打造安全驾驶舱

N. Pham, L. Baud, Patrick Bellot, Michel Riguidel
{"title":"打造安全驾驶舱","authors":"N. Pham, L. Baud, Patrick Bellot, Michel Riguidel","doi":"10.1109/ISA.2008.95","DOIUrl":null,"url":null,"abstract":"Building systems that are guaranteed to be secure or to remain secure over time is still an unachievable goal. The need for a security cockpit that helps to determine security assurance level of a system in a near real time manner is therefore vital in order to maintain and improve overall security. This paper discusses different steps in the whole security assurance assessment process in order to build such cockpit. To test and evaluate the applicability of our approach, we introduce then a system capable of assessing the security assurance level of a network system. Currently, this assessment system focuses on the availability aspect of the security.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Towards a Security Cockpit\",\"authors\":\"N. Pham, L. Baud, Patrick Bellot, Michel Riguidel\",\"doi\":\"10.1109/ISA.2008.95\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Building systems that are guaranteed to be secure or to remain secure over time is still an unachievable goal. The need for a security cockpit that helps to determine security assurance level of a system in a near real time manner is therefore vital in order to maintain and improve overall security. This paper discusses different steps in the whole security assurance assessment process in order to build such cockpit. To test and evaluate the applicability of our approach, we introduce then a system capable of assessing the security assurance level of a network system. Currently, this assessment system focuses on the availability aspect of the security.\",\"PeriodicalId\":212375,\"journal\":{\"name\":\"2008 International Conference on Information Security and Assurance (isa 2008)\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-04-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Conference on Information Security and Assurance (isa 2008)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISA.2008.95\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Information Security and Assurance (isa 2008)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISA.2008.95","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

摘要

构建保证安全或长期保持安全的系统仍然是一个无法实现的目标。因此,为了维护和提高整体安全性,需要一个安全座舱,以近乎实时的方式帮助确定系统的安全保证级别。本文对座舱安全保障评估过程中的不同环节进行了探讨。为了测试和评估我们的方法的适用性,我们引入了一个能够评估网络系统的安全保证级别的系统。目前,该评估系统主要侧重于安全性的可用性方面。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Towards a Security Cockpit
Building systems that are guaranteed to be secure or to remain secure over time is still an unachievable goal. The need for a security cockpit that helps to determine security assurance level of a system in a near real time manner is therefore vital in order to maintain and improve overall security. This paper discusses different steps in the whole security assurance assessment process in order to build such cockpit. To test and evaluate the applicability of our approach, we introduce then a system capable of assessing the security assurance level of a network system. Currently, this assessment system focuses on the availability aspect of the security.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A New Electronic Communication Technology - VT Position Code Communication Technology and Its Implementation CRYPTEX Model for Software Source Code The Economics of Privacy-Privacy: People, Policy and Technology Why MSN Lost to QQ in China Market? Different Privacy Protection Design Maximizing Return on Security Safeguard Investment with Constraint Satisfaction
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1