Survivability evaluation modeling techniques and measures

Hai Wang, Peng Liu

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Abstract

This chapter introduces the survivability evaluation, especially on the corresponding evaluation criteria and modeling techniques. The content of this chapter includes an overview of the literature of computer system dependability or security evaluation techniques and their limitation. The concept of survivability and the techniques for modeling and evaluating survivability are introduced. In addition, the whole process of modeling and evaluating the survivability of an intrusion tolerant database system (ITDB) is shown as a case study. The discussion included in this chapter would facilitate the readers to understand the fundamental difference among reliability, availability, survivability, and related concepts. This chapter would also help information security professionals to learn the methods of measuring information security and survivability.

Original languageEnglish (US)
Title of host publicationHandbook of Research on Information Security and Assurance
PublisherIGI Global
Pages504-517
Number of pages14
ISBN (Print)9781599048550
DOIs
StatePublished - Dec 1 2008

Fingerprint

Security of data
Computer systems
Availability

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Cite this

Wang, H., & Liu, P. (2008). Survivability evaluation modeling techniques and measures. In Handbook of Research on Information Security and Assurance (pp. 504-517). IGI Global. https://doi.org/10.4018/978-1-59904-855-0.ch045
Wang, Hai ; Liu, Peng. / Survivability evaluation modeling techniques and measures. Handbook of Research on Information Security and Assurance. IGI Global, 2008. pp. 504-517
@inbook{63b54300965f4bea849bae42c588e509,
title = "Survivability evaluation modeling techniques and measures",
abstract = "This chapter introduces the survivability evaluation, especially on the corresponding evaluation criteria and modeling techniques. The content of this chapter includes an overview of the literature of computer system dependability or security evaluation techniques and their limitation. The concept of survivability and the techniques for modeling and evaluating survivability are introduced. In addition, the whole process of modeling and evaluating the survivability of an intrusion tolerant database system (ITDB) is shown as a case study. The discussion included in this chapter would facilitate the readers to understand the fundamental difference among reliability, availability, survivability, and related concepts. This chapter would also help information security professionals to learn the methods of measuring information security and survivability.",
author = "Hai Wang and Peng Liu",
year = "2008",
month = "12",
day = "1",
doi = "10.4018/978-1-59904-855-0.ch045",
language = "English (US)",
isbn = "9781599048550",
pages = "504--517",
booktitle = "Handbook of Research on Information Security and Assurance",
publisher = "IGI Global",

}

Wang, H & Liu, P 2008, Survivability evaluation modeling techniques and measures. in Handbook of Research on Information Security and Assurance. IGI Global, pp. 504-517. https://doi.org/10.4018/978-1-59904-855-0.ch045

Survivability evaluation modeling techniques and measures. / Wang, Hai; Liu, Peng.

Handbook of Research on Information Security and Assurance. IGI Global, 2008. p. 504-517.

Research output: Chapter in Book/Report/Conference proceedingChapter

TY - CHAP

T1 - Survivability evaluation modeling techniques and measures

AU - Wang, Hai

AU - Liu, Peng

PY - 2008/12/1

Y1 - 2008/12/1

N2 - This chapter introduces the survivability evaluation, especially on the corresponding evaluation criteria and modeling techniques. The content of this chapter includes an overview of the literature of computer system dependability or security evaluation techniques and their limitation. The concept of survivability and the techniques for modeling and evaluating survivability are introduced. In addition, the whole process of modeling and evaluating the survivability of an intrusion tolerant database system (ITDB) is shown as a case study. The discussion included in this chapter would facilitate the readers to understand the fundamental difference among reliability, availability, survivability, and related concepts. This chapter would also help information security professionals to learn the methods of measuring information security and survivability.

AB - This chapter introduces the survivability evaluation, especially on the corresponding evaluation criteria and modeling techniques. The content of this chapter includes an overview of the literature of computer system dependability or security evaluation techniques and their limitation. The concept of survivability and the techniques for modeling and evaluating survivability are introduced. In addition, the whole process of modeling and evaluating the survivability of an intrusion tolerant database system (ITDB) is shown as a case study. The discussion included in this chapter would facilitate the readers to understand the fundamental difference among reliability, availability, survivability, and related concepts. This chapter would also help information security professionals to learn the methods of measuring information security and survivability.

UR - http://www.scopus.com/inward/record.url?scp=84898109830&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84898109830&partnerID=8YFLogxK

U2 - 10.4018/978-1-59904-855-0.ch045

DO - 10.4018/978-1-59904-855-0.ch045

M3 - Chapter

SN - 9781599048550

SP - 504

EP - 517

BT - Handbook of Research on Information Security and Assurance

PB - IGI Global

ER -

Wang H, Liu P. Survivability evaluation modeling techniques and measures. In Handbook of Research on Information Security and Assurance. IGI Global. 2008. p. 504-517 https://doi.org/10.4018/978-1-59904-855-0.ch045