Dependability and security models

KS Trivedi, DS Kim, A Roy… - 2009 7th International …, 2009 - ieeexplore.ieee.org
There is a need to quantify system properties methodically. Dependability and security
models have evolved nearly independently. Therefore, it is crucial to develop a classification …

Open source vs. closed source software: towards measuring security

G Schryen, R Kadura - Proceedings of the 2009 ACM symposium on …, 2009 - dl.acm.org
The increasing availability and deployment of open source software in personal and
commercial environments makes open source software highly appealing for hackers, and …

[PDF][PDF] On stochastic modeling for integrated security and dependability evaluation.

K Sallhammar, BE Helvik, SJ Knapskog - J. Networks, 2006 - academia.edu
This paper presents a new approach to integrated security and dependability evaluation,
which is based on stochastic modeling techniques. Our proposal aims to provide operational …

Towards an integrated conceptual model of security and dependability

E Jonsson - … Conference on Availability, Reliability and Security …, 2006 - ieeexplore.ieee.org
It is now commonly accepted that security and dependability largely represent two different
aspects of an overall meta-concept that reflects the trust that we put in a computer system …

Security of open source and closed source software: An empirical comparison of published vulnerabilities

G Schryen - AMCIS 2009 Proceedings, 2009 - aisel.aisnet.org
Reviewing literature on open source and closed source security reveals that the discussion
is often determined by biased attitudes toward one of these development styles. The …

A framework for security metrics based on operational system attributes

E Jonsson, L Pirzadeh - 2011 Third International Workshop on …, 2011 - ieeexplore.ieee.org
There exists a large number of suggestions for how to measure security, with different goals
and objectives. The application areas range from business management and organizational …

Towards a stochastic model for integrated security and dependability evaluation

K Sallhammar, BE Helvik… - … on Availability, Reliability …, 2006 - ieeexplore.ieee.org
We present a new approach to integrated security and dependability evaluation, which is
based on stochastic modelling techniques. Our proposal aims to provide operational …

[BOOK][B] Managing the evolution of dependability cases for systems of systems

G Despotou - 2007 - Citeseer
Dependability is a composite property consisting of attributes such as reliability, availability,
safety and security. The achievement of these attributes is often essential for the operational …

A classification of malicious software attacks

H Langweg, E Snekkenes - IEEE International Conference on …, 2004 - ieeexplore.ieee.org
This paper presents a classification of attacks by malicious software. Unlike previous
schemes, it focuses on application software instead of operating systems. We classify …

Dimension of mobile security model: Mobile user security threats and awareness

M Sheila, MA Faizal, S Shahrin - International Journal of …, 2015 - inderscienceonline.com
This is an exploratory study that evaluates mobile security awareness and mobile security
vulnerabilities based on practices among mobile users in higher education institutions …