Development of security metrics based on decomposition of security requirements and ontologies

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Abstract

    Systematically and carefully designed information security metrics can be used to provide evidence of the security solutions of the system under development. The lack of appropriate security solutions in software-intensive systems might have serious consequences for businesses and the stakeholders. We investigate holistic development of security metrics based on security requirement decomposition and ontologies. The high-level security requirements are expressed in terms of lower-level measurable components applying a decomposition approach. Security requirement analysis of a distributed messaging system is used as an example.
    Original languageEnglish
    Title of host publicationProceedings of the 4th International Conference on Software and Data Technologies, ICSOFT 2009. Vol. 2
    PublisherInsticc press
    Pages171-174
    ISBN (Print)978-989-674-010-8
    Publication statusPublished - 2009
    MoE publication typeA4 Article in a conference publication
    Event4th International Conference on Software and Data Technologies, ICSOFT - Sofia, Bulgaria
    Duration: 26 Jul 200929 Jul 2009

    Conference

    Conference4th International Conference on Software and Data Technologies, ICSOFT
    CountryBulgaria
    CitySofia
    Period26/07/0929/07/09

    Fingerprint

    Ontology
    Decomposition
    Security of data
    Industry

    Cite this

    Savola, R. (2009). Development of security metrics based on decomposition of security requirements and ontologies. In Proceedings of the 4th International Conference on Software and Data Technologies, ICSOFT 2009. Vol. 2 (pp. 171-174). Insticc press.
    Savola, Reijo. / Development of security metrics based on decomposition of security requirements and ontologies. Proceedings of the 4th International Conference on Software and Data Technologies, ICSOFT 2009. Vol. 2. Insticc press, 2009. pp. 171-174
    @inproceedings{037acff352324cd4b41a2e2b2c498a73,
    title = "Development of security metrics based on decomposition of security requirements and ontologies",
    abstract = "Systematically and carefully designed information security metrics can be used to provide evidence of the security solutions of the system under development. The lack of appropriate security solutions in software-intensive systems might have serious consequences for businesses and the stakeholders. We investigate holistic development of security metrics based on security requirement decomposition and ontologies. The high-level security requirements are expressed in terms of lower-level measurable components applying a decomposition approach. Security requirement analysis of a distributed messaging system is used as an example.",
    author = "Reijo Savola",
    year = "2009",
    language = "English",
    isbn = "978-989-674-010-8",
    pages = "171--174",
    booktitle = "Proceedings of the 4th International Conference on Software and Data Technologies, ICSOFT 2009. Vol. 2",
    publisher = "Insticc press",
    address = "Portugal",

    }

    Savola, R 2009, Development of security metrics based on decomposition of security requirements and ontologies. in Proceedings of the 4th International Conference on Software and Data Technologies, ICSOFT 2009. Vol. 2. Insticc press, pp. 171-174, 4th International Conference on Software and Data Technologies, ICSOFT , Sofia, Bulgaria, 26/07/09.

    Development of security metrics based on decomposition of security requirements and ontologies. / Savola, Reijo.

    Proceedings of the 4th International Conference on Software and Data Technologies, ICSOFT 2009. Vol. 2. Insticc press, 2009. p. 171-174.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    TY - GEN

    T1 - Development of security metrics based on decomposition of security requirements and ontologies

    AU - Savola, Reijo

    PY - 2009

    Y1 - 2009

    N2 - Systematically and carefully designed information security metrics can be used to provide evidence of the security solutions of the system under development. The lack of appropriate security solutions in software-intensive systems might have serious consequences for businesses and the stakeholders. We investigate holistic development of security metrics based on security requirement decomposition and ontologies. The high-level security requirements are expressed in terms of lower-level measurable components applying a decomposition approach. Security requirement analysis of a distributed messaging system is used as an example.

    AB - Systematically and carefully designed information security metrics can be used to provide evidence of the security solutions of the system under development. The lack of appropriate security solutions in software-intensive systems might have serious consequences for businesses and the stakeholders. We investigate holistic development of security metrics based on security requirement decomposition and ontologies. The high-level security requirements are expressed in terms of lower-level measurable components applying a decomposition approach. Security requirement analysis of a distributed messaging system is used as an example.

    M3 - Conference article in proceedings

    SN - 978-989-674-010-8

    SP - 171

    EP - 174

    BT - Proceedings of the 4th International Conference on Software and Data Technologies, ICSOFT 2009. Vol. 2

    PB - Insticc press

    ER -

    Savola R. Development of security metrics based on decomposition of security requirements and ontologies. In Proceedings of the 4th International Conference on Software and Data Technologies, ICSOFT 2009. Vol. 2. Insticc press. 2009. p. 171-174