Security of economics information

作者: Ioan Gheorghe Ratiu , Claudia Georgeta Carstea , Nicoleta David , Lucian Patrascu , Dana Badau

DOI:

关键词: Cloud computing securityInformation securityNetwork security policyVulnerabilityDependabilityComputer security modelCertified Information Security ManagerSecurity convergenceInformation security standardsThreatSecurity serviceCritical security studiesStandard of Good PracticeAsset (computer security)Security testingSecurity through obscurityInformation security managementComputer securitySecurity information and event managementComputer science

摘要: The security economics information has recently become a fast-moving discipline. As distributed systems are assembled from machines belonging to principals with divergent interests, incentives becoming as important dependability technical design. new field provides valuable insights not just into "security" topics such privacy, bugs, spam, and phishing, but more general areas system (the design of peer-to-peer the optimal balance effort by programmers testers), policy (particularly digital rights management). This research been starting spill over questions (such lawenforcement strategy), interface between sociology.

参考文章(19)
Hal Varian, System Reliability and Free Riding Economics of Information Security. pp. 1- 15 ,(2004) , 10.1007/1-4020-8090-5_1
Anand Nandkumar, Ashish Arora, Rahul Telang, Ramayya Krishnan, H. John Heinz, Yubao Yang, Impact of Vulnerability Disclosure and Patch Availability - An Empirical Analysis ,(2004)
Ioan-Gheorghe Ratiu, Claudia-Georgeta Carstea, Nicoleta David, Dana Badau, None, Regards about optimization of antivirus software international conference on telecommunications. pp. 157- 160 ,(2008)
Andy Ozment, Stuart E. Schechter, Milk or wine: does software security improve with age? usenix security symposium. pp. 7- ,(2006)
Claudia-Georgeta Carstea, Ioan-Gheorghe Ratiu, Nicoleta David, Dana Badau, Antivirus software optimization WSEAS Transactions on Information Science and Applications archive. ,vol. 5, pp. 1095- 1112 ,(2008)
Michael L Katz, Carl Shapiro, Network externalities, competition, and compatibility The American Economic Review. ,vol. 75, pp. 424- 440 ,(1985)
Réka Albert, Hawoong Jeong, Albert-László Barabási, Error and attack tolerance of complex networks Nature. ,vol. 406, pp. 378- 382 ,(2000) , 10.1038/35019019
Rainer Böhme, A Comparison of Market Approaches to Software Vulnerability Disclosure Lecture Notes in Computer Science. pp. 298- 311 ,(2006) , 10.1007/11766155_21
E. Rescorla, Is finding security holes a good idea ieee symposium on security and privacy. ,vol. 3, pp. 14- 19 ,(2005) , 10.1109/MSP.2005.17