E-Book, Englisch, Band 23, 198 Seiten
Gollmann / MASSACCI / Massacci Quality Of Protection
1. Auflage 2008
ISBN: 978-0-387-36584-8
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
Security Measurements and Metrics
E-Book, Englisch, Band 23, 198 Seiten
Reihe: Advances in Information Security
ISBN: 978-0-387-36584-8
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005). This volume discusses how security research can progress towards quality of protection in security comparable to quality of service in networking and software measurements, and metrics in empirical software engineering. Information security in the business setting has matured in the last few decades. Standards such as IS017799, the Common Criteria (ISO15408), and a number of industry certifications and risk analysis methodologies have raised the bar for good security solutions from a business perspective. Designed for a professional audience composed of researchers and practitioners in industry, Quality of Protection: Security Measurements and Metrics is also suitable for advanced-level students in computer science.
Autoren/Hrsg.
Weitere Infos & Material
1;Table of Contents;6
2;Preface;8
3;Conference Organization ;10
4;External Reviewers;11
5;Why to adopt a security metric? A brief survey ;12
6;Service-oriented Assurance-Comprehensive Security by Explicit Assurances;24
7;Software Security Growth Modeling: Examining Vulnerabilities with Reliability Growth Models;36
8;A Discrete Lognormal Model for Software Defects Affecting Quality of Protection;48
9;Time-to-Compromise Model for Cyber Risk Reduction Estimation;59
10;Assessing the risk of using vulnerable components;75
11;Collection and analysis of attack data based on honeypots deployed on the Internet;88
12;Multilevel Security and Quality of Protection;101
13;A Conceptual Model for Service Availability;114
14;A SLA evaluation methodology in Service Oriented Architectures;126
15;Towards a Notion of Quantitative Security Analysis;138
16;The Lower Bound of Attacks on Anonymity Systems - A Unicity Distance Approach;151
17;Intersection Attacks on Web-Mixes: Bringing theTheory into Praxis;165
18;Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages;178
19;Measuring Inference Exposure in Outsourced Encrypted Databases;190
20;Author Index;201




