Implementing availability state transition model to quantify risk factor

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In IT era, every organization is depends on computer and internet for its daily routine works. A major objective of an information security policy is to ensure that information is always available to support critical business processing. This is a great challenge to develop secure software to meet its requirements and to satisfy security requirements i.e. Confidentiality, Integrity, and Availability (CIA) against identified risks. To prevent sensitive data, creating session mechanism is used which is helpful in reducing denial of service attack. In this paper, a methodology has been proposed and validated to assess the availability risk at design level using methods and classes. © 2012 Springer-Verlag GmbH.

Cite

CITATION STYLE

APA

Chandra, S., & Khan, R. A. (2012). Implementing availability state transition model to quantify risk factor. In Advances in Intelligent and Soft Computing (Vol. 167 AISC, pp. 937–952). https://doi.org/10.1007/978-3-642-30111-7_91

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free