Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
The official PGP user's guide
Internet security: firewalls and beyond
Communications of the ACM
How secure is secure: some thoughts on security metrics
Proceedings of the ninth annual IFIP TC11 WG11.3 working conference on Database security IX : status and prospects: status and prospects
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
A Subjective Metric of Authentication
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Measurements and Quality of Service Issues in Electronic Commerce Software
ASSET '99 Proceedings of the 1999 IEEE Symposium on Application - Specific Systems and Software Engineering and Technology
Rapid Secure Development. Ein Verfahren zur Definition einesInternet-Sicherheitskonzeptes
Rapid Secure Development. Ein Verfahren zur Definition einesInternet-Sicherheitskonzeptes
Electronic commerce: structures and issues
International Journal of Electronic Commerce - Special section: Diversity in electronic commerce research
A Method of Security Measurement of the Network Data Transmission
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Hi-index | 0.00 |
The rapid growth of the commercial use of the Internet goes along with a rising need for security for both customer and merchant. As many parties and different systems are involved, security becomes a complicated issue. Therefore, the need for definition, structuring, and quantification of security arises. This paper proposes a structured approach to analyze security measures and to quantify the overall security of an electronic business application. The quantifier is calculated through a security matrix which breaks down the assessment of security into smaller parts. These parts correspond to the locations, security objectives, and implemented security mechanisms of the application. The security quantifier can be used to analyze, design the application, and to compare it with other applications.