Reijo Savola

1992 …2019
If you made any changes in Pure these will be visible here soon.

Research Output 1992 2018

2018

5th International Workshop on Measurability of Security in Software Architectures (MeSSa 2018)

Savola, R., Kanstrén, T. & Abie, H., 24 Sep 2018, ECSA '18: Proceedings of the 12th European Conference on Software Architecture. Association for Computing Machinery ACM, p. 60KDUMMY

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Cybersecurity for Wireless Nuclear Applications

Savola, R., 2018. 17 p.

Research output: Contribution to conferenceOther conference contributionScientific

Open Access

Risk-driven security metrics development for software-defined networking

Savola, R. M. & Savolainen, P., 24 Sep 2018, ECSA '18: Proceedings of the 12th European Conference on Software Architecture. Association for Computing Machinery ACM, a56

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Network management
Quality of service
Decision making
Software defined networking
Monitoring
2017
1 Citation (Scopus)

Current level of cybersecurity competence and future development - Case Finland

Savola, R. M., 2017, Companion Proceedings - 11th European Conference on Software Architecture, ECSA 2017. Association for Computing Machinery ACM, Vol. Part F130530. p. 121-124 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Industry

Workshop session: Fourth international workshop on measurability of security in software architectures (MeSSa 2017)

Savola, R. (ed.), Abie, H. (ed.) & Kanstren, T. (ed.), 2017, Proceedings of the 11th European Conference on Software Architecture: Companion Proceedings . Association for Computing Machinery ACM

Research output: Chapter in Book/Report/Conference proceedingOther book partScientific

Software architecture
Computer systems
Monitoring
Costs
2016

Kyberosaaminen Suomessa: Nykytila ja tiekartta tulevaisuuteen

Translated title of the contribution: Cyber security competencies in Finland: Current state and roadmap for the futurePelkonen, A., Ahlqvist, T., Leinonen, A., Nieminen, M., Salonen, J., Savola, R., Savolainen, P., Suominen, A., Toivanen, H., Kyheröinen, J. & Remes, J., 2016, 90 p. (Valtioneuvoston selvitys- ja tutkimustoiminnan julkaisusarja, Vol. 9/2015).

Research output: Book/ReportReportProfessional

Israel
Finland
9 Citations (Scopus)

Mitigating IoT security threats with a trusted Network element

Kuusijarvi, J., Savola, R., Savolainen, P. & Evesti, A., 16 Feb 2016, Internet Technology and Secured Transactions (ICITST), 2016 11th International Conference for . Institute of Electrical and Electronic Engineers IEEE, p. 260-265

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Gateways (computer networks)
Interfaces (computer)
Internet of things
Internet
Industry

Race on talented people - Case Finland: What kinds of skills are needed?

Pelkonen, A., Limnéll, J., Savola, R. & Salonen, J., 2016, In : European Cybersecurity Journal. 2, 2, p. 28-36

Research output: Contribution to journalArticleProfessional

Towards Security Metrics-Supported IP Traceback

Savola, R., Savolainen, P. & Salonen, J., 2016, ECSAW '16 Proccedings of the 10th European Conference on Software Architecture Workshops. Association for Computing Machinery ACM, 32

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Critical infrastructures
Internet protocols
2015
4 Citations (Scopus)

Architecture for high confidence cloud security monitoring

Kanstrén, T., Lehtonen, S., Savola, R., Kukkohovi, H. & Hätönen, K., 23 Apr 2015, Cloud Engineering (IC2E), 2015 IEEE International Conference on. Institute of Electrical and Electronic Engineers IEEE, p. 195 - 200

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Monitoring
Hardware security
Virtual machine
10 Citations (Scopus)

Risk-driven security metrics development for an e-health IoT application

Savola, R. M., Savolainen, P., Evesti, A., Abie, H. & Sihvonen, M., 23 Nov 2015, Information Security for South Africa (ISSA), 2015. Institute of Electrical and Electronic Engineers IEEE, p. 1 - 6

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Health
Decision making
Decomposition
Internet of things
2014

Security measuring for self-adaptive security

Evesti, A., Abie, H. & Savola, R., 2014, Proceedings of the 2014 European Conference on Software Architecture Workshops: ECSAW '14. Austria: Association for Computing Machinery ACM, 7 p. 5

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Software design
Decision making
Monitoring

Security objectives, controls and metrics development for an Android smartphone application

