Quality of Protection

Security Measurements and Metrics

Editors:

ISBN: 978-0-387-29016-4 (Print) 978-0-387-36584-8 (Online)

Table of contents (15 chapters)

  1. Front Matter

    Pages i-xi

  2. Motivations

    1. No Access

      Book Chapter

      Pages 1-12

      Why to adopt a security metric? A brief survey

    2. No Access

      Book Chapter

      Pages 13-24

      Service-oriented Assurance — Comprehensive Security by Explicit Assurances

  3. Measurements: Reliability vs Security

    1. No Access

      Book Chapter

      Pages 25-36

      Software Security Growth Modeling: Examining Vulnerabilities with Reliability Growth Models

    2. No Access

      Book Chapter

      Pages 37-47

      A Discrete Lognormal Model for Software Defects Affecting Quality of Protection

    3. No Access

      Book Chapter

      Pages 49-64

      Time-to-Compromise Model for Cyber Risk Reduction Estimation

    4. No Access

      Book Chapter

      Pages 65-77

      Assessing the risk of using vulnerable components

    5. No Access

      Book Chapter

      Pages 79-91

      Collection and analysis of attack data based on honeypots deployed on the Internet

  4. Quantitative Security Models

    1. No Access

      Book Chapter

      Pages 93-105

      Multilevel Security and Quality of Protection

    2. No Access

      Book Chapter

      Pages 107-118

      A Conceptual Model for Service Availability

    3. No Access

      Book Chapter

      Pages 119-130

      A SLA evaluation methodology in Service Oriented Architectures

    4. No Access

      Book Chapter

      Pages 131-143

      Towards a Notion of Quantitative Security Analysis

  5. Metrics for Anonymity and Confidentiality

    1. No Access

      Book Chapter

      Pages 145-158

      The Lower Bound of Attacks on Anonymity Systems — A Unicity Distance Approach

    2. No Access

      Book Chapter

      Pages 159-171

      Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis

    3. No Access

      Book Chapter

      Pages 173-184

      Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages

    4. No Access

      Book Chapter

      Pages 185-195

      Measuring Inference Exposure in Outsourced Encrypted Databases

  6. Back Matter

    Pages 197-197