Systematically and carefully designed information security metrics can be used to provide evidence of the security solutions of the system under development. The lack of appropriate security solutions in software-intensive systems might have serious consequences for businesses and the stakeholders. We investigate holistic development of security metrics based on security requirement decomposition and ontologies. The high-level security requirements are expressed in terms of lower-level measurable components applying a decomposition approach. Security requirement analysis of a distributed messaging system is used as an example
We introduce a novel high-level security metrics objective taxonomization model for software- intens...
The management of information security becomes easier if suitable metrics can be developed to offer ...
There exists a large number of suggestions for how to measure security, and in many cases the goal i...
Systematically and carefully designed information security metrics can be used to provide evidence o...
Appropriate information security solutions for software-intensive systems, together with evidence of...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
The lack of appropriate information security solutions in software-intensive systems can have seriou...
The lack of adequate information security solutions in software-intensive systems can have serious c...
Systematically developed security metrics make it possible to gather sufficient and credible securit...
Abstract—Systematically developed security metrics make it possible to gather sufficient and credibl...
How secure is a software product or a telecommunication network, or their fusion? In order to obtain...
Abstract: We introduce a novel high-level security metrics objective taxonomization model for soft-w...
Abstract—Measuring security is a complex task and requires a great deal of knowledge. Managing this ...
Measuring security is a complex task and requires a great deal of knowledge. Managing this knowledge...
Well-defined and unambiguous security requirements are essential for developing secure software syst...
We introduce a novel high-level security metrics objective taxonomization model for software- intens...
The management of information security becomes easier if suitable metrics can be developed to offer ...
There exists a large number of suggestions for how to measure security, and in many cases the goal i...
Systematically and carefully designed information security metrics can be used to provide evidence o...
Appropriate information security solutions for software-intensive systems, together with evidence of...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
The lack of appropriate information security solutions in software-intensive systems can have seriou...
The lack of adequate information security solutions in software-intensive systems can have serious c...
Systematically developed security metrics make it possible to gather sufficient and credible securit...
Abstract—Systematically developed security metrics make it possible to gather sufficient and credibl...
How secure is a software product or a telecommunication network, or their fusion? In order to obtain...
Abstract: We introduce a novel high-level security metrics objective taxonomization model for soft-w...
Abstract—Measuring security is a complex task and requires a great deal of knowledge. Managing this ...
Measuring security is a complex task and requires a great deal of knowledge. Managing this knowledge...
Well-defined and unambiguous security requirements are essential for developing secure software syst...
We introduce a novel high-level security metrics objective taxonomization model for software- intens...
The management of information security becomes easier if suitable metrics can be developed to offer ...
There exists a large number of suggestions for how to measure security, and in many cases the goal i...