Dependability and security models
There is a need to quantify system properties methodically. Dependability and security
models have evolved nearly independently. Therefore, it is crucial to develop a classification …
models have evolved nearly independently. Therefore, it is crucial to develop a classification …
Open source vs. closed source software: towards measuring security
G Schryen, R Kadura - Proceedings of the 2009 ACM symposium on …, 2009 - dl.acm.org
The increasing availability and deployment of open source software in personal and
commercial environments makes open source software highly appealing for hackers, and …
commercial environments makes open source software highly appealing for hackers, and …
[PDF][PDF] On stochastic modeling for integrated security and dependability evaluation.
K Sallhammar, BE Helvik, SJ Knapskog - J. Networks, 2006 - academia.edu
This paper presents a new approach to integrated security and dependability evaluation,
which is based on stochastic modeling techniques. Our proposal aims to provide operational …
which is based on stochastic modeling techniques. Our proposal aims to provide operational …
Towards an integrated conceptual model of security and dependability
E Jonsson - … Conference on Availability, Reliability and Security …, 2006 - ieeexplore.ieee.org
It is now commonly accepted that security and dependability largely represent two different
aspects of an overall meta-concept that reflects the trust that we put in a computer system …
aspects of an overall meta-concept that reflects the trust that we put in a computer system …
Security of open source and closed source software: An empirical comparison of published vulnerabilities
G Schryen - AMCIS 2009 Proceedings, 2009 - aisel.aisnet.org
Reviewing literature on open source and closed source security reveals that the discussion
is often determined by biased attitudes toward one of these development styles. The …
is often determined by biased attitudes toward one of these development styles. The …
A framework for security metrics based on operational system attributes
E Jonsson, L Pirzadeh - 2011 Third International Workshop on …, 2011 - ieeexplore.ieee.org
There exists a large number of suggestions for how to measure security, with different goals
and objectives. The application areas range from business management and organizational …
and objectives. The application areas range from business management and organizational …
Towards a stochastic model for integrated security and dependability evaluation
K Sallhammar, BE Helvik… - … on Availability, Reliability …, 2006 - ieeexplore.ieee.org
We present a new approach to integrated security and dependability evaluation, which is
based on stochastic modelling techniques. Our proposal aims to provide operational …
based on stochastic modelling techniques. Our proposal aims to provide operational …
[BOOK][B] Managing the evolution of dependability cases for systems of systems
G Despotou - 2007 - Citeseer
Dependability is a composite property consisting of attributes such as reliability, availability,
safety and security. The achievement of these attributes is often essential for the operational …
safety and security. The achievement of these attributes is often essential for the operational …
A classification of malicious software attacks
H Langweg, E Snekkenes - IEEE International Conference on …, 2004 - ieeexplore.ieee.org
This paper presents a classification of attacks by malicious software. Unlike previous
schemes, it focuses on application software instead of operating systems. We classify …
schemes, it focuses on application software instead of operating systems. We classify …
Dimension of mobile security model: Mobile user security threats and awareness
This is an exploratory study that evaluates mobile security awareness and mobile security
vulnerabilities based on practices among mobile users in higher education institutions …
vulnerabilities based on practices among mobile users in higher education institutions …