메뉴 건너뛰기




Volumn 21, Issue 1, 2013, Pages 67-97

Taxonomy of quality metrics for assessing assurance of security correctness

Author keywords

Correctness measurement; Metrics; Security Assurance; Security verification process; Software probe quality; Verification quality

Indexed keywords

ACCESS CONTROL; SECURITY SYSTEMS; TAXONOMIES; VERIFICATION;

EID: 84872680749     PISSN: 09639314     EISSN: 15731367     Source Type: Journal    
DOI: 10.1007/s11219-011-9169-0     Document Type: Article
Times cited : (14)

References (51)
  • 1
    • 79958248566 scopus 로고    scopus 로고
    • Assessing the maintainability of software product line feature models using structural metrics
    • Bagheri, E., & Gasevic, D. (2010). Assessing the maintainability of software product line feature models using structural metrics. Software Quality Journal, 19(3), 579-612.
    • (2010) Software Quality Journal , vol.19 , Issue.3 , pp. 579-612
    • Bagheri, E.1    Gasevic, D.2
  • 2
    • 33747205462 scopus 로고    scopus 로고
    • On the brittleness of software and the infeasibility of security metrics
    • Bellovin, S. M. (2006). On the brittleness of software and the infeasibility of security metrics. IEEE Security & Privacy, 4(4), 96.
    • (2006) IEEE Security & Privacy , vol.4 , Issue.4 , pp. 96
    • Bellovin, S.M.1
  • 3
    • 33745457297 scopus 로고    scopus 로고
    • Information assurance assessment: Lessons-learned and challenges
    • Williamsburg, VA
    • Bodeau, D. (2001). Information assurance assessment: Lessons-learned and challenges. In Proceedings of WISSRR 2001, Williamsburg, VA.
    • (2001) In Proceedings of WISSRR 2001
    • Bodeau, D.1
  • 9
    • 77956612506 scopus 로고    scopus 로고
    • The irreversible march of technology
    • Furnell, S. M. (2009). The irreversible march of technology. Information Security Technical Report, 14(4), 176-180.
    • (2009) Information Security Technical Report , vol.14 , Issue.4 , pp. 176-180
    • Furnell, S.M.1
  • 12
    • 50049117473 scopus 로고    scopus 로고
    • Quantitative risk-based security prediction for component-based systems with explicitly modeled attack profiles
    • Grunske, L., & Joyce, D. (2008). Quantitative risk-based security prediction for component-based systems with explicitly modeled attack profiles. Journal of Systems and Software, 81(8), 1327-1345.
    • (2008) Journal of Systems and Software , vol.81 , Issue.8 , pp. 1327-1345
    • Grunske, L.1    Joyce, D.2
  • 15
    • 0003765587 scopus 로고    scopus 로고
    • ISO/IEC 15048, Geneva, Switzerland: International Organisation for Standardization and the International Electro-technical Commission
    • ISO/IEC 15408. (2006a). Common criteria for information technology, part 1-3, version 3. 1. Geneva, Switzerland: International Organisation for Standardization and the International Electro-technical Commission.
    • (2006) Common Criteria for Information Technology, Part 1-3, Version 3.1
  • 17
    • 58049133103 scopus 로고    scopus 로고
    • ISO/IEC 15939, Geneva, Switzerland: International Organisation for Standardization and the International Electro-technical Commission
    • ISO/IEC 15939. (2007). Systems and software engineering-Measurement process. Geneva, Switzerland: International Organisation for Standardization and the International Electro-technical Commission.
    • (2007) Systems and Software Engineering-Measurement Process
  • 18
    • 25144500054 scopus 로고    scopus 로고
    • ISO/IEC 21827, Geneva, Switzerland: International Organisation for Standardization and the International Electro-technical Commission
    • ISO/IEC 21827. (2008). Information technology-systems security engineering-capability maturity model (SSE-CMM). Geneva, Switzerland: International Organisation for Standardization and the International Electro-technical Commission.
    • (2008) Information Technology-Systems Security Engineering-Capability Maturity Model (SSE-CMM)
  • 19
    • 77953158482 scopus 로고    scopus 로고
    • Gaithersburg, MD: National Institute of Standards and Technology Special publication# NISTIR 7564, NIST
    • Jansen, W. (2009). Directions in security metrics research. Gaithersburg, MD: National Institute of Standards and Technology Special publication# NISTIR 7564, NIST.
    • (2009) Directions in Security Metrics Research
    • Jansen, W.1
  • 21
    • 77950592910 scopus 로고    scopus 로고
    • Security compliance: The next frontier in security research
    • New York: ACM
    • Julisch, K. (2008). Security compliance: The next frontier in security research. In Proceedings of the New Security Paradigms Workshop (pp. 71-74). New York: ACM.
    • (2008) In Proceedings of the New Security Paradigms Workshop , pp. 71-74
    • Julisch, K.1
  • 28
    • 84870196046 scopus 로고    scopus 로고
    • Security assurance profile for large and heterogeneous telecom and IT infrastructures
    • Orlando, Florida, USA, Accessed 15 March 2011
