Gollmann / MASSACCI / Massacci | Quality Of Protection | E-Book | www.sack.de
E-Book

E-Book, Englisch, Band 23, 198 Seiten

Reihe: Advances in Information Security

Gollmann / MASSACCI / Massacci Quality Of Protection

Security Measurements and Metrics
1. Auflage 2008
ISBN: 978-0-387-36584-8
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark

Security Measurements and Metrics

E-Book, Englisch, Band 23, 198 Seiten

Reihe: Advances in Information Security

ISBN: 978-0-387-36584-8
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark



Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005). This volume discusses how security research can progress towards quality of protection in security comparable to quality of service in networking and software measurements, and metrics in empirical software engineering. Information security in the business setting has matured in the last few decades. Standards such as IS017799, the Common Criteria (ISO15408), and a number of industry certifications and risk analysis methodologies have raised the bar for good security solutions from a business perspective. Designed for a professional audience composed of researchers and practitioners in industry, Quality of Protection: Security Measurements and Metrics is also suitable for advanced-level students in computer science.

Gollmann / MASSACCI / Massacci Quality Of Protection jetzt bestellen!

Weitere Infos & Material


1;Table of Contents;6
2;Preface;8
3;Conference Organization ;10
4;External Reviewers;11
5;Why to adopt a security metric? A brief survey ;12
6;Service-oriented Assurance-Comprehensive Security by Explicit Assurances;24
7;Software Security Growth Modeling: Examining Vulnerabilities with Reliability Growth Models;36
8;A Discrete Lognormal Model for Software Defects Affecting Quality of Protection;48
9;Time-to-Compromise Model for Cyber Risk Reduction Estimation;59
10;Assessing the risk of using vulnerable components;75
11;Collection and analysis of attack data based on honeypots deployed on the Internet;88
12;Multilevel Security and Quality of Protection;101
13;A Conceptual Model for Service Availability;114
14;A SLA evaluation methodology in Service Oriented Architectures;126
15;Towards a Notion of Quantitative Security Analysis;138
16;The Lower Bound of Attacks on Anonymity Systems - A Unicity Distance Approach;151
17;Intersection Attacks on Web-Mixes: Bringing theTheory into Praxis;165
18;Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages;178
19;Measuring Inference Exposure in Outsourced Encrypted Databases;190
20;Author Index;201



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.