Savola, R. & Kylänpää, M., 2014, Conference Proceedings: Information Security for South Africa 2014. Institute of Electrical and Electronic Engineers IEEE, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Smartphones
Wireless networks
Risk analysis
Demonstrations
Decision making

Towards integration of risk-driven and evidence driven information security measurement

Savola, R., 2014, Proceedings: IEEE 8th International Conference on Application of Information and Communication Technologies, AICT 2014. Institute of Electrical and Electronic Engineers IEEE, 6 p. 7035903

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Security of data
Decision making
Monitoring
2013
2 Citations (Scopus)

A risk-driven security analysis and metrics development for WSN-MCN router

Frantti, T., Savola, R. & Hietalahti, H., 2013, Proceedings: International Conference on ICT Convergence, ICTC 2013. Institute of Electrical and Electronic Engineers IEEE, p. 22-25

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Routers
Wireless sensor networks
Automation
Internet of things

Critical to cloud services: Security, privacy and trust

Savola, R., Juhola, A. & Uusitalo, I., 2013, Value-driven business in the cloud. Espoo: VTT Technical Research Centre of Finland, p. 44-45 (VTT Research Highlights; No. 9).

Research output: Chapter in Book/Report/Conference proceedingChapter or book articleProfessional

Open Access
18 Citations (Scopus)

Metrics-driven security objective decomposition for an E-health application with adaptive security management

Savola, R. & Abie, H., 2013, ASPI '13 Proceedings of the International Workshop on Adaptive Security. New York: Association for Computing Machinery ACM, 6

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Health
Decomposition
Internet of things

Productivity leap with ioT: Visions of the Internet of Things with a special focus on Global Asset Management and Smart Lighting

Jurvansuu, M. (ed.), Belloni, K. (ed.), Ailisto, H., Sihvonen, S., Tukeva, P., Aikio, J., Virkkunen, R., Kortelainen, H., Heilala, J., Rauma, T., Roine, M., van Gils, M., Ventä, O., Jantunen, E., Katainen, T., Lehtonen, M., Heinonen, R., Merilahti, J., Ketomäki, J., Hast, J. & 17 others, Peltola, J., Mäkelä, S-M., Könönen, V., Ahola, J., Juntunen, E., Katasonov, A., Hiltunen, J., Kaartinen, J., Savola, R., Savolainen, P., Soininen, J-P., Kiljander, J., Huusko, J., Airaksinen, M., Mäki, K., Strömmer, E. & Rönkä, K., 2013, Espoo: VTT Technical Research Centre of Finland. 99 p. (VTT Visions; No. 3).

Research output: Book/ReportBook (editor)Professional

Open Access
Asset management
Lighting
Productivity
3D printers
Industry
27 Citations (Scopus)

Quality of security metrics and measurements

Savola, R., 2013, In : Computers and Security. 37, p. 78-90 12 p.

Research output: Contribution to journalArticleScientificpeer-review

Security of data
Decision making
expert survey
interview
quantification
5 Citations (Scopus)

Requirements of secure WSN-MCN edge router

Frantti, T., Hietalahti, H. & Savola, R., 2013, Proceedings: The International Conference on Information Networking 2013, ICOIN 2013. Institute of Electrical and Electronic Engineers IEEE, p. 210-215

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Routers
Internet
Network architecture
Sensor networks
Program processors
1 Citation (Scopus)

Security risks in the short-range communication of ubiquitous application

Evesti, A., Suomalainen, J. & Savola, R., 2013, Proceedings: 8th International Conference for Internet Technology and Secured Transactions, ICITST-2013. UK: Institute of Electrical and Electronic Engineers IEEE, p. 612-617

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Communication
Ubiquitous computing
Health
Zigbee
Bluetooth

SR307 Tietoturvallisuuden hallinta ISO/IEC 27000

Savola, R., 2013.

Research output: Contribution to conferenceOther conference contributionProfessional

9 Citations (Scopus)

Taxonomy of quality metrics for assessing assurance of security correctness

Ouedraogo, M., Savola, R., Mouratidis, H., Preston, D., Khadraoui, D. & Dubois, E., 2013, In : Software Quality Journal. 21, 1, p. 67-97 31 p.

