Quantitative Assessment of Enterprise Security System
暂无分享,去创建一个
[1] Peter Bernus,et al. Handbook on Enterprise Architecture , 2010, International Handbooks on Information Systems.
[2] Ruth Breu,et al. Using an Enterprise Architecture for IT Risk Management , 2006, ISSA.
[3] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2004, Requirements Engineering.
[4] Gary Stoneburner,et al. SP 800-30. Risk Management Guide for Information Technology Systems , 2002 .
[5] Sjouke Mauw,et al. Foundations of Attack Trees , 2005, ICISC.
[6] Stefano Bistarelli,et al. Defense trees for economic evaluation of security investments , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[7] Bharat B. Madan,et al. A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.
[8] Rossouw von Solms,et al. From information security to ... business security? , 2005, Comput. Secur..
[9] Jan Jürjens,et al. Model-Based Security Engineering with UML , 2004, FOSAD.
[10] Rodolphe Ortalo,et al. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..
[11] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[12] Sushil Jajodia,et al. Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts , 2006, Comput. Commun..
[13] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[14] Lawrence A. Gordon,et al. Managing Cybersecurity Resources: A Cost-Benefit Analysis , 2005 .
[15] Ketil Stølen,et al. Model-based risk assessment to improve enterprise security , 2002, Proceedings. Sixth International Enterprise Distributed Object Computing.
[16] Jeannette M. Wing,et al. Tools for Generating and Analyzing Attack Graphs , 2003, FMCO.
[17] K. Clark,et al. Security risk metrics: fusing enterprise objectives and vulnerabilities , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[18] I. Hogganvik,et al. Model-based security analysis in seven steps — a guided tour to the CORAS method , 2007 .
[19] Shawn A. Butler. Security attribute evaluation method: a cost-benefit approach , 2002, ICSE '02.
[20] Christopher J. Alberts,et al. Managing Information Security Risks: The OCTAVE Approach , 2002 .
[21] Axel van Lamsweerde,et al. Goal-Oriented Requirements Engineering: A Guided Tour , 2001, RE.
[22] Frank D. Valencia,et al. Formal Methods for Components and Objects , 2002, Lecture Notes in Computer Science.
[23] E. Zambon,et al. A Model Supporting Business Continuity Auditing and Planning in Information Systems , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).
[24] Axel van Lamsweerde,et al. From system goals to intruder anti-goals: attack generation and resolution for security requirements engineering , 2003 .
[25] R. Kelly Rainer,et al. Do Information Security Professionals and Business Managers View Information Security Issues Differently? , 2007, Inf. Secur. J. A Glob. Perspect..
[26] Ingoo Han,et al. The IS risk analysis based on a business model , 2003, Inf. Manag..
[27] Sandro Etalle,et al. Model-Based Mitigation of Availability Risks , 2007, 2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management.
[28] L OpdahlAndreas,et al. Eliciting security requirements with misuse cases , 2005 .
[29] Pontus Johnson,et al. Assessment of Enterprise Information Security - An Architecture Theory Diagram Definition - , 2005 .