{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:43:42Z","timestamp":1725468222493},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/isias.2011.6122822","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T22:01:11Z","timestamp":1326319271000},"page":"215-221","source":"Crossref","is-referenced-by-count":1,"title":["A new approach to evaluating security assurance"],"prefix":"10.1109","author":[{"given":"Moussa","family":"Ouedraogo","sequence":"first","affiliation":[]},{"given":"Haralambos","family":"Mouratidis","sequence":"additional","affiliation":[]},{"given":"Artur","family":"Hecker","sequence":"additional","affiliation":[]},{"given":"Cedric","family":"Bonhomme","sequence":"additional","affiliation":[]},{"given":"Djamel","family":"Khadraoui","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Dubois","sequence":"additional","affiliation":[]},{"given":"David","family":"Preston","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP.2008.28"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13577-4_4"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1314257.1314266"},{"journal-title":"Hack I T Security through Penetration Testing","year":"2002","author":"klevinsky","key":"18"},{"journal-title":"Common Vulnerability Scoring System","year":"0","key":"33"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.7564","author":"jansen","year":"2009","journal-title":"Directions in Security Metrics Research- NISTIR 7564"},{"journal-title":"System Protection Profile - Industrial Control Systems","year":"2004","key":"34"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2003.1174904"},{"key":"13","article-title":"Multi-Agent based Security Assurance Monitoring System for Telecommunication Infrastructures","author":"bulut","year":"0","journal-title":"Proceedings of the Conference on Communication Network and Information Security 2007"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2006.1652069"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-55","author":"swanson","year":"2003","journal-title":"Security Metrics Guide for Information Technology Systems NIST 800-55"},{"key":"12","first-page":"197","article-title":"Current Trends and Advances in Information Assurance Metrics","author":"seddigh","year":"2004","journal-title":"Proceedings of PST 2004"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2008.37"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.60"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1842752.1842791"},{"journal-title":"Information Technology - Systems Security Engineering -Capability Maturity Model (SSE-CMM) - ISO\/IEC 21827","year":"2003","key":"23"},{"journal-title":"Information Technology Process Assessment Part 4 Guidance on Use for Process Improvement and Process Capability Determination- ISO\/IEC 15504-4","year":"2004","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.08.013"},{"key":"26","article-title":"Security assurance profile for large and heterogeneous telecom and IT infrastructures","author":"marquet","year":"0","journal-title":"Proceedings of the 7th International Symposium on Risk Management and Cyber-Informatics (RMCI '10) Orlando Florida USA 2010"},{"journal-title":"Scenario graphs and attack graphs","year":"2004","author":"sheyner","key":"27"},{"journal-title":"Information Technology - Security Techniques -Information Security Management - Measurement ISO\/IEC 27004","year":"2009","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2007.03.001"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.2"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-270-5"},{"journal-title":"Common Criteria for IT Security Evaluation","year":"0","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/NSPW.1995.492347"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.29"},{"key":"7","article-title":"Model based security risk analysis for web applications","author":"dimitrakos","year":"0","journal-title":"Proceedings of Euroweb 2002 British Computer Society 2002"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/32.879820"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04190-7_24"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0093-9"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/CNSR.2009.74"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2007.03.002"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.6028\/jres.115.013"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1138670.1138683"}],"event":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2011,12,5]]},"location":"Melacca, Malaysia","end":{"date-parts":[[2011,12,8]]}},"container-title":["2011 7th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112288\/6122777\/06122822.pdf?arnumber=6122822","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,22]],"date-time":"2019-06-22T10:33:45Z","timestamp":1561199625000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6122822\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/isias.2011.6122822","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}