Research output: Contribution to journalArticleScientificpeer-review

Taxonomies
Information technology
Glossaries
Security systems
Access control
1 Citation (Scopus)

Toward risk-driven security measurement for android smartphone platforms

Savola, R., Väisänen, T., Evesti, A., Savolainen, P., Kemppainen, J. & Kokemäki, M., 2013, Proceedings of the ISSA 2013 Conference. Institute of Electrical and Electronic Engineers IEEE, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Smartphones
Risk analysis
Wireless networks
Decision making
Decomposition

Towards measurement of security effectiveness enabling factors in software intensive systems

Savola, R., 2013, In : Lecture Notes on Software Engineering. 2, 1, p. 104 - 109

Research output: Contribution to journalArticleScientific

2012
2 Citations (Scopus)

Metrics driven security management framework for ehealth digital ecosystem focusing on chronic diseases

Savola, R. & Sihvonen, M., 2012, Proceedings of the International Conference on Management of Emergent Digital EcoSystems, MEDES 2012. New York, NY, USA: Association for Computing Machinery ACM, p. 75-79

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Ecosystems
Health
Medical problems
Visualization
Decision making

Proceedings of the eight international conference on networking and services

Nguyen, T. (ed.), Šulc, V. (ed.) & Savola, R., 2012, International Academy, Research, and Industry Association IARIA. (International Conference on Networking and Services; No. ICNS 2012).

Research output: Book/ReportBook (editor)Professional

Open Access
11 Citations (Scopus)

Risk-driven security metrics in agile software development: An industrial pilot study

Savola, R., Frühwirth, C. & Pietikäinen, A., 2012, In : Journal of Universal Computer Science. 18, 12, p. 1679-1702 23 p.

Research output: Contribution to journalArticleScientificpeer-review

Software Development
Software engineering
Metric
Risk analysis
Security of data

Security metrics: How and where they can be used?

Savola, R., 2012.

Research output: Contribution to conferenceOther conference contributionScientific

Security metrics for IoT

Savola, R., 2012.

Research output: Contribution to conferenceOther conference contributionScientific

5 Citations (Scopus)

Strategies for security measurement objective decomposition

Savola, R., 2012, Proceedings of the 2012 Information Security for South Africa, ISSA 2012. Institute of Electrical and Electronic Engineers IEEE, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Decomposition
Decision making
Compliance

Towards metrics-driven adaptive security management in E-health IoT applications

Savola, R., Abie, H. & Sihvonen, M., 2012, Proceedings of the 7th International Conference on Body Area Networks. BodyNets 2012. p. 276-281

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Health
Sensor networks
Decision making
Internet of things
2 Citations (Scopus)

Towards remote security monitoring in cloud services utilizing security metrics

Savola, R. & Ahola, J., 2012, Proceedings of the 6th International Conference on Application of Information and Communication Technologies, AICT 2013. Institute of Electrical and Electronic Engineers IEEE, p. 21-27

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Monitoring
Decomposition
Industry

Utilizing a risk-driven operational security assurance methodology and measurement architecture: Experiences from a case study

Savola, R., Kanstren, T., Pentikäinen, H., Jurmu, P., Myllyaho, M. & Hätönen, K., 2012, Proceedings of the 8th International Conference on Networking and Services, ICNS 2012. Nguyen, T. (ed.). International Academy, Research, and Industry Association IARIA, p. 134-142

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientific

Open Access
Observability
Security of data
Compliance
2011

An adaptive and dependable distributed monitoring framework

Kanstrén, T., Savola, R., Haddad, S. & Hecker, A., 2011, In : International Journal on Advances in Security. 4, 1-2, p. 80-94 15 p.

Research output: Contribution to journalArticleScientificpeer-review

Open Access
Monitoring

A security and privacy metrics management and visualization framework for cloud services

Savola, R., 2011. 8 p.

Research output: Contribution to conferenceConference articleScientific

18 Citations (Scopus)

A visualization and modeling tool for security metrics and measurements management

Savola, R. & Heinonen, P., 2011, Proceedings of the ISSA 2011 Conference: Information Security for South Africa. Institute of Electrical and Electronic Engineers IEEE, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Visualization
Decision making
Security of data
Risk management
Specifications

Increasing measurability and meaningfulness of adaptive security monitoring by system architectural design and mechanisms

Savola, R. & Heinonen, P., 2011, In : International Journal on Advances in Systems and Measurements. 4, 1-2, p. 1-19 19 p.

