Research Article
Towards More Secure Systems:How to Combine Expert Evaluations
@INPROCEEDINGS{10.1145/1460877.1460923, author={Marco Benini and Sabrina Sicari}, title={Towards More Secure Systems:How to Combine Expert Evaluations}, proceedings={4th International ICST Conference on Security and Privacy in Communication Networks}, publisher={ACM}, proceedings_a={SECURECOMM}, year={2008}, month={9}, keywords={Risk assessment Algebraic metrics Composition of metrics}, doi={10.1145/1460877.1460923} }
- Marco Benini
Sabrina Sicari
Year: 2008
Towards More Secure Systems:How to Combine Expert Evaluations
SECURECOMM
ACM
DOI: 10.1145/1460877.1460923
Abstract
In previous works[2,4] we have introduced a formal risk assessment method and we have shown its mathematical properties. The method allows to model a system as a structured set of vulnerabilities, each one potentially depending on the others: the goal of the method is to consider the influence of the dependencies and, thus, to provide a global risk assessment. A crucial point is the use of order-based metrics to measure the exploitability of a threat: order-based metrics reduce the subjective aspects in the risk evaluation process. This work extends the previous ones by showing how to combine the risk evaluations performed by different experts whose degree of expertise may vary.
Copyright © 2008–2024 ACM