Gollmann, Dieter

Quality of Protection

Gollmann, Dieter - Quality of Protection, ebook


Ebook, PDF with Adobe DRM
ISBN: 9780387365848
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

Part 1.Motivations

1. Why to adopt a security metric? A brief survey
Andrea Atzeni, Antonio Lioy

2. Service-oriented Assurance — Comprehensive Security by Explicit Assurances
Günter Karjoth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner

Part 2.Measurements: Reliability vs Security

3. Software Security Growth Modeling: Examining Vulnerabilities with Reliability Growth Models
Andy Ozment

4. A Discrete Lognormal Model for Software Defects Affecting Quality of Protection
Robert E. Mullen, Swapna S. Gokhale

5. Time-to-Compromise Model for Cyber Risk Reduction Estimation
Miles A. McQueen, Wayne F. Boyer, Mark A. Flynn, George A. Beitel

6. Assessing the risk of using vulnerable components
Davide Balzarotti, Mattia Monga, Sabrina Sicari

7. Collection and analysis of attack data based on honeypots deployed on the Internet
E. Alata, M. Dacier, Y. Deswarte, M. Kaaâniche, K. Kortchinsky, V. Nicomette, V. H. Pham, F. Pouget

Part 3.Quantitative Security Models

8. Multilevel Security and Quality of Protection
Simon N. Foley, Stefano Bistarelli, Barry O’Sullivan, John Herbert, Garret Swart

9. A Conceptual Model for Service Availability
Judith E. Y. RossebeØ, Mass Soldal Lund, Knut Eilif Husa, Atle Refsdal

10. A SLA evaluation methodology in Service Oriented Architectures
Valentina Casola, Antonino Mazzeo, Nicola Mazzocca, Massimiliano Rak

11. Towards a Notion of Quantitative Security Analysis
Iliano Cervesato

Part 4.Metrics for Anonymity and Confidentiality

12. The Lower Bound of Attacks on Anonymity Systems — A Unicity Distance Approach
Dogan Kesdogan, Lexi Pimenidis

13. Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis
Dogan Kesdogan, Lexi Pimenidis, Tobias KÖlsch

14. Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages
Reine Lundin, Stefan Lindskog, Anna Brunstrom, Simone Fischer-Hübner

15. Measuring Inference Exposure in Outsourced Encrypted Databases
E. Damiani, S. Capitani di Vimercati, S. Foresti, P. Samarati, M. Viviani


Printing: not available
Clipboard copying: not available

Keywords: COMPUTERS / Computer Science COM014000

Publication year
Information Technology, Telecommunications

Similar titles