Skip to Main Content
Notice of Violation of IEEE Publication Principles
"Which Models Should Be Applied to Measure Computer Security and Information Assurance?"
by Leon Reznik
in the Proceedings of the 12th IEEE International Conference on Fuzzy Systems (FUZZ) May 2003, pp. 1243-1248
After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.
This paper contains substantial duplication of original text from the paper cited below. The original text was copied with insufficient attribution (including appropriate citations to the original author(s) and/or paper title) and without permission.
Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article:
"From Security to Safety and Back"
by Victoria Stavridou, Bruno Dutertre
in the Proceedings of the Computer Security, Dependability and Assurance: From Needs to Solutions, 1999, pp. 182-195
The paper attempts to investigate a feasibility of developing new models and methodologies integrating probabilistic and soft computing techniques and applying them to measurement of computer system security. It reviews the methods, which have been developed and applied up to now for this purpose, and analyses their applicability. It concludes that neither of methodologies being applied for measurement of computer security and/or reliability may be considered as comprehensive and good. Summarizing the required features of the measurement models, the paper concludes that new synergetic models and approaches need to be developed.