Measurement of any complex, operational system is challenging due to the continuous independent evolution of the components. Security risks introduce another dimension of dynamicity, reflected to risk management and security assurance activities. The availability of different measurements and their properties will vary during the overall system lifecycle. To be useful, a measurement framework in this context needs to be able to adapt to both the changes in the target of measurement and in the available measurement infrastructure. In this study, we introduce a taxonomy-based approach for relating the available and attainable measurements to the measurement requirements of security assurance plans by providing an Abstraction Layer that makes ...
Systematic approaches to measuring security are needed in order to obtain evidence of the security p...
In order to obtain evidence of the security and privacy issues of products, services or an organizat...
Decision-making in adaptive security management relies on sufficient and credible security evidence ...
Measurement of any complex, operational system is challenging due to the continuous independent evol...
To obtain evidence of the security of different products or organizations, systematic approaches to ...
Practical measurement of information security oftelecoms services is a remarkable challenge because ...
The management of information security becomes easier if suitable metrics can be developed to offer ...
Systematic and practical approaches to risk-driven operational security evidence help ensure the eff...
Existing security technologies play a significant role in protecting enterprise systems but they are...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
Assurance is commonly considered as “something said or done to inspire confidence” (Webster dictiona...
This paper addresses the challenge of measuring security, understood as a system property, of cyberp...
Designing and maintaining correct security countermeasures to support trustworthiness require compre...
In this paper, basic issues of measuring security as a system property are discussed. While traditi...
Security Assurance is commonly defined as the ground for confidence on the security mechanisms to me...
Systematic approaches to measuring security are needed in order to obtain evidence of the security p...
In order to obtain evidence of the security and privacy issues of products, services or an organizat...
Decision-making in adaptive security management relies on sufficient and credible security evidence ...
Measurement of any complex, operational system is challenging due to the continuous independent evol...
To obtain evidence of the security of different products or organizations, systematic approaches to ...
Practical measurement of information security oftelecoms services is a remarkable challenge because ...
The management of information security becomes easier if suitable metrics can be developed to offer ...
Systematic and practical approaches to risk-driven operational security evidence help ensure the eff...
Existing security technologies play a significant role in protecting enterprise systems but they are...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
Assurance is commonly considered as “something said or done to inspire confidence” (Webster dictiona...
This paper addresses the challenge of measuring security, understood as a system property, of cyberp...
Designing and maintaining correct security countermeasures to support trustworthiness require compre...
In this paper, basic issues of measuring security as a system property are discussed. While traditi...
Security Assurance is commonly defined as the ground for confidence on the security mechanisms to me...
Systematic approaches to measuring security are needed in order to obtain evidence of the security p...
In order to obtain evidence of the security and privacy issues of products, services or an organizat...
Decision-making in adaptive security management relies on sufficient and credible security evidence ...