Quality Of Protection Quality Of Protection
Advances in Information Security

Quality Of Protection

Security Measurements and Metrics

Dieter Gollmann and Others
    • 189,99 €
    • 189,99 €

Publisher Description

Information security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common Criteria’s, and a number of industry and academic certifications and risk analysis methodologies, have raised the bar on what is considered good security solution, from a business perspective. Yet, the evaluation of security solutions has largely a qualitative flavor. Notions such as Security Metrics, Quality of Protection (QoP) or Protection Level Agreement (PLA) have only surfaced in the literature.

Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop at ESORICS 2005, the flagship European Symposium on Research in Computer Security. This book discusses how security research can progress towards a notion of quality of protection in security, comparable to the notion of quality of service in networking and software measurements and metrics, in empirical software engineering.

Quality of Protection: Security Measurements and Metrics is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable for graduate-level students in computer science and telecommunications.

GENRE
Computing & Internet
RELEASED
2008
6 May
LANGUAGE
EN
English
LENGTH
210
Pages
PUBLISHER
Springer US
SIZE
3.7
MB

More Books by Dieter Gollmann, Fabio Massacci & Artsiom Yautsiukhin

Proceedings of the Ninth International Conference on Mathematics and Computing Proceedings of the Ninth International Conference on Mathematics and Computing
2023
Information and Communications Security Information and Communications Security
2020
Computer Security – ESORICS 2017 Computer Security – ESORICS 2017
2017
Computer Security – ESORICS 2017 Computer Security – ESORICS 2017
2017
Applied Cryptography and Network Security Applied Cryptography and Network Security
2017
Insider Threats in Cyber Security Insider Threats in Cyber Security
2010

Other Books in This Series

Adversarial Multimedia Forensics Adversarial Multimedia Forensics
2024
Blockchains Blockchains
2024
Decision Making and Security Risk Management for IoT Environments Decision Making and Security Risk Management for IoT Environments
2024
Security and Risk Analysis for Intelligent Edge Computing Security and Risk Analysis for Intelligent Edge Computing
2023
Autonomous Intelligent Cyber Defense Agent (AICA) Autonomous Intelligent Cyber Defense Agent (AICA)
2023
Blockchain for Cybersecurity in Cyber-Physical Systems Blockchain for Cybersecurity in Cyber-Physical Systems
2023