Notice
This item was automatically migrated from a legacy system. It's data has not been checked and might not meet the quality criteria of the present system.
Fenz, S., & Ekelhart, A. (2011). Verification, Validation, and Evaluation in Information Security Risk Management. IEEE Security and Privacy, 9(2), 58–65. https://doi.org/10.1109/msp.2010.117
Electrical and Electronic Engineering; Computer Networks and Communications; Law
-
Abstract:
By surveying verification, validation and evaluation methods referenced in information security risk management (ISRM) literature, the authors discuss in which ISRM phases particular methods should be applied and demonstrate appropriate methods with a real-world example.
en
Project title:
Security Ontologies (FFG - Österr. Forschungsförderungs- gesellschaft mbH)