메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Metrics-driven security objective decomposition for an E-health application with adaptive security management

Author keywords

adaptive security; e health; game theory; IoT; security metrics

Indexed keywords

EHEALTH; INTERNET OF THINGS; RISK ASSESSMENT;

EID: 85152504598     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2523501.2523507     Document Type: Conference Paper
Times cited : (26)

References (26)
  • 5
    • 27544477471 scopus 로고    scopus 로고
    • Electronic Authentication Guideline
    • National Institute of Standards and Technology
    • Burr, W.E. et al. 2011. Electronic Authentication Guideline. NIST Special Publication 800-63-1. National Institute of Standards and Technology.
    • (2011) NIST Special Publication 800-63-1
    • Burr, W.E.1
  • 7
    • 68149115896 scopus 로고    scopus 로고
    • Game Theory and Risk Analysis
    • DOI=10.1111/j.1539-6924.2009.01247.x
    • Cox, L. A. 2009. Game Theory and Risk Analysis. Risk Analysis, 29(8), 1062-1068. DOI=10.1111/j.1539-6924.2009.01247.x.
    • (2009) Risk Analysis , vol.29 , Issue.8 , pp. 1062-1068
    • Cox, L.A.1
  • 8
    • 0004320806 scopus 로고    scopus 로고
    • Health insurance portability and accountability act (HIPAA)
    • HIPAA. 1996
    • HIPAA. 1996. Health insurance portability and accountability act (HIPAA). U.S. Public Law, 104-191, 1996
    • (1996) U.S. Public Law , pp. 104-191
  • 13
    • 84855934497 scopus 로고    scopus 로고
    • Security metrics for e-healthcare information systems: A domain specific metrics approach
    • Jafari, S., Mtenzi, F., Fitzpatrick, R., and O'Shea, B. 2010. Security metrics for e-healthcare information systems: a domain specific metrics approach. Int. Journal of Digital Society, 1(4), 238-245.
    • (2010) Int. Journal of Digital Society , vol.1 , Issue.4 , pp. 238-245
    • Jafari, S.1    Mtenzi, F.2    Fitzpatrick, R.3    O'Shea, B.4
  • 14
    • 77953158482 scopus 로고    scopus 로고
    • U.S. National Institute of Standards and Technology, NISTIR 7564
    • Jansen, W. 2009. Directions in Security Metrics Research. U.S. National Institute of Standards and Technology, NISTIR 7564.
    • (2009) Directions in Security Metrics Research
    • Jansen, W.1
  • 16
    • 0142242116 scopus 로고    scopus 로고
    • Requirement Decomposition and Traceability
    • DOI=10.1007/BF02919970
    • Kirkman, D. 1998. Requirement Decomposition and Traceability, Requirements Engineering, 3(2), 107-114. DOI=10.1007/BF02919970
    • (1998) Requirements Engineering , vol.3 , Issue.2 , pp. 107-114
    • Kirkman, D.1
  • 17
    • 84891451119 scopus 로고
    • A Taxonomy of Decomposition Strategies based on Structures, Behaviors, and Goals
    • Koopman, P. 1995. A Taxonomy of Decomposition Strategies based on Structures, Behaviors, and Goals. In Proc. Design Theory & Methodology, 611-618.
    • (1995) Proc. Design Theory & Methodology , pp. 611-618
    • Koopman, P.1
  • 19
    • 84885207675 scopus 로고    scopus 로고
    • Towards metrics-driven adaptive security management in E-health IoT applications
    • Savola, R., Abie, H., and Sihvonen, M. 2012. Towards metrics-driven adaptive security management in E-health IoT applications. In Proc. BODYNETS 2012, Workshop SeTTIT 2012, 276-281.
    • (2012) Proc. BODYNETS 2012, Workshop SeTTIT 2012 , pp. 276-281
    • Savola, R.1    Abie, H.2    Sihvonen, M.3
  • 20
    • 77958019527 scopus 로고    scopus 로고
    • Development of measurable security for a distributed messaging system
    • Savola, R. and Abie, H. 2009. Development of measurable security for a distributed messaging system. Int. Journal on Advances in Security, 2(4), 358-380.
    • (2009) Int. Journal on Advances in Security , vol.2 , Issue.4 , pp. 358-380
    • Savola, R.1    Abie, H.2
  • 22
    • 47949132863 scopus 로고    scopus 로고
    • Adaptive Markov Game Theoretic Data Fusion Approach for Cyber Network Defense
    • DOI=10.1109/MILCOM.2007.4454758
    • Shen, D., Chen, G., Blasch, E., and Tadda, G. 2007. Adaptive Markov Game Theoretic Data Fusion Approach for Cyber Network Defense. IEEE Military Communications Conference (MILCOM 2007), 1-7. DOI=10.1109/MILCOM.2007.4454758.
    • (2007) IEEE Military Communications Conference (MILCOM 2007) , pp. 1-7
    • Shen, D.1    Chen, G.2    Blasch, E.3    Tadda, G.4
  • 23
    • 84860724995 scopus 로고    scopus 로고
    • An Adaptive Markov Game Model for Cyber Threat Intent Inference
    • Meng Joo Erand Yi Zhou (Ed.), ISBN: 978-953-7619-55-4, InTech, DOI=10.5772/6690
    • Shen, D., Chen, G., Cruz, J. J.B., Blasch, E., and Pham, K. 2009. An Adaptive Markov Game Model for Cyber Threat Intent Inference. Theory and Novel Applications of Machine Learning, Meng Joo Erand Yi Zhou (Ed.), ISBN: 978-953-7619-55-4, InTech, 317-334. DOI=10.5772/6690.
    • (2009) Theory and Novel Applications of Machine Learning , pp. 317-334
    • Shen, D.1    Chen, G.2    Cruz, J.J.B.3    Blasch, E.4    Pham, K.5
  • 25
    • 45749136672 scopus 로고    scopus 로고
    • A comprehensive and comparative metric for information security
    • Weiss, S., Weissmann, O., and Dressler, F. 2010. A comprehensive and comparative metric for information security. In Proc. ICTSM'05, 0-10.
    • (2010) Proc. ICTSM'05 , pp. 0-10
    • Weiss, S.1    Weissmann, O.2    Dressler, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.