Skip to main content

Pricing Security

A Market in Vulnerabilities

  • Chapter

Part of the book series: Advances in Information Security ((ADIS,volume 12))

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Amoroso, E. G. (1994), Fundamentals of Computer Security Technology, Prentice-Hall PTR, Upper Saddle River, NJ, 1994.

    Google Scholar 

  • Aslam, Krsul, and Spafford (1996), “A Taxonomy of Security Vulnerabilities”, Proceedings of the 19th National Information Systems Security Conference, pages 551–560, Baltimore, Maryland, October.

    Google Scholar 

  • Ayres and Levitt (1998), “Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack”, The Quarterly Journal of Economics, Vol. 113, p 43–77. February.

    Google Scholar 

  • Coase, R.H. (1960). “The problem of social cost”, Journal of Law and Economics, Vol. 3, pp. 1–44.

    Article  Google Scholar 

  • President’s Commission on Critical Infrastructure Protection, Critical Foundations: Protecting America’s Infrastructure: The Report of the President’s Commission on Critical Infrastructure Protection, 1997, President’s Commission on Critical Infrastructure Protection, Washington DC.

    Google Scholar 

  • The Computer Science and Telecommunications Board (1999). Trust in Cyberspace, National Academy Press; Washington, DC.

    Google Scholar 

  • Department of Defense (1985). Department of Defense Trusted Computer System Evaluation Criteria, National Computer Security Center, Fort George G. Meade, MD.

    Google Scholar 

  • Farmer (1999). Security Survey of Key Internet Hosts & Various Semi-Relevant Reflection, http://www.fish.com/survey/

  • Howard, J. (1997). An Analysis Of Security Incidents On The Internet 1989–1995, Ph.D. dissertation, Carnegie Mellon University. Available at http://www.cert.org/research/JHThesis/Start.html.

  • Landwehr, Bull, McDermott and Choi (1994). “A Taxonomy of Computer Program Security Flaws, with Examples”, ACM Computing Surveys, Vol. 26, Sept. pp. 3–39.

    Google Scholar 

  • National Bureau of Standards (1977). Federal Information Processing Publication 46: Specifications for the Digital Encryption Standard, United States Government Printing Office; Gaithersburg, MA.

    Google Scholar 

  • National Institute of Standards and Technology (1994). Federal Information Processing Standards Publications 185: Escrowed Encryption Standard, United States Government Printing Office; Gaithersburg, MA.

    Google Scholar 

  • National Research Council (1996). Cryptography’s Role in Securing the Information Society, National Academy Press, Washington, DC.

    Google Scholar 

  • Shapiro, Carl and Hal Varian (1999). Information Rules: A Strategic Guide to the Network Economy, Harvard Business School Press, Boston, MA.

    Google Scholar 

  • Schmalensee, R., Joskow, L., Ellerman, A.D., Montero, J.P., and Bailey, E. M. (1998). “An Interim Evaluation of Sulfur Dioxide Emissions Trading”, Journal of Economic Perspectives. Vol. 12(3). p 53–68. Summer.

    Google Scholar 

  • Tygar and Whitten (1996). “WWW Electronic Commerce and Java Trojan Horses”, Second Usenix Electronic Commerce Workshop, Barkeley, CA. Also at http://www.cs.cmu.edu/afs/cs/project/decaf/web/usenix96/main.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer Science + Business Media, Inc.

About this chapter

Cite this chapter

Jean Camp, L., Wolfram, C. (2004). Pricing Security. In: Camp, L.J., Lewis, S. (eds) Economics of Information Security. Advances in Information Security, vol 12. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8090-5_2

Download citation

  • DOI: https://doi.org/10.1007/1-4020-8090-5_2

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4020-8089-0

  • Online ISBN: 978-1-4020-8090-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics