Reijo Savola

1992 …2019
If you made any changes in Pure these will be visible here soon.

Research Output 1992 2018

Filter
Conference article in proceedings
2018

5th International Workshop on Measurability of Security in Software Architectures (MeSSa 2018)

Savola, R., Kanstrén, T. & Abie, H., 24 Sep 2018, ECSA '18: Proceedings of the 12th European Conference on Software Architecture. Association for Computing Machinery ACM, p. 60KDUMMY

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Risk-driven security metrics development for software-defined networking

Savola, R. M. & Savolainen, P., 24 Sep 2018, ECSA '18: Proceedings of the 12th European Conference on Software Architecture. Association for Computing Machinery ACM, a56

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Network management
Quality of service
Decision making
Software defined networking
Monitoring
2017
1 Citation (Scopus)

Current level of cybersecurity competence and future development - Case Finland

Savola, R. M., 2017, Companion Proceedings - 11th European Conference on Software Architecture, ECSA 2017. Association for Computing Machinery ACM, Vol. Part F130530. p. 121-124 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Industry
2016
9 Citations (Scopus)

Mitigating IoT security threats with a trusted Network element

Kuusijarvi, J., Savola, R., Savolainen, P. & Evesti, A., 16 Feb 2016, Internet Technology and Secured Transactions (ICITST), 2016 11th International Conference for . Institute of Electrical and Electronic Engineers IEEE, p. 260-265

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Gateways (computer networks)
Interfaces (computer)
Internet of things
Internet
Industry

Towards Security Metrics-Supported IP Traceback

Savola, R., Savolainen, P. & Salonen, J., 2016, ECSAW '16 Proccedings of the 10th European Conference on Software Architecture Workshops. Association for Computing Machinery ACM, 32

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Critical infrastructures
Internet protocols
2015
4 Citations (Scopus)

Architecture for high confidence cloud security monitoring

Kanstrén, T., Lehtonen, S., Savola, R., Kukkohovi, H. & Hätönen, K., 23 Apr 2015, Cloud Engineering (IC2E), 2015 IEEE International Conference on. Institute of Electrical and Electronic Engineers IEEE, p. 195 - 200

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Monitoring
Hardware security
Virtual machine
10 Citations (Scopus)

Risk-driven security metrics development for an e-health IoT application

Savola, R. M., Savolainen, P., Evesti, A., Abie, H. & Sihvonen, M., 23 Nov 2015, Information Security for South Africa (ISSA), 2015. Institute of Electrical and Electronic Engineers IEEE, p. 1 - 6

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Health
Decision making
Decomposition
Internet of things
2014

Security measuring for self-adaptive security

Evesti, A., Abie, H. & Savola, R., 2014, Proceedings of the 2014 European Conference on Software Architecture Workshops: ECSAW '14. Austria: Association for Computing Machinery ACM, 7 p. 5

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Software design
Decision making
Monitoring

Security objectives, controls and metrics development for an Android smartphone application

Savola, R. & Kylänpää, M., 2014, Conference Proceedings: Information Security for South Africa 2014. Institute of Electrical and Electronic Engineers IEEE, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Smartphones
Wireless networks
Risk analysis
Demonstrations
Decision making

Towards integration of risk-driven and evidence driven information security measurement

Savola, R., 2014, Proceedings: IEEE 8th International Conference on Application of Information and Communication Technologies, AICT 2014. Institute of Electrical and Electronic Engineers IEEE, 6 p. 7035903

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Security of data
Decision making
Monitoring
2013
2 Citations (Scopus)

A risk-driven security analysis and metrics development for WSN-MCN router

Frantti, T., Savola, R. & Hietalahti, H., 2013, Proceedings: International Conference on ICT Convergence, ICTC 2013. Institute of Electrical and Electronic Engineers IEEE, p. 22-25

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Routers
Wireless sensor networks
Automation
Internet of things
18 Citations (Scopus)

Metrics-driven security objective decomposition for an E-health application with adaptive security management

Savola, R. & Abie, H., 2013, ASPI '13 Proceedings of the International Workshop on Adaptive Security. New York: Association for Computing Machinery ACM, 6

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Health
Decomposition
Internet of things
5 Citations (Scopus)

Requirements of secure WSN-MCN edge router

Frantti, T., Hietalahti, H. & Savola, R., 2013, Proceedings: The International Conference on Information Networking 2013, ICOIN 2013. Institute of Electrical and Electronic Engineers IEEE, p. 210-215

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Routers
Internet
Network architecture
Sensor networks
Program processors
1 Citation (Scopus)

Security risks in the short-range communication of ubiquitous application

Evesti, A., Suomalainen, J. & Savola, R., 2013, Proceedings: 8th International Conference for Internet Technology and Secured Transactions, ICITST-2013. UK: Institute of Electrical and Electronic Engineers IEEE, p. 612-617

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Communication
Ubiquitous computing
Health
Zigbee
Bluetooth
1 Citation (Scopus)

Toward risk-driven security measurement for android smartphone platforms

Savola, R., Väisänen, T., Evesti, A., Savolainen, P., Kemppainen, J. & Kokemäki, M., 2013, Proceedings of the ISSA 2013 Conference. Institute of Electrical and Electronic Engineers IEEE, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Smartphones
Risk analysis
Wireless networks
Decision making
Decomposition
2012
2 Citations (Scopus)

Metrics driven security management framework for ehealth digital ecosystem focusing on chronic diseases

Savola, R. & Sihvonen, M., 2012, Proceedings of the International Conference on Management of Emergent Digital EcoSystems, MEDES 2012. New York, NY, USA: Association for Computing Machinery ACM, p. 75-79

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Ecosystems
Health
Medical problems
Visualization
Decision making
5 Citations (Scopus)

Strategies for security measurement objective decomposition

Savola, R., 2012, Proceedings of the 2012 Information Security for South Africa, ISSA 2012. Institute of Electrical and Electronic Engineers IEEE, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Decomposition
Decision making
Compliance

Towards metrics-driven adaptive security management in E-health IoT applications

Savola, R., Abie, H. & Sihvonen, M., 2012, Proceedings of the 7th International Conference on Body Area Networks. BodyNets 2012. p. 276-281

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Health
Sensor networks
Decision making
Internet of things
2 Citations (Scopus)

Towards remote security monitoring in cloud services utilizing security metrics

Savola, R. & Ahola, J., 2012, Proceedings of the 6th International Conference on Application of Information and Communication Technologies, AICT 2013. Institute of Electrical and Electronic Engineers IEEE, p. 21-27

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Monitoring
Decomposition
Industry

Utilizing a risk-driven operational security assurance methodology and measurement architecture: Experiences from a case study

Savola, R., Kanstren, T., Pentikäinen, H., Jurmu, P., Myllyaho, M. & Hätönen, K., 2012, Proceedings of the 8th International Conference on Networking and Services, ICNS 2012. Nguyen, T. (ed.). International Academy, Research, and Industry Association IARIA, p. 134-142

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientific

Open Access
Observability
Security of data
Compliance
2011
18 Citations (Scopus)

A visualization and modeling tool for security metrics and measurements management

Savola, R. & Heinonen, P., 2011, Proceedings of the ISSA 2011 Conference: Information Security for South Africa. Institute of Electrical and Electronic Engineers IEEE, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Visualization
Decision making
Security of data
Risk management
Specifications
10 Citations (Scopus)

Operational security assurance evaluation in open infrastructures

Haddad, S., Dubus, S., Hecker, A., Kanstrén, T., Marquet, B. & Savola, R., 2011, Proceedings of the 6th International Conference on Risks and Security of Internet and Systems, CRiSIS 2011. Institute of Electrical and Electronic Engineers IEEE, p. 100-105

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

The design, instantiation, and usage of information security measuring ontology

Evesti, A., Savola, R., Ovaska, E. & Kuusijärvi, J., 2011, Proceedings: The Second International Conference on Models and Ontology-based Design of Protocols, Architectures and Services, MOPAS 2011 . Diaz, M. & Exposito, E. (eds.). International Academy, Research, and Industry Association IARIA, p. 1-9

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Open Access
Security of data
Ontology
2010

Advances in adaptive secure message-oriented middleware for distributed business-critical systems

Abie, H., Savola, R., Wang, J. & Rotondi, D., 2010, ICNAAM 2010: International Conference of Numerical Analysis and Applied Mathematics 2010. American Institute of Physics AIP, p. 291-294 (AIP Conference Proceedings; No. 1, Vol. 1281).

