{"id":"https://openalex.org/W2035493088","doi":"https://doi.org/10.5220/0005118504760483","title":"Keeping an Eye on Your Security Through Assurance Indicators","display_name":"Keeping an Eye on Your Security Through Assurance Indicators","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2035493088","doi":"https://doi.org/10.5220/0005118504760483","mag":"2035493088"},"language":"en","primary_location":{"id":"doi:10.5220/0005118504760483","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005118504760483","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005118504760483","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047548592","display_name":"Moussa Ouedraogo","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Moussa Ouedraogo","raw_affiliation_strings":["Public research Centre Henri Tudor, Luxembourg","Public research Centre Henri Tudor, Luxembourg 1855, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Public research Centre Henri Tudor, Luxembourg","institution_ids":[]},{"raw_affiliation_string":"Public research Centre Henri Tudor, Luxembourg 1855, Luxembourg","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103464827","display_name":"Chien-Ting Kuo","orcid":null},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]},{"id":"https://openalex.org/I3141939062","display_name":"Institute for Information Industry","ror":"https://ror.org/01d8kr740","country_code":"TW","type":"nonprofit","lineage":["https://openalex.org/I3141939062"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chien-Ting Kuo","raw_affiliation_strings":["Department of Electrical Engineering, National Taiwan University, 106 Taipei, Taiwan and Institute for Information Industry, Taiwan","Department of Electrical Engineering, National Taiwan University, 106 Taipei, Taiwan, CyberTrust Technology Institute, Institute for Information Industry, 105 Taipei, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, National Taiwan University, 106 Taipei, Taiwan and Institute for Information Industry, Taiwan","institution_ids":["https://openalex.org/I3141939062","https://openalex.org/I16733864"]},{"raw_affiliation_string":"Department of Electrical Engineering, National Taiwan University, 106 Taipei, Taiwan, CyberTrust Technology Institute, Institute for Information Industry, 105 Taipei, Taiwan","institution_ids":["https://openalex.org/I3141939062","https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006191355","display_name":"Simon Tjoa","orcid":"https://orcid.org/0000-0003-2280-9604"},"institutions":[{"id":"https://openalex.org/I25485817","display_name":"University of Applied Sciences St P\u00f6lten","ror":"https://ror.org/039a2re55","country_code":"AT","type":"education","lineage":["https://openalex.org/I25485817"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Simon Tjoa","raw_affiliation_strings":["St. Poelten University of Applied Sciences, Austria","St. Poelten University of Applied Sciences, Matthias Corvinus-Strafie 15, A-3100 St. Poelten, Austria"],"affiliations":[{"raw_affiliation_string":"St. Poelten University of Applied Sciences, Austria","institution_ids":["https://openalex.org/I25485817"]},{"raw_affiliation_string":"St. Poelten University of Applied Sciences, Matthias Corvinus-Strafie 15, A-3100 St. Poelten, Austria","institution_ids":["https://openalex.org/I25485817"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105472007","display_name":"David Preston","orcid":null},"institutions":[{"id":"https://openalex.org/I157227730","display_name":"University of East London","ror":"https://ror.org/057jrqr44","country_code":"GB","type":"education","lineage":["https://openalex.org/I157227730"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"David Preston","raw_affiliation_strings":["University of East London, United Kingdom","School of Architecture, Computing, and Engineering, University of East London, London, U.K"],"affiliations":[{"raw_affiliation_string":"University of East London, United Kingdom","institution_ids":["https://openalex.org/I157227730"]},{"raw_affiliation_string":"School of Architecture, Computing, and Engineering, University of East London, London, U.K","institution_ids":["https://openalex.org/I157227730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025583920","display_name":"\u00c9ric Dubois","orcid":"https://orcid.org/0000-0003-1253-5283"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Eric Dubois","raw_affiliation_strings":["Public research Centre Henri Tudor, Luxembourg","Public research Centre Henri Tudor, Luxembourg 1855, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Public research Centre Henri