From Security Modelling to Run-time Security Monitoring
暂无分享,去创建一个
[1] William A. Wulf,et al. TOWARDS A FRAMEWORK FOR SECURITY MEASUREMENT , 1997 .
[2] Timothy W. Finin,et al. Security for DAML Web Services: Annotation and Matchmaking , 2003, SEMWEB.
[3] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[4] Timothy W. Finin,et al. Security in the Semantic Web using OWL , 2005, Inf. Secur. Tech. Rep..
[5] Myong H. Kang,et al. Security Ontology for Annotating Resources , 2005, OTM Conferences.
[6] Dimitris Gritzalis,et al. An Ontology-Based Approach to Information Systems Security Management , 2005, MMM-ACNS.
[7] Mario Piattini,et al. Towards a consistent terminology for software measurement , 2006, Inf. Softw. Technol..
[8] Dimitris Gritzalis,et al. Towards an Ontology-based Security Management , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[9] Paul E. Black. SAMATE's Contribution to Information Assurance , 2006 .
[10] Reijo Savola,et al. Towards a taxonomy for information security metrics , 2007, QoP '07.
[11] Eila Niemelä,et al. A Taxonomy of Information Security for Service-Centric Systems , 2007, 33rd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO 2007).
[12] Habtamu Abie,et al. Identification of Basic Measurable Security Components for a Distributed Messaging System , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[13] B. Gladman,et al. Security Engineering: a Guide to Building Dependable Distributed Systems Physical Tamper Resistance 14.1 Introduction , 2022 .