Informatics Security Metrics Comparative Analysis
The informatics security concept is defined. For informatics applications which have a classical structure, the development, current use, maintenance, and reengineering particularities are described for distributed systems and m-applications. Metrics are built for the security of open informatics ap...
Format: | Article |
---|---|
Language: | English |
Published: |
Inforec Association
2007-01-01
|
Series: | Informatică economică |
Subjects: | |
Online Access: | http://www.revistaie.ase.ro/content/44/22%20iuvan.pdf |
_version_ | 1818493745212948480 |
---|---|
collection | DOAJ |
description | The informatics security concept is defined. For informatics applications which have a classical structure, the development, current use, maintenance, and reengineering particularities are described for distributed systems and m-applications. Metrics are built for the security of open informatics applications and a method for their validation is proposed. To see when a metric is adequate a comparative analysis is made for each indicator using a representative diversity of data sets for the test. |
first_indexed | 2024-12-10T17:58:01Z |
format | Article |
id | doaj.art-f8c62631f94f431a9eaa2aeaef371b80 |
institution | Directory Open Access Journal |
issn | 1453-1305 1842-8088 |
language | English |
last_indexed | 2024-12-10T17:58:01Z |
publishDate | 2007-01-01 |
publisher | Inforec Association |
record_format | Article |
series | Informatică economică |
spelling | doaj.art-f8c62631f94f431a9eaa2aeaef371b802022-12-22T01:38:52ZengInforec AssociationInformatică economică1453-13051842-80882007-01-01XI4107110Informatics Security Metrics Comparative AnalysisThe informatics security concept is defined. For informatics applications which have a classical structure, the development, current use, maintenance, and reengineering particularities are described for distributed systems and m-applications. Metrics are built for the security of open informatics applications and a method for their validation is proposed. To see when a metric is adequate a comparative analysis is made for each indicator using a representative diversity of data sets for the test.http://www.revistaie.ase.ro/content/44/22%20iuvan.pdfsecuritymetricsinformaticsevaluation |
spellingShingle | Informatics Security Metrics Comparative Analysis Informatică economică security metrics informatics evaluation |
title | Informatics Security Metrics Comparative Analysis |
title_full | Informatics Security Metrics Comparative Analysis |
title_fullStr | Informatics Security Metrics Comparative Analysis |
title_full_unstemmed | Informatics Security Metrics Comparative Analysis |
title_short | Informatics Security Metrics Comparative Analysis |
title_sort | informatics security metrics comparative analysis |
topic | security metrics informatics evaluation |
url | http://www.revistaie.ase.ro/content/44/22%20iuvan.pdf |