|
![]() |
|||
|
||||
OverviewQuality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005). This volume discusses how security research can progress towards quality of protection in security comparable to quality of service in networking and software measurements, and metrics in empirical software engineering. Information security in the business setting has matured in the last few decades. Standards such as IS017799, the Common Criteria (ISO15408), and a number of industry certifications and risk analysis methodologies have raised the bar for good security solutions from a business perspective. Designed for a professional audience composed of researchers and practitioners in industry, Quality of Protection: Security Measurements and Metrics is also suitable for advanced-level students in computer science. Full Product DetailsAuthor: Dieter Gollmann , Fabio MASSACCI , Artsiom YautsiukhinPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: Softcover reprint of hardcover 1st ed. 2006 Volume: 23 Dimensions: Width: 15.50cm , Height: 1.10cm , Length: 23.50cm Weight: 0.454kg ISBN: 9781441939654ISBN 10: 1441939652 Pages: 198 Publication Date: 08 December 2010 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsMotivations.- Why to adopt a security metric? A brief survey.- Service-oriented Assurance — Comprehensive Security by Explicit Assurances.- Measurements: Reliability vs Security.- Software Security Growth Modeling: Examining Vulnerabilities with Reliability Growth Models.- A Discrete Lognormal Model for Software Defects Affecting Quality of Protection.- Time-to-Compromise Model for Cyber Risk Reduction Estimation.- Assessing the risk of using vulnerable components.- Collection and analysis of attack data based on honeypots deployed on the Internet.- Quantitative Security Models.- Multilevel Security and Quality of Protection.- A Conceptual Model for Service Availability.- A SLA evaluation methodology in Service Oriented Architectures.- Towards a Notion of Quantitative Security Analysis.- Metrics for Anonymity and Confidentiality.- The Lower Bound of Attacks on Anonymity Systems — A Unicity Distance Approach.- Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis.- Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages.- Measuring Inference Exposure in Outsourced Encrypted Databases.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |