{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:28:44Z","timestamp":1729632524070,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/issa.2015.7335061","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:50:11Z","timestamp":1448319011000},"page":"1-6","source":"Crossref","is-referenced-by-count":16,"title":["Risk-driven security metrics development for an e-health IoT application"],"prefix":"10.1109","author":[{"given":"Reijo M.","family":"Savola","sequence":"first","affiliation":[]},{"given":"Pekka","family":"Savolainen","sequence":"additional","affiliation":[]},{"given":"Antti","family":"Evesti","sequence":"additional","affiliation":[]},{"given":"Habtamu","family":"Abie","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Sihvonen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"522","article-title":"Towards a Framework for Security Measurement","author":"wang","year":"1997","journal-title":"Proceedings of 20th National Information Systems Security Conference"},{"key":"ref11","first-page":"358","article-title":"Development of Measurable Security for a Distributed Messaging System","volume":"2","author":"savola","year":"2010","journal-title":"International Journal on Advances in Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HEALTH.2005.1500402"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"238","DOI":"10.20533\/ijds.2040.2570.2010.0029","article-title":"Security Metrics for E-healthcare Information Systems: a Domain Specific Metrics Approach","volume":"1","author":"jafari","year":"2010","journal-title":"International Journal of Digital Society"},{"key":"ref14","first-page":"27","article-title":"Security Considerations for Tablet-based eHealth Applications","author":"jaatun","year":"2014","journal-title":"Proc CEUR Workshop"},{"key":"ref15","first-page":"99","article-title":"An Empirical Research on InfoSec Risk Management in IoT-based eHealth","author":"aman","year":"2013","journal-title":"Proc MOBILITY"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/BF02919970"},{"key":"ref17","article-title":"A Taxonomy of Decomposition Strategies Based on Structures, Behaviors, and Goals","author":"koopman","year":"1995","journal-title":"Design Theory & Methodology &#x2018;95"},{"key":"ref18","article-title":"The Goal Question Metric Approach","author":"basili","year":"1994","journal-title":"Encyclopedia of Software Engineering Wiley"},{"key":"ref19","first-page":"824","article-title":"Complete Guide to Security and Privacy Metrics - Measuring Regulatory Compliance","author":"herrmann","year":"2007","journal-title":"Operational Resilience and ROI Auerbach Publications"},{"journal-title":"Information Technology Security Evaluation Criteria (ITSEC) Version 1 2 Commission for the European Communities","year":"1991","key":"ref4"},{"key":"ref3","first-page":"21","article-title":"Directions in Security Metrics Research","author":"jansen","year":"2009","journal-title":"U S National Institute of Standards and Technology NISTIR 7564"},{"key":"ref6","first-page":"75","article-title":"Metrics Driven Security Management Framework for E-Health Digital Ecosystem Focusing on Chronic Diseases","author":"savola","year":"2013","journal-title":"MED 2012"},{"journal-title":"ISO\/IEC 15408&#x2013;1 2005 Common Criteria for Information Technology Security Evaluation - Part 1 Introduction and General Model International Organization for Standardization and the International Electrotechnical Commission","year":"2005","key":"ref5"},{"key":"ref8","first-page":"1679","article-title":"Risk-driven Security Metrics in Agile Software Development - an Industrial Pilot Study","volume":"18","author":"savola","year":"2012","journal-title":"Journal of Universal Computer Science"},{"journal-title":"HIP AA Health Insurance Portability and Accountability Act (HIP AA) U S Public Law","first-page":"104","year":"1996","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.2009.5.4.197"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2012.6320434"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2523501.2523507"},{"journal-title":"Security Metrics Replacing Fear Uncertainty and Doubt","year":"2007","author":"jaquith","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719036"},{"key":"ref21","article-title":"Measuring Cyber Security and Information Assurance: A State-of-the-art Report","author":"bartol","year":"2009","journal-title":"Information Assurance Technology Analysis Center"},{"key":"ref23","first-page":"230","article-title":"On the Feasibility of Utilizing Security Metrics in Software-Intensive Systems","volume":"10","author":"savola","year":"2010","journal-title":"International Journal of Computer Science and Network Security"}],"event":{"name":"2015 Information Security for South Africa (ISSA)","start":{"date-parts":[[2015,8,12]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328027\/7335039\/07335061.pdf?arnumber=7335061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T20:53:42Z","timestamp":1567371222000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335061\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/issa.2015.7335061","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}