Development of security metrics based on decomposition of security requirements and ontologies

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Abstract

Systematically and carefully designed information security metrics can be used to provide evidence of the security solutions of the system under development. The lack of appropriate security solutions in software-intensive systems might have serious consequences for businesses and the stakeholders. We investigate holistic development of security metrics based on security requirement decomposition and ontologies. The high-level security requirements are expressed in terms of lower-level measurable components applying a decomposition approach. Security requirement analysis of a distributed messaging system is used as an example.
Original languageEnglish
Title of host publicationProceedings of the 4th International Conference on Software and Data Technologies, ICSOFT 2009. Vol. 2
PublisherInsticc press
Pages171-174
ISBN (Print)978-989-674-010-8
Publication statusPublished - 2009
MoE publication typeA4 Article in a conference publication
Event4th International Conference on Software and Data Technologies, ICSOFT - Sofia, Bulgaria
Duration: 26 Jul 200929 Jul 2009

Conference

Conference4th International Conference on Software and Data Technologies, ICSOFT
CountryBulgaria
CitySofia
Period26/07/0929/07/09

Fingerprint

Ontology
Decomposition
Security of data
Industry

Cite this

Savola, R. (2009). Development of security metrics based on decomposition of security requirements and ontologies. In Proceedings of the 4th International Conference on Software and Data Technologies, ICSOFT 2009. Vol. 2 (pp. 171-174). Insticc press.
Savola, Reijo. / Development of security metrics based on decomposition of security requirements and ontologies. Proceedings of the 4th International Conference on Software and Data Technologies, ICSOFT 2009. Vol. 2. Insticc press, 2009. pp. 171-174
@inproceedings{037acff352324cd4b41a2e2b2c498a73,
title = "Development of security metrics based on decomposition of security requirements and ontologies",
abstract = "Systematically and carefully designed information security metrics can be used to provide evidence of the security solutions of the system under development. The lack of appropriate security solutions in software-intensive systems might have serious consequences for businesses and the stakeholders. We investigate holistic development of security metrics based on security requirement decomposition and ontologies. The high-level security requirements are expressed in terms of lower-level measurable components applying a decomposition approach. Security requirement analysis of a distributed messaging system is used as an example.",
author = "Reijo Savola",
year = "2009",
language = "English",
isbn = "978-989-674-010-8",
pages = "171--174",
booktitle = "Proceedings of the 4th International Conference on Software and Data Technologies, ICSOFT 2009. Vol. 2",
publisher = "Insticc press",
address = "Portugal",

}

Savola, R 2009, Development of security metrics based on decomposition of security requirements and ontologies. in Proceedings of the 4th International Conference on Software and Data Technologies, ICSOFT 2009. Vol. 2. Insticc press, pp. 171-174, 4th International Conference on Software and Data Technologies, ICSOFT , Sofia, Bulgaria, 26/07/09.

Development of security metrics based on decomposition of security requirements and ontologies. / Savola, Reijo.

Proceedings of the 4th International Conference on Software and Data Technologies, ICSOFT 2009. Vol. 2. Insticc press, 2009. p. 171-174.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

TY - GEN

T1 - Development of security metrics based on decomposition of security requirements and ontologies

AU - Savola, Reijo

PY - 2009

Y1 - 2009

N2 - Systematically and carefully designed information security metrics can be used to provide evidence of the security solutions of the system under development. The lack of appropriate security solutions in software-intensive systems might have serious consequences for businesses and the stakeholders. We investigate holistic development of security metrics based on security requirement decomposition and ontologies. The high-level security requirements are expressed in terms of lower-level measurable components applying a decomposition approach. Security requirement analysis of a distributed messaging system is used as an example.

AB - Systematically and carefully designed information security metrics can be used to provide evidence of the security solutions of the system under development. The lack of appropriate security solutions in software-intensive systems might have serious consequences for businesses and the stakeholders. We investigate holistic development of security metrics based on security requirement decomposition and ontologies. The high-level security requirements are expressed in terms of lower-level measurable components applying a decomposition approach. Security requirement analysis of a distributed messaging system is used as an example.

M3 - Conference article in proceedings

SN - 978-989-674-010-8

SP - 171

EP - 174

BT - Proceedings of the 4th International Conference on Software and Data Technologies, ICSOFT 2009. Vol. 2

PB - Insticc press

ER -

Savola R. Development of security metrics based on decomposition of security requirements and ontologies. In Proceedings of the 4th International Conference on Software and Data Technologies, ICSOFT 2009. Vol. 2. Insticc press. 2009. p. 171-174