Selecting Cryptographic Key Sizes
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Complete Guide to Security and Privacy Metrics
Complete Guide to Security and Privacy Metrics
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Methodology for Service-Oriented Management of Security Assurance in Communication Infrastructures
HASE '08 Proceedings of the 2008 11th IEEE High Assurance Systems Engineering Symposium
GEMOM - Significant and Measurable Progress beyond the State of the Art
ICSNC '08 Proceedings of the 2008 Third International Conference on Systems and Networks Communications
Multi-agent based security assurance monitoring system for telecommunication infrastructures
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Quantified security is a weak hypothesis: a critical survey of results and assumptions
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Innovations and Advances in Adaptive Secure Message Oriented Middleware
ICDCSW '10 Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops
Security-Measurability-Enhancing Mechanisms for a Distributed Adaptive Security Monitoring System
SECURWARE '10 Proceedings of the 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies
SP 800-63-1. Electronic Authentication Guideline
SP 800-63-1. Electronic Authentication Guideline
Towards an abstraction layer for security assurance measurements: (invited paper)
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
QoS aware adaptive security scheme for video streaming in MANETs
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Hi-index | 0.00 |
Banking applications require a high standard of security, resilience and adaptation. The results presented here were obtained from a case study of the deployment of the security metrics-driven adaptive security solutions of a distributed middleware in the context of monetary transfers. The focus of this study is on the analysis of the applicability of security metrics for adaptive authentication, authorization, and end-to-end confidentiality, and the applicability of trust metrics.