Results 241 to 250 of about 1,953,986 (295)
Some of the next articles are maybe not open access.

Security Measuring for Self-adaptive Security

Proceedings of the 2014 European Conference on Software Architecture Workshops, 2014
Self-adaptive security is needed due to vast amount of changes in an execution environment and threat landscape, which all cannot be anticipated at software design-time. Self-adaptive security requires means for monitoring a security level and decision making capability to improve the current security level.
Abie, Habtamu   +3 more
openaire   +2 more sources

Measuring Security

IEEE Security & Privacy Magazine, 2011
The field of computer and communications security begs for a foundational science to guide system design and to reveal the safety, security, and possible fragility of the complex systems we depend on today. To achieve this goal, we must devise suitable metrics for objectively comparing and evaluating the security of system designs and organizations.
Sal Stolfo   +2 more
openaire   +1 more source

Measuring Security

International Journal of Information Systems in the Service Sector, 2018
The researchers have been focusing on embedding security from the early phases of software development lifecycle. They have researched and innovated a field of Security Engineering where security concerns are embedded during requirement, design, and testing phases of software development.
Shruti Jaiswal, Daya Gupta
openaire   +1 more source

Measuring Securities Litigation Risk

SSRN Electronic Journal, 2011
Abstract Extant research commonly uses indicator variables for industry membership to proxy for securities litigation risk. We provide evidence on the construct validity of this measure by reporting on the predictive ability of alternative models of litigation risk. While the industry measure alone does a relatively poor job of predicting litigation,
Irene Kim, Douglas J. Skinner
openaire   +1 more source

Measuring systems security

Systems Engineering, 2012
Abstract Security metrics have evolved side by side with the advent of security tools and techniques. They have been derived from the techniques rather than specified as system requirements. This paper surveys the evolution and state of the practice of security metrics from both a technical and historical perspective. It describes the
Jennifer Bayuk, Ali Mostashari
openaire   +1 more source

Measuring security

2014
Abstract Purpose The purpose of this study is to define the interactions that determine how secure a society is from terrorism and to propose a method for measuring the threat of terrorism in an objective and spatio-temporally comparable manner.
Tilman Brück   +2 more
openaire   +1 more source

Measuring firewall security

2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 2011
In the recent years, more attention is given to firewalls as they are considered the corner stone in Cyber defense perimeters. The ability to measure the quality of protection of a firewall policy is a key step to assess the defense level for any network.
Saeed Al-Haj, Ehab Al-Shaer
openaire   +1 more source

Measuring Application Security

2018
We report on a qualitative study of application security (AppSec) program management. We sought to establish the boundaries used to define program scope, the goals of AppSec practitioners, and the metrics and tools used to measure performance. We find that the overarching goal of AppSec groups is to ensure the security of software systems; this is a ...
Christopher Horn, Anita D‘Amico
openaire   +1 more source

Measures of Food Insecurity/Security

Journal of Nutrition Education, 2001
ABSTRACT Nutrition education has the potential to play an important role in ensuring food security and improving nutritional status. Therefore, food security is recommended for inclusion in nutrition education evaluation efforts. Considerable progress has been made in developing brief tools that can be used to measure food security at the household ...
D P, Keenan   +3 more
openaire   +2 more sources

Basic security measures

Data Processing, 1982
Abstract Token based access control systems can operate automatically, and to suit varying control requirements.
openaire   +1 more source

Home - About - Disclaimer - Privacy