Research output: Contribution to journalArticleScientificpeer-review

Open Access
Architectural design
Monitoring
Decision making
Availability
10 Citations (Scopus)

Operational security assurance evaluation in open infrastructures

Haddad, S., Dubus, S., Hecker, A., Kanstrén, T., Marquet, B. & Savola, R., 2011, Proceedings of the 6th International Conference on Risks and Security of Internet and Systems, CRiSIS 2011. Institute of Electrical and Electronic Engineers IEEE, p. 100-105

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Suomi tietoturvan suunnannäyttäjäksi. Suomalaisen tietoturvaosaamisen levittäminen ja aktiivinen osallistuminen standardien kansainväliseen kehittämiseen: Kansallisen tietoturvastrategian toimenpideohjelman hankkeen 5 loppuraportti

Translated title of the contribution: Finland: Towards a leading light in information security. Dissemination of Finnish information security competence and active participation towards the development of global standardsSavola, R. (ed.), 2011, 31 p. (Liikenne- ja viestintäministeriön julkaisuja; No. 17/2011).

Research output: Book/ReportReportProfessional

Open Access
Finland

The design, instantiation, and usage of information security measuring ontology

Evesti, A., Savola, R., Ovaska, E. & Kuusijärvi, J., 2011, Proceedings: The Second International Conference on Models and Ontology-based Design of Protocols, Architectures and Services, MOPAS 2011 . Diaz, M. & Exposito, E. (eds.). International Academy, Research, and Industry Association IARIA, p. 1-9

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Open Access
Security of data
Ontology

Tietoturvallisuuden mittaamisen nykytilanne ja tulevaisuuden haasteet

Translated title of the contribution: State-of-the-Art and Future Challenges of Measuring Information SecuritySavola, R., 2011.

Research output: Contribution to conferenceOther conference contributionProfessional

Tietoturvametriikat ja -mittaukset: Nykytilanne ja tulevaisuus

Translated title of the contribution: Security Metrics and Measurements: State of the Art and FutureSavola, R., 2011.

Research output: Contribution to conferenceOther conference contributionProfessional

2010

Adaptiivisuudella lisää turvaa : tietoturvametriikat apuna monitoroinnissa

Translated title of the contribution: More Security with Adaptiveness : Security Metrics help in MonitoringSavola, R. & Heinonen, P., 2010, In : Prosessori. 32, 11, p. 48-50

Research output: Contribution to journalArticleProfessional

Advances in adaptive secure message-oriented middleware for distributed business-critical systems

Abie, H., Savola, R., Wang, J. & Rotondi, D., 2010, ICNAAM 2010: International Conference of Numerical Analysis and Applied Mathematics 2010. American Institute of Physics AIP, p. 291-294 (AIP Conference Proceedings; No. 1, Vol. 1281).

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Middleware
Authentication
Scalability
Industry
5 Citations (Scopus)

Applicability of security metrics for adaptive security management in a universal banking hub system

Blasi, L., Savola, R., Abie, H. & Rotondi, D., 2010, ECSA '10 Proceedings of the Fourth European Conference on Software Architecture: Companion Volume. Association for Computing Machinery ACM, p. 197-204

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Middleware
Authentication
6 Citations (Scopus)

Definition of core requirements and a reference architecture for a dependable, secure and adaptive distributed monitoring framework

Kanstrén, T. & Savola, R., 2010, Proceedings of the 3rd International Conference on Dependability, DEPEND 2010: Venice/Mestre, Italy, 18-25 July 2010. Institute of Electrical and Electronic Engineers IEEE, p. 154-163

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Monitoring

Development of measurable security for a distributed messaging system

Savola, R. & Abie, H., 2010, In : International Journal on Advances in Security. 2, 4, p. 358-380 23 p.

Research output: Contribution to journalArticleScientificpeer-review

Open Access
Decomposition
Quality of service

First international workshop on measurability of security in software architectures - MeSSa 2010

Savola, R., Kanstrén, T. & Evesti, A., 2010, Proceedings of the Fourth European Conference on Software Architecture: Companion Volume. Association for Computing Machinery ACM, p. 151-154

Research output: Chapter in Book/Report/Conference proceedingOther book partProfessional

Open Access
Software architecture
Security systems
Decision making
Monitoring

Innovations and Advances in Adaptive Secure Message Oriented Middleware: The GEMOM Project

Savola, R., Abie, H., Bigham, J. & Rotondi, D., 2010, Proceedings : 30th IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2010 Workshops. Los Alamitos, CA, USA: Institute of Electrical and Electronic Engineers IEEE, p. 288-289

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Middleware
Authentication
Scalability
Innovation
Industry