Sciweavers

211 search results - page 1 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
13 years 8 months ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
IEEEARES
2009
IEEE
13 years 11 months ago
Web Service Trust: Towards a Dynamic Assessment Framework
— Trust in software services is a key prerequisite for the success and wide adoption of Services-Oriented Computing (SOC) in an open Internet world. However, trust is poorly asse...
George Spanoudakis, Stephane LoPresti
CAISE
2010
Springer
13 years 5 months ago
Situational Evaluation of Method Fragments: An Evidence-Based Goal-Oriented Approach
Despite advances in situational method engineering, many software organizations continue to adopt an ad-hoc mix of method fragments from wellknown development methods such as Scrum...
Hesam Chiniforooshan Esfahani, Eric Yu, Jordi Cabo...
SAC
2004
ACM
13 years 10 months ago
Towards multisensor data fusion for DoS detection
In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We present DempsterShafer’s Theory of Evidence (D-S) as the mathematical foundati...
Christos Siaterlis, Basil S. Maglaris
DSN
2009
IEEE
13 years 11 months ago
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
Remote attestation of system integrity is an essential part of trusted computing. However, current remote attestation techniques only provide integrity proofs of static properties...
Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Pen...