It is a widely accepted management principle that an activity cannot be managed well if it cannot be measured. Carefully designed security metrics can be used to offer evidence of the security behavior of the system under development or operation. We propose a systematic and holistic method for security metrics development for software intensive systems. The approach is security requirement-centric and threat and vulnerability-driven. The high-level security requirements are expressed in terms of lower-level measurable components applying a decomposition approach. Next, feasibility of the basic measurable components is investigated, and more detailed metrics developed based on selected components
Abstract—Systematically developed security metrics make it possible to gather sufficient and credibl...
There exists a large number of suggestions for how to measure security, and in many cases the goal i...
Adequate information security effectiveness during system operation is the ultimate goal of all secu...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
Appropriate information security solutions for software-intensive systems, together with evidence of...
Systematically and carefully designed information security metrics can be used to provide evidence o...
The lack of adequate information security solutions in software-intensive systems can have serious c...
Security measurement of software-intensive systems is an emerging field, rapidly gaining momentum. W...
We introduce a novel high-level security metrics objective taxonomization model for software- intens...
Security measurement of software-intensive systems is an emerging field, rapidly gaining momentum. W...
Abstract: We introduce a novel high-level security metrics objective taxonomization model for soft-w...
Systematically managed, sufficient and credible security metrics increase the understanding of the s...
Systematically developed security metrics make it possible to gather sufficient and credible securit...
The lack of appropriate information security solutions in software-intensive systems can have seriou...
Abstract- In today's advance technology, security problems become more important. Security meas...
Abstract—Systematically developed security metrics make it possible to gather sufficient and credibl...
There exists a large number of suggestions for how to measure security, and in many cases the goal i...
Adequate information security effectiveness during system operation is the ultimate goal of all secu...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
Appropriate information security solutions for software-intensive systems, together with evidence of...
Systematically and carefully designed information security metrics can be used to provide evidence o...
The lack of adequate information security solutions in software-intensive systems can have serious c...
Security measurement of software-intensive systems is an emerging field, rapidly gaining momentum. W...
We introduce a novel high-level security metrics objective taxonomization model for software- intens...
Security measurement of software-intensive systems is an emerging field, rapidly gaining momentum. W...
Abstract: We introduce a novel high-level security metrics objective taxonomization model for soft-w...
Systematically managed, sufficient and credible security metrics increase the understanding of the s...
Systematically developed security metrics make it possible to gather sufficient and credible securit...
The lack of appropriate information security solutions in software-intensive systems can have seriou...
Abstract- In today's advance technology, security problems become more important. Security meas...
Abstract—Systematically developed security metrics make it possible to gather sufficient and credibl...
There exists a large number of suggestions for how to measure security, and in many cases the goal i...
Adequate information security effectiveness during system operation is the ultimate goal of all secu...