This paper addresses quantifying security risks associated with data assets within design models of embedded systems. Attack and system behaviours are modelled as time-dependent stochastic processes. The presence of the time dimension allows accounting for dynamic aspects of potential attacks and a system: the probability of a success- ful attack changes as time progresses; and a system possesses different data assets as its execution unfolds. These models are used to quan- tify two important attributes of security: confidentiality and integrity. In particular, likelihood/consequence-based measures of confidentiality and integrity losses are proposed to characterise security risks to data assets. In our method, we consider attack and system...
Modern systems transition towards more connected, information and communication technologies (ICT) h...
In this paper, basic issues of measuring security as a system property are discussed. While traditi...
Security is a topic of ever increasing interest. Today it is widely accepted that, due to the unavoi...
This paper addresses quantifying security risks associated with data assets within design models of ...
Embedded Systems (ES) development has been historically focused on functionality rather than securit...
This paper suggests a quantitative approach to security, and specifically to a security-concept, whi...
Cyber physical systems, like power plants, medical devices and data centers have to meet high standa...
This paper addresses the challenge of measuring security, understood as a system property, of cyberp...
Hardware security is a fundamental and increasingly important contributor to the trustworthiness of ...
Model based security metrics are a growing area of cyber security research concerned with measuring ...
Quite often failures in network based services and server systems may not be accidental, but rather ...
Systems and software architects require quantitative dependability evaluations, which allow them to ...
The need for effective and efficient information security solutions is steadily increasing in the so...
This is the dataset provided for replicability for the article "Microservice Security Metrics for Se...
The need for effective and efficient information security solutions is steadily increasing in the so...
Modern systems transition towards more connected, information and communication technologies (ICT) h...
In this paper, basic issues of measuring security as a system property are discussed. While traditi...
Security is a topic of ever increasing interest. Today it is widely accepted that, due to the unavoi...
This paper addresses quantifying security risks associated with data assets within design models of ...
Embedded Systems (ES) development has been historically focused on functionality rather than securit...
This paper suggests a quantitative approach to security, and specifically to a security-concept, whi...
Cyber physical systems, like power plants, medical devices and data centers have to meet high standa...
This paper addresses the challenge of measuring security, understood as a system property, of cyberp...
Hardware security is a fundamental and increasingly important contributor to the trustworthiness of ...
Model based security metrics are a growing area of cyber security research concerned with measuring ...
Quite often failures in network based services and server systems may not be accidental, but rather ...
Systems and software architects require quantitative dependability evaluations, which allow them to ...
The need for effective and efficient information security solutions is steadily increasing in the so...
This is the dataset provided for replicability for the article "Microservice Security Metrics for Se...
The need for effective and efficient information security solutions is steadily increasing in the so...
Modern systems transition towards more connected, information and communication technologies (ICT) h...
In this paper, basic issues of measuring security as a system property are discussed. While traditi...
Security is a topic of ever increasing interest. Today it is widely accepted that, due to the unavoi...