36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of The 2003
DOI: 10.1109/hicss.2003.1174904
|View full text |Cite
|
Sign up to set email alerts
|

Information assurance measures and metrics - state of practice and proposed taxonomy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
53
0

Year Published

2006
2006
2012
2012

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 83 publications
(53 citation statements)
references
References 3 publications
0
53
0
Order By: Relevance
“…For example, our attack surface metric does not cover side channel attacks. The 2001 Workshop on Information-Security-System Rating and Ranking observed that there will be no successful single security metric that can be used to quantify the security of a system and multiple metrics will most certainly be used [34]. The attack surface metric can be used as one of such multiple metrics.…”
Section: Attack Surface Metricmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, our attack surface metric does not cover side channel attacks. The 2001 Workshop on Information-Security-System Rating and Ranking observed that there will be no successful single security metric that can be used to quantify the security of a system and multiple metrics will most certainly be used [34]. The attack surface metric can be used as one of such multiple metrics.…”
Section: Attack Surface Metricmentioning
confidence: 99%
“…Measurement of security, both qualitatively and quantitatively, has been a long standing challenge to the research community and is of practical import to software industry today [6,23,34]. Software industry has responded to demands for improvement in software security by increasing effort for creating "more secure" products and services.…”
Section: Introductionmentioning
confidence: 99%
“…Vaughn et al [9] propose taxonomy for information assurance metrics consisting of organizational security metrics and metrics for "Technical Target of Assessment". The authors divide the latter metrics into strength and weakness metrics -which are also part of the SMOS model, along with further characteristic dimensions.…”
Section: Related Workmentioning
confidence: 99%
“…Seddigh et al [9] introduce an information assurance metrics taxonomy for IT network assessment in [6]. Their taxonomy divides the metrics space into three categories: security, Quality of Service (QoS) and availability.…”
Section: Related Workmentioning
confidence: 99%
“…We identified two perspectives on such metrics: The first perspective is aligned to the objects the metrics refer to. [36] propose a taxonomy for information assurance metrics consisting of organizational security metrics and metrics for "Technical Target of Assessment". [29] suggest a high-level information security metrics taxonomy that divides business-level security metrics into five categories: (1) trust metrics for business collaboration, (2) security metrics for business-level risk management, (3) security metrics for information security management in the organization, (4) security metrics for cost-benefit analysis, and (5) security, dependability and trust metrics for ICT products, systems and services.…”
Section: Related Workmentioning
confidence: 99%