    • Marquet, B., Dubus, S., & Blad, C. (2010). Security assurance profile for large and heterogeneous telecom and IT infrastructures. In Proceedings of the 7th international symposium on risk management and cyber-informatics (RMCI'10), Orlando, Florida, USA. http://www. iiis. org/CDs2010/CD2010SCI/RMCI_2010/PapersPdf/RA432SS. pdf. Accessed 15 March 2011.
    • (2010) Proceedings of the 7th international symposium on risk management and cyber-informatics (RMCI'10)
    • Marquet, B.1    Dubus, S.2    Blad, C.3
  • 29
    • 38649124635 scopus 로고    scopus 로고
    • A new evaluation strategy based on combining CC and SSE-CMM for security systems and products
    • Washington, DC: IEEE Computer Society
    • Liang T., & Ming-Tian, Z. (2006). A new evaluation strategy based on combining CC and SSE-CMM for security systems and products. In Proceedings of 5th international conference on grid and cooperative computing (GCC'06) (pp. 395-403). Washington, DC: IEEE Computer Society.
    • (2006) Proceedings of 5th international conference on grid and cooperative computing (GCC'06) , pp. 395-403
    • Liang, T.1    Ming-Tian, Z.2
  • 31
    • 84872679417 scopus 로고    scopus 로고
    • NASA, 8 w/Change 1, National Aeronautics and Space Administration. Available at, Accessed 15 March 2011
    • NASA. (2004). Software assurance standard, NASA technical standard, NASA-STD-8739. 8 w/Change 1, National Aeronautics and Space Administration. Available at: http://www. hq. nasa. gov/office/codeq/doctree/87398. pdf. Accessed 15 March 2011.
    • (2004) Software assurance standard, NASA technical standard, NASA-STD-8739
  • 33
    • 80755140556 scopus 로고    scopus 로고
    • Appraisal and reporting of security assurance at operational systems level
    • doi: 10. 1016/j. jss. 2011. 08. 013
    • Ouedraogo, M., Khadraoui, D., Mouratidis, H., & Dubois, E. (2011). Appraisal and reporting of security assurance at operational systems level. Journal of Software and Systems. doi: 10. 1016/j. jss. 2011. 08. 013.
    • (2011) Journal of Software and Systems
    • Ouedraogo, M.1    Khadraoui, D.2    Mouratidis, H.3    Dubois, E.4
  • 34
    • 77956395450 scopus 로고    scopus 로고
    • A framework for security assurance of access control enforcement code
    • Pavlich-Mariscal, J. A., Demurjian, S. A., & Michel, L. D. (2010). A framework for security assurance of access control enforcement code. Computers & Security, 29(7), 770-784.
    • (2010) Computers & Security , vol.29 , Issue.7 , pp. 770-784
    • Pavlich-Mariscal, J.A.1    Demurjian, S.A.2    Michel, L.D.3
  • 35
    • 47849117993 scopus 로고    scopus 로고
    • A guide to security metrics
    • Accessed 15 March 2011
    • Payne, S. C. (2006). A guide to security metrics. SANS Institute InfoSec Reading Room. http://www. sans. org/reading_room/whitepapers/auditing/guide-security-metrics_55. Accessed 15 March 2011.
    • (2006) SANS Institute InfoSec Reading Room
    • Payne, S.C.1
  • 39
    • 78149392139 scopus 로고    scopus 로고
    • On the feasibility of utilizing security metrics in software-intensive systems
    • Savola, R. M. (2010). On the feasibility of utilizing security metrics in software-intensive systems. International Journal of Computer Science and Network Security, 10(1), 230-239.
    • (2010) International Journal of Computer Science and Network Security , vol.10 , Issue.1 , pp. 230-239
    • Savola, R.M.1
  • 41
    • 17744373483 scopus 로고    scopus 로고
    • PhD thesis, School of Computer Science Carnegie Mellon University
    • Sheyner, O. M. (2004). Scenario graphs and attack graphs. PhD thesis, School of Computer Science Carnegie Mellon University.
    • (2004) Scenario graphs and attack graphs
    • Sheyner, O.M.1
  • 47
    • 84969544889 scopus 로고    scopus 로고
    • Information assurance measures and metrics-state of practice and proposed taxonomy
    • Big Island, Hawaii: IEEE Computer Society
    • Vaughn, R. B., Henning, R., & Siraj, A. (2003). Information assurance measures and metrics-state of practice and proposed taxonomy. In Proceedings of the IEEE/HICSS'03 (p. 331). Big Island, Hawaii: IEEE Computer Society.
    • (2003) Proceedings of the IEEE/HICSS'03 , pp. 331
    • Vaughn, R.B.1    Henning, R.2    Siraj, A.3
  • 49
    • 84872676564 scopus 로고    scopus 로고
    • Information system security attribute quantification or ordering (commonly but improperly know as security metrics)
    • WISSRR Workshop on Information, Security System Scoring and Ranking, Williamsburg, VA, 21-23 May
    • WISSRR Workshop on Information, Security System Scoring and Ranking. (2001). Information system security attribute quantification or ordering (commonly but improperly know as security metrics). In Workshop proceedings, Williamsburg, VA, 21-23 May.
    • (2001) In Workshop proceedings
  • 50
    • 3042617182 scopus 로고    scopus 로고
    • A quantitative study of firewall configuration errors
    • Wool, A. (2004). A quantitative study of firewall configuration errors. IEEE Computer, 37(6), 62-67.
    • (2004) IEEE Computer , vol.37 , Issue.6 , pp. 62-67
    • Wool, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.