[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1842752.1842785acmotherconferencesArticle/Chapter ViewAbstractPublication PagesecsaConference Proceedingsconference-collections
research-article

First International Workshop on Measurability of Security in Software Architectures -- MeSSa 2010

Published: 23 August 2010 Publication History

Abstract

The growing complexity of service-centric systems has increased the need for pertinent and reliable software security and trusted system solutions. Systematic approaches to measuring security in software architectures are needed in order to obtain sufficient and credible proactive evidence of the security level or performance of a system, service or product. The systematic definition of security metrics and security assurance metrics is a young field that still lacks widely accepted definitions of metrics and applicable measuring techniques for design-time and run-time security monitoring. MeSSa 2010 workshop contributes on the following issues:
• Security, trust and privacy metrics
• Security assurance metrics
• Security, trust and privacy measurement systems and associated data gathering
• Metrics for adaptive security systems
• Taxonomical and ontological research on security metrics
• Experimental results from security measurements
• Security measurability-increasing mechanisms for software architectures
• The relationship and differences between security metrics and security assurance metrics
• Trade-off analysis and decision-making at design-time and at run-time.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ECSA '10: Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
August 2010
367 pages
ISBN:9781450301794
DOI:10.1145/1842752
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • SAS
  • FIRST

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 August 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. assessment
  2. assurance
  3. evaluation
  4. measurement
  5. metrics
  6. privacy
  7. security
  8. trust

Qualifiers

  • Research-article

Conference

ECSA '10
Sponsor:
ECSA '10: 4th European Conference on Software Architecture
August 23 - 26, 2010
Copenhagen, Denmark

Acceptance Rates

Overall Acceptance Rate 48 of 72 submissions, 67%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 262
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media