Survivability evaluation modeling techniques and measures

Hai Wang, Peng Liu

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Scopus citations

Abstract

This chapter introduces the survivability evaluation, especially on the corresponding evaluation criteria and modeling techniques. The content of this chapter includes an overview of the literature of computer system dependability or security evaluation techniques and their limitation. The concept of survivability and the techniques for modeling and evaluating survivability are introduced. In addition, the whole process of modeling and evaluating the survivability of an intrusion tolerant database system (ITDB) is shown as a case study. The discussion included in this chapter would facilitate the readers to understand the fundamental difference among reliability, availability, survivability, and related concepts. This chapter would also help information security professionals to learn the methods of measuring information security and survivability.

Original languageEnglish (US)
Title of host publicationHandbook of Research on Information Security and Assurance
PublisherIGI Global
Pages504-517
Number of pages14
ISBN (Print)9781599048550
DOIs
StatePublished - Dec 1 2008

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Fingerprint Dive into the research topics of 'Survivability evaluation modeling techniques and measures'. Together they form a unique fingerprint.

  • Cite this

    Wang, H., & Liu, P. (2008). Survivability evaluation modeling techniques and measures. In Handbook of Research on Information Security and Assurance (pp. 504-517). IGI Global. https://doi.org/10.4018/978-1-59904-855-0.ch045