Tudor, Luxembourg","institution_ids":[]},{"raw_affiliation_string":"Public research Centre Henri Tudor, Luxembourg 1855, Luxembourg","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Paulo Simoes","orcid":null},"institutions":[{"id":"https://openalex.org/I76903346","display_name":"University of Coimbra","ror":"https://ror.org/04z8k9a98","country_code":"PT","type":"education","lineage":["https://openalex.org/I76903346"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Paulo Simoes","raw_affiliation_strings":["University of Coimbra, Portugal","CISUC, DEI, University of Coimbra, Coimbra, Portugal#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Coimbra, Portugal","institution_ids":["https://openalex.org/I76903346"]},{"raw_affiliation_string":"CISUC, DEI, University of Coimbra, Coimbra, Portugal#TAB#","institution_ids":["https://openalex.org/I76903346"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081229833","display_name":"Tiago Cruz","orcid":"https://orcid.org/0000-0001-9278-6503"},"institutions":[{"id":"https://openalex.org/I76903346","display_name":"University of Coimbra","ror":"https://ror.org/04z8k9a98","country_code":"PT","type":"education","lineage":["https://openalex.org/I76903346"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Tiago Cruz","raw_affiliation_strings":["University of Coimbra, Portugal","CISUC, DEI, University of Coimbra, Coimbra, Portugal#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Coimbra, Portugal","institution_ids":["https://openalex.org/I76903346"]},{"raw_affiliation_string":"CISUC, DEI, University of Coimbra, Coimbra, Portugal#TAB#","institution_ids":["https://openalex.org/I76903346"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5047548592"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.6361,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.88274828,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"476","last_page":"483"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6243450045585632},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44521811604499817}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6243450045585632},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44521811604499817}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0005118504760483","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005118504760483","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security and Cryptography","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0005118504760483","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005118504760483","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2130043461","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"Despite":[0],"the":[1,16,44,51,62,81,92,97,106,116,131,144,149,152,154],"incommensurable":[2],"effort":[3],"made":[4],"from":[5,36],"across":[6],"computer":[7],"sciences":[8],"disciplines":[9],"to":[10,70,83,109,143],"provide":[11],"more":[12,139,141],"secure":[13],"systems,":[14],"compromising":[15],"security":[17,99,135,166],"of":[18,32,39,54,87,94,118,133,163],"a":[19,24,37,65,78,134,161,169],"system":[20,69,79],"has":[21,46,80],"now":[22],"become":[23],"very":[25],"common":[26],"and":[27,35,100,114,121,140,172],"stark":[28],"reality":[29],"for":[30,64],"organizations":[31],"all":[33],"sizes":[34],"variety":[38],"sectors.":[40],"The":[41],"lax":[42,95],"in":[43,151],"technology":[45],"often":[47],"been":[48],"cited":[49],"as":[50,146,160],"salient":[52],"cause":[53],"systems":[55],"insecurity.":[56],"In":[57],"this":[58],"paper":[59],"we":[60],"advocate":[61],"need":[63],"Security":[66],"Assurance":[67],"(SA)":[68],"be":[71,158],"embedded":[72],"within":[73,96],"current":[74],"IT":[75],"systems.":[76],"Such":[77],"potential":[82],"address":[84],"one":[85],"facet":[86],"cyber":[88],"insecurity,":[89],"which":[90],"is":[91,138,148],"exploit":[93],"deployed":[98],"its":[101,119],"underlining":[102],"policy.":[103],"We":[104],"discuss":[105],"challenges":[107],"associated":[108],"such":[110],"an":[111,124],"SA":[112,155],"assessment":[113],"present":[115],"flavor":[117],"evaluation":[120],"monitoring":[122],"through":[123],"initial":[125],"prototype.":[126],"By":[127],"providing":[128],"indicators":[129],"on":[130],"status":[132],"matter":[136],"that":[137],"devolved":[142],"provider":[145,171],"it":[147],"case":[150],"cloud,":[153],"tool":[156],"can":[157],"used":[159],"means":[162],"fostering":[164],"better":[165],"transparency":[167],"between":[168],"cloud":[170],"client.":[173]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2015,"cited_by_count":2}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
