{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:10:21Z","timestamp":1730315421761,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,8,23]]},"DOI":"10.1145\/1842752.1842792","type":"proceedings-article","created":{"date-parts":[[2010,8,31]],"date-time":"2010-08-31T13:06:04Z","timestamp":1283259964000},"page":"197-204","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Applicability of security metrics for adaptive security management in a universal banking hub system"],"prefix":"10.1145","author":[{"given":"Lorenzo","family":"Blasi","sequence":"first","affiliation":[{"name":"Italy Innovation Center, Hewlett-Packard Italiana S.r.l., Cernusco s\/N (MI), Italy"}]},{"given":"Reijo","family":"Savola","sequence":"additional","affiliation":[{"name":"VTT Technical Research Centre of Finland, Oulu, Finland"}]},{"given":"Habtamu","family":"Abie","sequence":"additional","affiliation":[{"name":"Norwegian Computing Center, Oslo, Norway"}]},{"given":"Domenico","family":"Rotondi","sequence":"additional","affiliation":[{"name":"TXT e-solutions S.p.A., Valenzano (BA), Italy"}]}],"member":"320","published-online":{"date-parts":[[2010,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNC.2008.33"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2010.70"},{"issue":"4","key":"e_1_3_2_1_3_1","first-page":"358","article-title":"Development of measurable security for a distributed messaging system","volume":"2","author":"Savola R.","year":"2010","unstructured":"Savola , R. and Abie , H. 2010 . \" Development of measurable security for a distributed messaging system ,\" Int. Journal on Advances in Security , 2 ( 4 ), 358 -- 380 , Publ. 2010. Savola, R. and Abie, H. 2010. \"Development of measurable security for a distributed messaging system,\" Int. Journal on Advances in Security, 2(4), 358--380, Publ. 2010.","journal-title":"Int. Journal on Advances in Security"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Savola R. and Abie H. 2009. \"Development of security metrics for a distributed messaging system \" AICT '09. Savola R. and Abie H. 2009. \"Development of security metrics for a distributed messaging system \" AICT '09.","DOI":"10.1109\/ICAICT.2009.5372566"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Abie H. 2009. \"Adaptive security and trust management for autonomic message-oriented middleware \" TSP '09. Abie H. 2009. \"Adaptive security and trust management for autonomic message-oriented middleware \" TSP '09.","DOI":"10.1109\/MOBHOC.2009.5336915"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.2009.5.4.197"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2010.12"},{"volume-title":"Web-site: www.swift.com {July 12","year":"2010","author":"Society for Worldwide Interbank Financial Telecommunication (SWIFT).","key":"e_1_3_2_1_8_1","unstructured":"Society for Worldwide Interbank Financial Telecommunication (SWIFT). Web-site: www.swift.com {July 12 , 2010 }. Society for Worldwide Interbank Financial Telecommunication (SWIFT). Web-site: www.swift.com {July 12, 2010}."},{"volume-title":"et al","year":"2008","author":"Burr W. E.","key":"e_1_3_2_1_9_1","unstructured":"Burr , W. E. et al . 2008 . \"Electronic authentication guideline,\" National Institute of Standards and Technology, U.S. Department of Commerce , NIST SP 800-63-1, Draft. Burr, W. E. et al. 2008. \"Electronic authentication guideline,\" National Institute of Standards and Technology, U.S. Department of Commerce, NIST SP 800-63-1, Draft."},{"key":"e_1_3_2_1_10_1","unstructured":"OASIS Standard 200401. 2004. \"Web services security: SOAP message security 1.0 \" Organization for the Advancement of Structured Information Standards. OASIS Standard 200401. 2004. \"Web services security: SOAP message security 1.0 \" Organization for the Advancement of Structured Information Standards."},{"key":"e_1_3_2_1_11_1","unstructured":"ITU Recommendation X.509 (08\/05). 2005. \"Information technology -- Open systems interconnection -- the directory: public-key and attribute certificate frameworks \" International Telecommunication Union. ITU Recommendation X.509 (08\/05). 2005. \"Information technology -- Open systems interconnection -- the directory: public-key and attribute certificate frameworks \" International Telecommunication Union."},{"issue":"4","key":"e_1_3_2_1_12_1","first-page":"1","article-title":"An authentication strength linked access control middleware for the grid","volume":"11","author":"Chin J.","year":"2005","unstructured":"Chin , J. , Parkin , M. , Zhang , N. , Nenadic , A. , and Brooke , J. M. 2005 . \" An authentication strength linked access control middleware for the grid ,\" SCS International Journal of Information Technology , 11 ( 4 ), 1 -- 12 . Chin, J., Parkin, M., Zhang, N., Nenadic, A., and Brooke, J. M. 2005. \"An authentication strength linked access control middleware for the grid,\" SCS International Journal of Information Technology, 11(4), 1--12.","journal-title":"SCS International Journal of Information Technology"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2008.29"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Lenstra A. K. and Verheul E. R. 2000. \"Selecting cryptographic key sizes \" PKC '00. Lenstra A. K. and Verheul E. R. 2000. \"Selecting cryptographic key sizes \" PKC '00.","DOI":"10.1007\/978-3-540-46588-1_30"},{"volume-title":"Website: www.keylength.com {July 12","year":"2010","author":"BlueKrypt","key":"e_1_3_2_1_15_1","unstructured":"BlueKrypt -- Cryptographic Key Length Recommendation. Website: www.keylength.com {July 12 , 2010 }. BlueKrypt -- Cryptographic Key Length Recommendation. Website: www.keylength.com {July 12, 2010}."