A framework for incorporating insurance in critical infrastructure cyber risk strategies
暂无分享,去创建一个
Benjamin W. P. Ramsey | Mason Rice | Juan Lopez | Derek Young | Robert McTasney | Mason Rice | Derek Young | Juan Lopez | R. McTasney
[1] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[2] B. Obama. Executive Order 13691: Promoting Private Sector Cybersecurity Information Sharing , 2015 .
[3] S. Shankar Sastry,et al. Cyber-insurance framework for large scale interdependent networks , 2014, HiCoNS.
[4] Tyler Moore,et al. Securing wastewater facilities from accidental and intentional harm: A cost-benefit analysis , 2013, Int. J. Crit. Infrastructure Prot..
[5] Barack Obama,et al. Executive Order 13636: Improving Critical Infrastructure Cybersecurity , 2013 .
[6] Thomas Nowey,et al. A Closer Look at Information Security Costs , 2012, WEIS.
[7] Mason Rice,et al. Modeling Control System Failures and Attacks - The Waterloo Campaign to Oil Pipelines , 2010, Critical Infrastructure Protection.
[8] Tridib Bandyopadhyay,et al. Why IT managers don't go for cyber-insurance products , 2009, Commun. ACM.
[9] Marc Lelarge,et al. Economic Incentives to Increase Security in the Internet: The Case for Insurance , 2009, IEEE INFOCOM 2009.
[10] Anupam Chander,et al. Securing Privacy in the Internet Age , 2008 .
[11] Borka Jerman-Blazic,et al. An economic modelling approach to information security risk management , 2008, Int. J. Inf. Manag..
[12] Nicolas Christin,et al. Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.
[13] Marc Lelarge,et al. A New Perspective on Internet Security using Insurance , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[14] J. Bolot. Cyber Insurance as an Incentive for Internet Security , 2008 .
[15] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[16] Xiaomeng Su,et al. An Overview of Economic Approaches to Information Security Management , 2006 .
[17] William Yurcik,et al. The Evolution of Cyberinsurance , 2006, ArXiv.
[18] Miles A. McQueen,et al. Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[19] Rainer Böhme,et al. Models and Measures for Correlation in Cyber-Insurance , 2006, WEIS.
[20] Burkhard Pedell,et al. Terrorism Risk Coverage in the Post-9/11 Era: A Comparison of New Public–Private Partnerships in France, Germany and the U.S. , 2005 .
[21] Rainer Böhme,et al. Cyber-Insurance Revisited , 2005, WEIS.
[22] Ruperto P. Majuca,et al. Three Economic Arguments for Cyberinsurance , 2004 .
[23] Rahul Telang,et al. An ounce of prevention vs. a pound of cure: How can we measure the value of IT security solutions? , 2004 .
[24] Lawrence A. Gordon,et al. A framework for using insurance for cyber-risk management , 2003, Commun. ACM.
[25] Lawrence A. Gordon,et al. The economics of information security investment , 2002, TSEC.
[26] Michael M. May,et al. How much is enough? A risk management approach to computer security , 2000 .
[27] G. Skogh. Development Risks, Strict Liability, and the Insurability of Industrial Hazards , 1998 .
[28] R. Scadden. Economics of Insurance . By K. Borch, K. Aase and A. Sandmo. (Elsevier Science Publishing Co. Inc., New York & Amsterdam.) , 1990 .
[29] Michael J. McNamara,et al. Principles of risk management and insurance , 1978 .
[30] L. Sutherland,et al. The Sun Insurance Office, 1710-1960 : the history of two and a half centuries of British insurance , 1962 .
[31] C. Kulp. The Rate-Making Process in Property and Casualty Insurance—Goals, Technics, and Limits , 1950 .