It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_nuls

Record ID marc_nuls/NULS_PHC_180925.mrc:128052608:3582
Source marc_nuls
Download Link /show-records/marc_nuls/NULS_PHC_180925.mrc:128052608:3582?format=raw

LEADER: 03582cam 2200445 a 4500
001 9919651860001661
005 20150423121908.0
008 051121s2006 nyua b 101 0 eng
020 $a0387290168 (cased)
020 $a0387365842 (e-book)
024 3 $a9780387290164
024 3 $a9780387365848
029 1 $aOHX$bhar055022524
029 1 $aYDXCP$b2252745
035 $a(CSdNU)u285894-01national_inst
035 $a(OCoLC)62796284
035 $a(OCoLC)62796284
040 $aUKM$cUKM$dBAKER$dOHX$dYDXCP$dOCLCQ$dOrLoB-B
042 $aukblsr
049 $aCNUM
050 14 $aQA76.9.A25 $b Q83 2006
082 04 $a005.80218$222
245 00 $aQuality of protection :$bsecurity measurements and metrics /$cedited by Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin.
260 $aNew York ;$a[London] :$bSpringer,$cc2006.
300 $aviii, 195 p. :$bill. ;$c24 cm.
440 0 $aAdvances in information security
500 $aBased on some papers presented at various conference proceedings.
504 $aIncludes bibliographical references and index.
505 0 $aWhy to adopt a security metric? : a brief survey / Andrea Atzeni and Antonio Lioy -- Service-oriented assurance - comprehensive security by explicit assurances / Gunter Karjoth, Birgit Pfitzmann, Matthias Schunter and Michael Waidner -- Software security growth modeling : examining vulnerabilities with reliability growth models / Andy Ozment -- A discrete lognormal model for software defects affecting QoP / Swapna Gokhale and Robert Mullen -- Time-to-compromise model for cyber risk reduction estimation / Miles McQueen, Wayne Boyer, Mark Flynn and George Beitel -- Assessing the risk of using vulnerable components / Davide Balzarotti, Mattia Monga and Sabrina Sicari -- Collection and analysis of attack data based on honeypots deployed on the Internet / Eric Alata, Marc Dacier, Yves Deswarte, Mohamed Kaaniche, Kostya Kortchinsky, Vincente Nicomette, Van-Hau Pham and Fabien Pouget -- Multilevel security and quality of protection / Simon Foley, Stefano Bistaelli, Barry O'Sullivan, John Herbert and Garret Swart -- A conceptual model for service availability / Judith E. Y. Rossebo, Mass Soldal Lund, Knut Eilif Husa and Atle Refsdal -- A SLA evaluation methodology in service oriented architectures / Valentina Casola, Antonino Mazzeo, Nicola Mazzocca and Massimiliano Rak -- Towards a notion of quantitative security analysis / Iliano Cervesato -- The lower bound of attacks on anonymity systems - a unicity distance approach / Dogan Kesdogan and Lexi Pimenidis -- Intersection attacks on Web-mixes : bringing the theory into praxis / Dogan Kesdogan, Lexi Pimenidis and Tobias Kolsch -- Using guesswork as a measure for confidentiality of selectively encrypted messages / Reine Lundin, Stefan Lindskog, Anna Brunstrom and Simone Fischer-Hubner -- Measuring inference exposure in outsourced encrypted databases / Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati and Marco Viviani.
650 0 $aComputer security$xQuality control$vCongresses.
650 0 $aComputer security$xStandards$vCongresses.
650 0 $aComputer networks$xQuality control$vCongresses.
650 0 $aComputer networks$xStandards$vCongresses.
700 1 $aGollmann, Dieter.
700 1 $aMassacci, Fabio.
700 1 $aYautsiukhin, Artsiom.
947 $fSOET-EGR$hCIRCSTACKS$p$110.94$q1
949 $i31786102259238
994 $a92$bCNU
999 $aQA 76.9 .A25 Q83 2006$wLC$c1$i31786102259238$d4/17/2007$e4/9/2007 $lCIRCSTACKS$mNULS$n2$rY$sY$tBOOK$u10/31/2006