From Chaos to Consistency: The Role of CSAF in Streamlining Security Advisories
Abstract
References
Index Terms
- From Chaos to Consistency: The Role of CSAF in Streamlining Security Advisories
Recommendations
Software Security
ECBS '13: Proceedings of the 20th Annual IEEE International Conference and Workshops on the Engineering of Computer Based SystemsThe importance of IT security is out of doubt. Data, computer and network security are essential for any business or organization. Software security often remains out of focus, from an organization's, a developer's and from an end-user's point of view. ...
Handling and Reporting Security Advisories: A Scorecard Approach
Vendors and independent response centers have vastly different views regarding security advisories--what to publish and how to organize the information. The authorsý scorecard approach aims to provide a practical guide for how to publish, read, evaluate,...
Tele-lab IT security: an architecture for interactive lessons for security education
SIGCSE '04: Proceedings of the 35th SIGCSE technical symposium on Computer science educationIT security education is an important activity in computer science education. The broad range of existing security threats makes it necessary to teach students the principles of IT security as well as to let them gain hands-on experience. In order to ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- German Federal Ministry of Education and Research
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 31Total Downloads
- Downloads (Last 12 months)31
- Downloads (Last 6 weeks)31
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderFull Text
View this article in Full Text.
Full TextHTML Format
View this article in HTML Format.
HTML Format