6.3.1 Secure Adaptive Response Potential (SARP): A System Security Metric

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Adaptive Response Potential (SARP): A System Security Metric

System design, development and operational activities are monitored and evaluated to facilitate proper system security management in all phases of the system life-cycle. Effective system security metrics must address all phases of the system life-cycle as well as the associated organizational elements that interact during the system life-cycle to produce and operate the system of interest. A si...

متن کامل

Secure System of Attack Patterns towards Application Security Metric Derivation

Attack pattern system exhibits a unique property of pattern sequential cascading nature which can be identified during the design phase of an application system implementing security scenarios. In this paper a mathematical framework of secure system of attack patterns is presented to verify the stated design specification property along with theoretical back ground work. The framework defines 1...

متن کامل

A Framework for Adaptive Secure Information System

We are facing increasing threats and vulnerability on the Internet. Conventional intrusion detection techniques are not sufficient, especially for new attacks. Thus, it is necessary to adopt intrusion tolerance techniques. However, sophisticated intrusion tolerance techniques may provide better security, but also incur performance penalties. In this paper, we propose an adaptive intrusion toler...

متن کامل

Multilevel Adaptive Security System

MULTILEVEL ADAPTIVE SECURITY SYSTEM by Hongwei Li Recent trends show increased demand for content-rich media such as images, videos and text in ad-hoc communication. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such information over resource constrained ad hoc networks. In this work, traditional data security mechanisms, existing ...

متن کامل

Secure Systems Reasoning about System Security

In this example, Alice and Bob are constants of type principal, and p is a variable of type principal; secretkey is a constant of type key; Has is a predicate with parameters of type principal and key; ⇒ denotes logical implication; and ∨ is logical disjunction. The syntax of a logic precisely defines sets of variables and constants for each type (in this case, principal or key), as well as the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: INCOSE International Symposium

سال: 2008

ISSN: 2334-5837

DOI: 10.1002/j.2334-5837.2008.tb00838.x