By Topic

Notice of Violation of IEEE Publication Principles
Which models should be applied to measure computer security and information assurance?

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
L. Reznik ; Dept. of Comput. Sci., Rochester Inst. of Technol., NY, USA

Notice of Violation of IEEE Publication Principles

"Which Models Should Be Applied to Measure Computer Security and Information Assurance?"
by Leon Reznik
in the Proceedings of the 12th IEEE International Conference on Fuzzy Systems (FUZZ) May 2003, pp. 1243-1248

After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

This paper contains substantial duplication of original text from the paper cited below. The original text was copied with insufficient attribution (including appropriate citations to the original author(s) and/or paper title) and without permission.

Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article:

"From Security to Safety and Back"
by Victoria Stavridou, Bruno Dutertre
in the Proceedings of the Computer Security, Dependability and Assurance: From Needs to Solutions, 1999, pp. 182-195

The paper attempts to investigate a feasibility of developing new models and methodologies integrating probabilistic and soft computing techniques and applying them to measurement of computer system security. It reviews the methods, which have been developed and applied up to now for this purpose, and analyses their applicability. It concludes that neither of methodologies being applied for measurement of computer security and/or reliability may be considered as comprehensive and good. Summarizing the required features of the measurement models, the paper concludes that new synergetic models and approaches need to be developed.

Published in:

Fuzzy Systems, 2003. FUZZ '03. The 12th IEEE International Conference on  (Volume:2 )

Date of Conference:

25-28 May 2003