Why to adopt a security metric? A brief survey

نویسندگان

  • Andrea S. Atzeni
  • Antonio Lioy
چکیده

No doubt that computer security is a hot topic nowadays: given the importance of computer-assisted activities, protection of computer system is of the utmost importance. However we have insofar failed to evaluate the actual security level of a system and thus to justify (either in technical or economical terms) the investments in security. This paper highlights the motivations to improve security measurement techniques, analyses the existing approaches, and discusses whether their are appropriate or some new directions should be explored.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Brief Philosophical Encounter with Science and Medicine

We show a lot of respect for science today. To back up our claims, we tend to appeal to scientific methods. It seems that we all agree that these methods are effective for gaining the truth. We can ask why science has its special status as a supplier of knowledge about our external world and our bodies. Of course, one should not always trust what scientists say. Nonetheless, epistemological jus...

متن کامل

A Model for Willingness to Adopt Open Government Policies in Iran

Based on the policy diffusion framework, some policies are adopted by policy makers. On the other hand, the ‘open government concept’ offers options to solve problems and challenges faced by governments, including corruption, distrust among citizens towards the government, weak inter-relationship between government and citizens, and weak cooperation and interaction among components of the admin...

متن کامل

Advanced Policy Explanations on the Web

The frameworks for protecting security and privacy can be effective only if common users—with no training in computer science or logic—increase their awareness and control over the policy applied by the systems they interact with. Towards this end, we introduce a mechanism for answering why, why-not, how-to, and what-if queries on rule-based policies for trust negotiation. Our framework is ligh...

متن کامل

Separating Between Trust and Access Control Policies: A necessity for Web Applications

As Security is the key of success for Web Applications most of the efforts that have been put in this domain have focused on wining users’ trust to adopt the Web environment for their business operations. Although user trust is of paramount importance for Web applications, one also needs to consider Web applications trust towards users here after referred to as user trustworthiness. This paper ...

متن کامل

On the user acceptance of graphical passwords

In this paper we investigate options for improving the user acceptance of graphical passwords. We conducted a survey with a dual purpose. Firstly, we explored the users’ reluctance to adopt graphical passwords. Secondly, we treated the graphical password authentication process as a biometric. By doing this, we proposed a distance metric to compare the user authentication response with the right...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006