Quality of Protection Security Measurements and Metrics

Information security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common Criteria’s, and a number of industry and academic certifications and risk analysis methodologies, have raised the bar on what is cons

  • PDF / 12,376,422 Bytes
  • 200 Pages / 459 x 684 pts Page_size
  • 60 Downloads / 187 Views

DOWNLOAD

REPORT


Advances in Information Security Sushil Jajodia Consulting Editor Center for Secure Information @stems George Mason University Fairfax, VA 22030-4444 email: jajodia @gmu. edu The goals of the Springer International Series on ADVANCES IN INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source for advanced and timely topics in information security research and development. The scope of this series includes all aspects of computer and network security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive overviews of specific topics in information security, as well as works that are larger in scope or that contain more detailed background information than can be accommodated in shorter survey articles. The series also serves as a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook treatment. Researchers, as well as developers, are encouraged to contact Professor Sushil Jajodia with ideas for books under this series.

A d d i t i o n a l t i t l e s in the s e r i e s : UNDERSTANDING INTRUSION DETECTION THROUGH VISUALIZATION by Stefan Axelsson; ISBN- 10:0-387-27634-3 COMPUTER VIRUSES AND MALWARE by John Aycock; ISBN-10:0-387-30236-0 HOP INTEGRITY IN THE INTERNET by Chin-Tser Huang and Mohamed G. Gouda; ISBN- 10:0-387-22426-3 CRYPTOGRAPHICS: Exploiting Graphics Cards For Security by Debra Cook and Angelos Keromytis; ISBN: 0-387-34189-7 PRIVACY PRESERVING DATA MINING by Jaideep Vaidya, Chris Clifton and Michael Zhu; ISBN-10: 0-387- 25886-8 BIOMETRIC USER AUTHENTICATION FOR IT SECURITY: From Fundamentals to Handwriting by Claus Vielhauer; ISBN-10: 0-387-26194-X IMPACTS AND RISK ASSESSMENT OF TECHNOLOGY FOR INTERNET SECURITY:Enabled Information Small-Medium Enterprises (TEISMES) by Charles A. Shoniregun; ISBN-10:0-387-24343-7 SECURITY IN E.LEARNING by Edgar R. Weippl; ISBN: 0-387-24341-0 IMAGE AND VIDEO ENCRYPTION: From Digital Rights Management to Secured Personal Communication by Andreas Uhl and Andreas Pommer; ISBN: 0-387-23402-0 INTRUSION DETECTION AND CORRELATION: Challenges and Solutions by Christopher Kruegel, Fredrik Valeur and Giovanni Vigna; ISBN: 0-387-23398-9 THE AUSTIN PROTOCOL COMPILER by Tommy M. McGuire and Mohamed G. Gouda; ISBN: 0-387-23227-3 Additional information about this series can be obtained from http://www.springer.com

Quality of Protection Security Measurements and Metrics

edited by

Dieter Gollmann

TU Hamburg-Harburg, Germany

Fabio Massacci

University of Trento, Italy

Artsiom Yautsiukhin University of Trento, Italy

Springer

Dieter Gollmann TU Hamburg-Harburg Institute Security in Distributed Applications Harburger SchloBstraBe 20 21079 Hamburg GERMANY diego @tu- harbur g. de

Fabio Massacci University of Trento Dipartimento Informatica e Telecomunicazioni (DIT) Via Sommarive, 14 38050 TRENTO ITALY Fabio.Massacci @unitn.it

Artsiom Yau