2009
DOI: 10.1093/comjnl/bxp094
|View full text |Cite
|
Sign up to set email alerts
|

Security Metrics Foundations for Computer Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Information Assurance is a great name in respect of combining both. Additionally, Information Assurance is also responsible for the managing manual contents and it deals managerial affairs leading to rules, regulation, framework etc [12], [20], [21]. Hence as far as SCAP is concerned it is needed for better and healthy security policies designing and development.…”
Section: Scap Componentsmentioning
confidence: 99%
“…Information Assurance is a great name in respect of combining both. Additionally, Information Assurance is also responsible for the managing manual contents and it deals managerial affairs leading to rules, regulation, framework etc [12], [20], [21]. Hence as far as SCAP is concerned it is needed for better and healthy security policies designing and development.…”
Section: Scap Componentsmentioning
confidence: 99%
“…Fortunately, the metrics area is slowly changing and, consequently, sensible reactive and active risk management solutions are becoming feasible. However, means for proactive risk management are still missing (Trcˇek 2009). And that is where innovations techniques can come into play.…”
Section: Deployment Of Innovation Techniques For Is Security Managementmentioning
confidence: 99%
“…The virtuality level of a team has become an integral part of a team's definition [24]. Many variables are affected by the virtuality level of a team.…”
Section: Virtualitymentioning
confidence: 99%
“…Many leading industry security products [20] are already SCAP standard validated, and utilize above described benefits. Our approach [24] follows the above structure, builds on it (the implementation is still an on-going process), and can be used to improve risk management on strategic and/or tactical level with the development of business flight simulators. In addition, these simulators may be used for automated support of decision-making and could be thus self-adapting security information and event management systems enablers.…”
Section: Towards a Computerized Risk Management Architecturementioning
confidence: 99%
See 1 more Smart Citation