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Middleware
Authentication
Scalability
Industry
5 Citations (Scopus)

Applicability of security metrics for adaptive security management in a universal banking hub system

Blasi, L., Savola, R., Abie, H. & Rotondi, D., 2010, ECSA '10 Proceedings of the Fourth European Conference on Software Architecture: Companion Volume. Association for Computing Machinery ACM, p. 197-204

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Middleware
Authentication
6 Citations (Scopus)

Definition of core requirements and a reference architecture for a dependable, secure and adaptive distributed monitoring framework

Kanstrén, T. & Savola, R., 2010, Proceedings of the 3rd International Conference on Dependability, DEPEND 2010: Venice/Mestre, Italy, 18-25 July 2010. Institute of Electrical and Electronic Engineers IEEE, p. 154-163

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Monitoring

Innovations and Advances in Adaptive Secure Message Oriented Middleware: The GEMOM Project

Savola, R., Abie, H., Bigham, J. & Rotondi, D., 2010, Proceedings : 30th IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2010 Workshops. Los Alamitos, CA, USA: Institute of Electrical and Electronic Engineers IEEE, p. 288-289

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Middleware
Authentication
Scalability
Innovation
Industry
7 Citations (Scopus)

Towards an abstraction layer for security assurance measurements: Invited paper

Kanstrén, T., Savola, R., Evesti, A., Pentikäinen, H., Hecker, A., Ouedraogo, M., Hätönen, K., Halonen, P., Blad, C., López, O. & Ros, S., 2010, ECSA '10 Proceedings of the Fourth European Conference on Software Architecture: Companion Volume. Association for Computing Machinery ACM, p. 189-196

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Electronic mail
Taxonomies
Risk management
Availability
10 Citations (Scopus)

Towards a risk-driven methodology for privacy metrics development

Savola, R., 2010, Proceedings of the IEEE Second International Conference on Social Computing, SocialCom 2010 : Second IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010. Los Alamitos, CA, USA: Institute of Electrical and Electronic Engineers IEEE, p. 1086-1092

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Cloud computing
Decomposition
9 Citations (Scopus)

Towards security effectiveness measurement utilizing risk-based security assurance

Savola, R., Pentikäinen, H. & Ouedraogo, M., 2010, Proceedings of the Information Security for South Africa, ISSA 2010 . Institute of Electrical and Electronic Engineers IEEE, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Electronic mail
Decomposition
Industry
14 Citations (Scopus)

Towards wider cloud service applicability by security, privacy and trust measurements

Savola, R., Juhola, A. & Uusitalo, I., 2010, Proceedings: 4th International Conference on Application of Information and Communication Technologies, ICAICT 2010. USA: Institute of Electrical and Electronic Engineers IEEE, 5612067

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

20 Citations (Scopus)

Trust and cloud services: An interview study

Uusitalo, I., Karppinen, K., Juhola, A. & Savola, R., 2010, Proceedings : 2nd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2010. USA: Institute of Electrical and Electronic Engineers IEEE, p. 712-720

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

interview
expert
12 Citations (Scopus)

User experience and security in the cloud: An empirical study in the finnish cloud consortium

Oza, N., Karppinen, K. & Savola, R., 2010, Proceedings : 2nd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2010. Institute of Electrical and Electronic Engineers IEEE, p. 621-628

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Cloud computing
2009
2 Citations (Scopus)

A security metrics development method for software intensive systems

Savola, R., 2009, Proceedings of the 3rd International Conference on Advances in Information Security and Its Application, ISA 2009. Heidelberg, Berlin: Springer, p. 11-16 (Communications in Computer and Information Science, Vol. 36).

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Decomposition