The lack of appropriate information security solutions in software-intensive systems can have serious consequences for businesses and the stakeholders. Carefully designed security metrics can be used to offer evidence of the security behavior of the system under development or operation. This study investigates holistic development of security metrics for a distributed messaging system based on threat analysis, security requirements, decomposition and use case information. Our approach is thus requirement-centric. The high-level security requirements are expressed in terms of lower-level measurable components applying a decomposition approach
Abstract — Decision-making in adaptive security management relies on sufficient and credible securit...
The concept of security metrics is a very important aspect for information security management. Secu...
The need for effective and efficient information security solutions is steadily increasing in the so...
The lack of appropriate information security solutions in software-intensive systems can have seriou...
Systematically developed security metrics make it possible to gather sufficient and credible securit...
Abstract—Systematically developed security metrics make it possible to gather sufficient and credibl...
Systematically and carefully designed information security metrics can be used to provide evidence o...
Appropriate information security solutions for software-intensive systems, together with evidence of...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
The lack of adequate information security solutions in software-intensive systems can have serious c...
In a distributed component based system, it is important to model and specify the QoS (quality of se...
Decision-making in adaptive security management relies on sufficient and credible security evidence ...
Information security evaluation of telecommunication or software intensive systems typically relies ...
How secure is a software product or a telecommunication network, or their fusion? In order to obtain...
The analysis of existing information systems for transmitting multimedia messages is carried out, a ...
Abstract — Decision-making in adaptive security management relies on sufficient and credible securit...
The concept of security metrics is a very important aspect for information security management. Secu...
The need for effective and efficient information security solutions is steadily increasing in the so...
The lack of appropriate information security solutions in software-intensive systems can have seriou...
Systematically developed security metrics make it possible to gather sufficient and credible securit...
Abstract—Systematically developed security metrics make it possible to gather sufficient and credibl...
Systematically and carefully designed information security metrics can be used to provide evidence o...
Appropriate information security solutions for software-intensive systems, together with evidence of...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
The lack of adequate information security solutions in software-intensive systems can have serious c...
In a distributed component based system, it is important to model and specify the QoS (quality of se...
Decision-making in adaptive security management relies on sufficient and credible security evidence ...
Information security evaluation of telecommunication or software intensive systems typically relies ...
How secure is a software product or a telecommunication network, or their fusion? In order to obtain...
The analysis of existing information systems for transmitting multimedia messages is carried out, a ...
Abstract — Decision-making in adaptive security management relies on sufficient and credible securit...
The concept of security metrics is a very important aspect for information security management. Secu...
The need for effective and efficient information security solutions is steadily increasing in the so...