Techniques for trusted software engineering
Proceedings of the 20th international conference on Software engineering
ACM Transactions on Information and System Security (TISSEC)
Trust (and mistrust) in secure applications
Communications of the ACM
Information security is information risk management
Proceedings of the 2001 workshop on New security paradigms
Managing Information Security Risks: The Octave Approach
Managing Information Security Risks: The Octave Approach
Managing Software Security Risks
Computer
Formal Security Analysis with Interacting State Machines
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
The grand challenge of Trusted Components
Proceedings of the 25th International Conference on Software Engineering
Exploiting Software: How to Break Code
Exploiting Software: How to Break Code
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
Using trust and risk in role-based access control policies
Proceedings of the ninth ACM symposium on Access control models and technologies
The Effect of Trust Assumptions on the Elaboration of Security Requirements
RE '04 Proceedings of the Requirements Engineering Conference, 12th IEEE International
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Building Secure Software: How to Avoid Security Problems the Right Way (paperback) (Addison-Wesley Professional Computing Series)
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
Risk assessment in practice: A real case study
Computer Communications
Towards more secure systems: how to combine expert evaluations
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Enabling the adoption of aspects - testing aspects: a risk model, fault model and patterns
Proceedings of the 8th ACM international conference on Aspect-oriented software development
Software security metric identification framework (SSM)
Proceedings of the International Conference on Advances in Computing, Communication and Control
Quantified security is a weak hypothesis: a critical survey of results and assumptions
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Optimization of TLS security protocol using the adaptable security model
Annales UMCS, Informatica
Optimization of TLS security protocol using the adaptable security model
Annales UMCS, Informatica
Hi-index | 0.00 |
Measuring the security of a software system is a difficult problem. This paper presents a model using common security concepts to evaluate the security of a system under design. After providing definitions for all relevant concepts and formalizing some of them, we define security requirements for transactions and provide mechanisms to measure the likelihood of violation of these requirements. Our model is based on individual risks presented by system components. Based on the security policy and individual risks, we calculate violation risk for a certain transaction. Context and other risk factors are considered and can be used to adjust the final risk figure. As part of our discussion, we address trust and risk and their significance to security engineering. Based on the decision process, the same trust assumptions may increase, or decrease, the risk to the system. We model the fact that small individual risks can be transformed into major risks when combined together in a complex attack.