},{"volume-title":"et al","year":"2007","author":"Barker E.","key":"e_1_3_2_1_16_1","unstructured":"Barker , E. et al . 2007 . \"Recommendation for key management -- Part 1: General (Revised),\" National Institute of Standards and Technology, U.S. Department of Commerce , NIST Special Publication 800--57. Barker, E. et al. 2007. \"Recommendation for key management -- Part 1: General (Revised),\" National Institute of Standards and Technology, U.S. Department of Commerce, NIST Special Publication 800--57."},{"key":"e_1_3_2_1_17_1","unstructured":"Blasi L. Arenas A. Aziz B. Mori P. Rovati U. Crispo B. Martinelli F. and Massonet P. 2008. \"A secure environment for grid-based supply chains \" eChallenges '08. Blasi L. Arenas A. Aziz B. Mori P. Rovati U. Crispo B. Martinelli F. and Massonet P. 2008. \"A secure environment for grid-based supply chains \" eChallenges '08."},{"key":"e_1_3_2_1_18_1","unstructured":"Wang C. and Wulf W. A. 1997. \"Towards a framework for security measurement \" NISSC '07. Wang C. and Wulf W. A. 1997. \"Towards a framework for security measurement \" NISSC '07."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719036"},{"volume-title":"WADIS '03","author":"Howard M.","key":"e_1_3_2_1_20_1","unstructured":"Howard , M. , Pincus , J. , and Wing , J. M . 2003. \"Measuring relative attack surfaces \", WADIS '03 . Howard, M., Pincus, J., and Wing, J. M. 2003. \"Measuring relative attack surfaces\", WADIS '03."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.3923\/jse.2008.39.46"},{"key":"e_1_3_2_1_22_1","unstructured":"ISO\/IEC 15408-1:2005. 2005. \"Common Criteria for information technology security evaluation -- Part 1: Introduction and general model \" ISO\/IEC. ISO\/IEC 15408-1:2005. 2005. \"Common Criteria for information technology security evaluation -- Part 1: Introduction and general model \" ISO\/IEC."},{"key":"e_1_3_2_1_23_1","unstructured":"Bulut E. Khadraoui D. and Marquet B. 2007. \"Multiagent based security assurance monitoring system for telecommunication infrastructures \" CNIS '07. Bulut E. Khadraoui D. and Marquet B. 2007. \"Multiagent based security assurance monitoring system for telecommunication infrastructures \" CNIS '07."},{"issue":"1","key":"e_1_3_2_1_24_1","first-page":"230","article-title":"On the feasibility of utilizing security metrics in software-intensive systems","volume":"10","author":"Savola R.","year":"2010","unstructured":"Savola , R. 2010 . \" On the feasibility of utilizing security metrics in software-intensive systems ,\" Int. Journal of Computer Science and Network Security , 10 ( 1 ), 230 -- 239 . Savola, R. 2010. \"On the feasibility of utilizing security metrics in software-intensive systems,\" Int. Journal of Computer Science and Network Security, 10(1), 230--239.","journal-title":"Int. Journal of Computer Science and Network Security"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Herrmann D. S. 2007. \"Complete guide to security and privacy metrics -- measuring regulatory compliance operational resilience and ROI \" Auerbach Publications. Herrmann D. S. 2007. \"Complete guide to security and privacy metrics -- measuring regulatory compliance operational resilience and ROI \" Auerbach Publications.","DOI":"10.1201\/9781420013283"},{"key":"e_1_3_2_1_26_1","unstructured":"Jaquith A. 2007. \"Security metrics: replacing fear uncertainty and doubt \" Addison-Wesley. Jaquith A. 2007. \"Security metrics: replacing fear uncertainty and doubt \" Addison-Wesley."},{"key":"e_1_3_2_1_27_1","unstructured":"Bartol N. Bates B. Goertzel K. M. and Winograd T. 2009. \"Measuring cyber security and information assurance: a state-of-the-art report \" IATAC. Bartol N. Bates B. Goertzel K. M. and Winograd T. 2009. \"Measuring cyber security and information assurance: a state-of-the-art report \" IATAC."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Jansen W. 2009. \"Directions in security metrics research \" U.S. National Institute of Standards and Technology NISTIR 7564. Jansen W. 2009. \"Directions in security metrics research \" U.S. National Institute of Standards and Technology NISTIR 7564.","DOI":"10.6028\/NIST.IR.7564"}],"event":{"name":"ECSA '10: 4th European Conference on Software Architecture","sponsor":["SAS","FIRST"],"location":"Copenhagen Denmark","acronym":"ECSA '10"},"container-title":["Proceedings of the Fourth European Conference on Software Architecture: Companion Volume"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1842752.1842792","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T09:28:06Z","timestamp":1673602086000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1842752.1842792"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,23]]},"references-count":28,"alternative-id":["10.1145\/1842752.1842792","10.1145\/1842752"],"URL":"https:\/\/doi.org\/10.1145\/1842752.1842792","relation":{},"subject":[],"published":{"date-parts":[[2010,8,23]]},"assertion":[{"value":"2010-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}