Abstract
The lack of adequate information security solutions in software-intensive systems can have serious consequences for businesses and stakeholders. Carefully and systematically designed information security and trust metrics can be used to offer evidence of the system under development or operation. A requirement-centric decomposition method to develop feasible security metrics has been developed to fulfil this need.
Original language | English |
---|---|
Title of host publication | Scientific activities in Safety & Security 2009 |
Editors | Veikko Rouhiainen |
Publisher | VTT Technical Research Centre of Finland |
Pages | 16-17 |
Publication status | Published - 2009 |
MoE publication type | D2 Article in professional manuals or guides or professional information systems or text book material |