Security-Measurability-Enhancing Mechanisms for a Distributed Adaptive Security Monitoring System
暂无分享,去创建一个
[1] Reijo Savola. A Security Metrics Taxonomization Model for Software-Intensive Systems , 2009, J. Inf. Process. Syst..
[2] George Spanoudakis,et al. Towards security monitoring patterns , 2007, SAC '07.
[3] Debra Herrmann,et al. Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI , 2007 .
[4] Habtamu Abie,et al. Identification of Basic Measurable Security Components for a Distributed Messaging System , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[5] Robert A. Martin. Managing Vulnerabilities in Networked Systems , 2001, Computer.
[6] Jeff Williams,et al. A Framework for Reasoning about Assurance April 23 , 1998 Developed for : Document Number : ATR 97043 National Security Agency , 1998 .
[7] R.A. Martin,et al. Making security measurable and manageable , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[8] E. Ovaska,et al. From Security Modelling to Run-time Security Monitoring , 2009 .
[9] Richard Bejtlich,et al. The Tao of Network Security Monitoring: Beyond Intrusion Detection , 2004 .
[10] Eugene H. Spafford,et al. The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.
[11] Reijo Savola. On the Feasibility of Utilizing Security Metrics in Software-Intensive Systems , 2010 .
[12] Habtamu Abie,et al. Development of security metrics for a distributed messaging system , 2009, 2009 International Conference on Application of Information and Communication Technologies.
[13] John Bigham,et al. GEMOM - Significant and Measurable Progress beyond the State of the Art , 2008, 2008 Third International Conference on Systems and Networks Communications.
[14] Markus Fiedler,et al. SecMon: end-to-end quality and security monitoring system , 2008, Ann. UMCS Informatica.
[15] Karen A. Scarfone,et al. Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0 , 2010 .
[16] William A. Wulf,et al. TOWARDS A FRAMEWORK FOR SECURITY MEASUREMENT , 1997 .
[17] Wayne A. Jansen,et al. Directions in Security Metrics Research , 2009 .
[18] Seyed Masoud Sadjadi,et al. A Survey of Adaptive Middleware , 2003 .
[19] Reijo Savola,et al. Development of Measurable Security for a Distributed Messaging System , 2010 .
[20] Phil Venables. Security monitoring in heterogeneous globally distributed environments , 1998, Inf. Secur. Tech. Rep..
[21] Jon Whittle,et al. A Survey of Approaches to Adaptive Application Security , 2007, International Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS '07).
[22] Ali R. Hurson,et al. Boosting-Based Distributed and Adaptive Security-Monitoring through Agent Collaboration , 2007, 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops.
[23] Gunnar Peterson,et al. A Metrics Framework to Drive Application Security Improvement , 2007, IEEE Security & Privacy.
[24] Reijo Savola,et al. Definition of Core Requirements and a Reference Architecture for a Dependable, Secure and Adaptive Distributed Monitoring Framework , 2010, 2010 Third International Conference on Dependability.
[25] Andrew Jaquith. Security Metrics: Replacing Fear, Uncertainty, and Doubt , 2007 .
[26] Yoav Tock,et al. Constructing scalable overlays for pub-sub with many topics , 2007, PODC '07.
[27] Habtamu Abie,et al. Robust, Secure, Self-Adaptive and Resilient Messaging Middleware for Business Critical Systems , 2009, 2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns.