Boland, F., Fong, E., & Kass, M. (2010). Software assurance using structured assurance case models. Journal of Research of the National Institute of Standard and Technology, 115(3), 209-216.
-
(2010)
Journal of Research of the National Institute of Standard and Technology
, vol.115
, Issue.3
, pp. 209-216
-
-
Rhodes, T.1
Boland, F.2
Fong, E.3
Kass, M.4
-
39
-
-
78149392139
-
On the feasibility of utilizing security metrics in software-intensive systems
-
Savola, R. M. (2010). On the feasibility of utilizing security metrics in software-intensive systems. International Journal of Computer Science and Network Security, 10(1), 230-239.
-
(2010)
International Journal of Computer Science and Network Security
, vol.10
, Issue.1
, pp. 230-239
-
-
Savola, R.M.1
-
40
-
-
33745435096
-
Current trends and advances in information assurance metrics
-
Fredericton, Canada
-
Seddigh, N., Pieda, P., Matrawy, A., Nandy, B., Lambadaris, L. & Hatfield, A. (2004). Current trends and advances in information assurance metrics. In Proceedings of second annual conference on privacy, security and trust(PST'04) (pp. 197-205). Fredericton, Canada.
-
(2004)
Proceedings of second annual conference on privacy, security and trust(PST'04)
, pp. 197-205
-
-
Seddigh, N.1
Pieda, P.2
Matrawy, A.3
Nandy, B.4
Lambadaris, L.5
Hatfield, A.6
-
41
-
-
17744373483
-
-
PhD thesis, School of Computer Science Carnegie Mellon University
-
Sheyner, O. M. (2004). Scenario graphs and attack graphs. PhD thesis, School of Computer Science Carnegie Mellon University.
-
(2004)
Scenario graphs and attack graphs
-
-
Sheyner, O.M.1
-
42
-
-
84908880017
-
Information assurance metrics: Prophecy, process, or pipedream?
-
Baltimore, USA
-
Skroch, M. J., McHugh, J., & Wiliams, J. M. (2000). Information assurance metrics: Prophecy, process, or pipedream? In Proceedings of national information system security conference, Baltimore, USA.
-
(2000)
In Proceedings of national information system security conference
-
-
Skroch, M.J.1
McHugh, J.2
Wiliams, J.M.3
-
44
-
-
38149015357
-
The essential synthesis of problem frames and assurance cases
-
Strunk, E. A., & Knight, J. C. (2008). The essential synthesis of problem frames and assurance cases. Experts Systems the Journal of Knowledge Engineering, 25(1), 9-27.
-
(2008)
Experts Systems the Journal of Knowledge Engineering
, vol.25
, Issue.1
, pp. 9-27
-
-
Strunk, E.A.1
Knight, J.C.2
-
45
-
-
12244283592
-
-
Gaithersburg, MD: NIST Special publication #800-55, NIST
-
Swanson, M., Nadya, B., Sabato, J., Hash, J., & Graffo, L. (2003). Security metrics guide for information technology systems. Gaithersburg, MD: NIST Special publication #800-55, NIST.
-
(2003)
Security Metrics Guide for Information Technology Systems
-
-
Swanson, M.1
Nadya, B.2
Sabato, J.3
Hash, J.4
Graffo, L.5
-
47
-
-
84969544889
-
Information assurance measures and metrics-state of practice and proposed taxonomy
-
Big Island, Hawaii: IEEE Computer Society
-
Vaughn, R. B., Henning, R., & Siraj, A. (2003). Information assurance measures and metrics-state of practice and proposed taxonomy. In Proceedings of the IEEE/HICSS'03 (p. 331). Big Island, Hawaii: IEEE Computer Society.
-
(2003)
Proceedings of the IEEE/HICSS'03
, pp. 331
-
-
Vaughn, R.B.1
Henning, R.2
Siraj, A.3
-
48
-
-
84872678600
-
Pretty good assurance
-
La Jolla, CA: IEEE Computer Society
-
Williams, J. R., Schaefer, M., & Landoll, D. J. (1995). Pretty good assurance. In Proceedings of new security paradigms workshop (p. 82). La Jolla, CA: IEEE Computer Society.
-
(1995)
In Proceedings of new security paradigms workshop
, pp. 82
-
-
Williams, J.R.1
Schaefer, M.2
Landoll, D.J.3
-
49
-
-
84872676564
-
Information system security attribute quantification or ordering (commonly but improperly know as security metrics)
-
WISSRR Workshop on Information, Security System Scoring and Ranking, Williamsburg, VA, 21-23 May
-
WISSRR Workshop on Information, Security System Scoring and Ranking. (2001). Information system security attribute quantification or ordering (commonly but improperly know as security metrics). In Workshop proceedings, Williamsburg, VA, 21-23 May.
-
(2001)
In Workshop proceedings
-
-
-
50
-
-
3042617182
-
A quantitative study of firewall configuration errors
-
Wool, A. (2004). A quantitative study of firewall configuration errors. IEEE Computer, 37(6), 62-67.
-
(2004)
IEEE Computer
, vol.37
, Issue.6
, pp. 62-67
-
-
Wool, A.1
-
51
-
-
33845957375
-
Service oriented modelling of communication infrastructure for assurance
-
West Point: IEEE Xplore
-
Zuccato, A., Marquet, B., Papillon, S., & Alden, M. (2006). Service oriented modelling of communication infrastructure for assurance. In Proceedings of IEEE Information Assurance Workshop (pp 1-8). West Point: IEEE Xplore.
-
(2006)
In Proceedings of IEEE Information Assurance Workshop
, pp. 1-8
-
-
Zuccato, A.1
Marquet, B.2
Papillon, S.3
Alden, M.4
|