Journal Navigation
Special Issue on Quantitative Aspects in Security Assurance
Volume 6
Guest Editorial Preface
For Volume 6, Issue 2
View Full Issue
Alessandro Aldini, Fabio Martinelli, Neeraj Suri
Published: Apr 1, 2015
DOI: 10.4018/IJSSE.2015040101
Volume 6
Richard Gay, Heiko Mantel, Henning Sudbrock
Interrupt-related covert channels (IRCCs) utilize hardware interrupts for enabling communication between processes. This article provides an empirical evaluation of IRCC vulnerabilities, based on an... Show More
Download Sample (PDF): Article
Cite Article

MLA

Gay, Richard, et al. "An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels." IJSSE vol.6, no.2 2015: pp.1-22. http://doi.org/10.4018/IJSSE.2015040101

APA

Gay, R., Mantel, H., & Sudbrock, H. (2015). An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels. International Journal of Secure Software Engineering (IJSSE), 6(2), 1-22. http://doi.org/10.4018/IJSSE.2015040101

Chicago

Gay, Richard, Heiko Mantel, and Henning Sudbrock. "An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels," International Journal of Secure Software Engineering (IJSSE) 6, no.2: 1-22. http://doi.org/10.4018/IJSSE.2015040101

Export Reference

Mendeley
Published: Apr 1, 2015
DOI: 10.4018/IJSSE.2015040102
Volume 6
Tom Chothia, Chris Novakovic, Rajiv Ranjan Singh
This paper presents a framework for calculating measures of data integrity for programs in a small imperative language. The authors develop a Markov chain semantics for their language which... Show More
Download Sample (PDF): Article
Cite Article

MLA

Chothia, Tom, et al. "Calculating Quantitative Integrity and Secrecy for Imperative Programs." IJSSE vol.6, no.2 2015: pp.23-46. http://doi.org/10.4018/IJSSE.2015040102

APA

Chothia, T., Novakovic, C., & Singh, R. R. (2015). Calculating Quantitative Integrity and Secrecy for Imperative Programs. International Journal of Secure Software Engineering (IJSSE), 6(2), 23-46. http://doi.org/10.4018/IJSSE.2015040102

Chicago

Chothia, Tom, Chris Novakovic, and Rajiv Ranjan Singh. "Calculating Quantitative Integrity and Secrecy for Imperative Programs," International Journal of Secure Software Engineering (IJSSE) 6, no.2: 23-46. http://doi.org/10.4018/IJSSE.2015040102

Export Reference

Mendeley
Published: Apr 1, 2015
DOI: 10.4018/IJSSE.2015040103
Volume 6
Kristian Beckers, Leanid Krautsevich, Artsiom Yautsiukhin
The acquisition of information about computer systems by mostly non-technical means is called social engineering. Most critical systems are vulnerable to social threats, even when technical security... Show More
Download Sample (PDF): Article
Cite Article

MLA

Beckers, Kristian, et al. "Using Attack Graphs to Analyze Social Engineering Threats." IJSSE vol.6, no.2 2015: pp.47-69. http://doi.org/10.4018/IJSSE.2015040103

APA

Beckers, K., Krautsevich, L., & Yautsiukhin, A. (2015). Using Attack Graphs to Analyze Social Engineering Threats. International Journal of Secure Software Engineering (IJSSE), 6(2), 47-69. http://doi.org/10.4018/IJSSE.2015040103

Chicago

Beckers, Kristian, Leanid Krautsevich, and Artsiom Yautsiukhin. "Using Attack Graphs to Analyze Social Engineering Threats," International Journal of Secure Software Engineering (IJSSE) 6, no.2: 47-69. http://doi.org/10.4018/IJSSE.2015040103

Export Reference

Mendeley
Published: Apr 1, 2015
DOI: 10.4018/IJSSE.2015040104
Volume 6
Alessandro Armando, Michele Bezzi, Nadia Metoui, Antonino Sabetta
Risk-aware access control systems grant or deny access to resources based on the notion of risk. It has many advantages compared to classical approaches, allowing for more flexibility, and... Show More
Download Sample (PDF): Article
Cite Article

MLA

Armando, Alessandro, et al. "Risk-Based Privacy-Aware Information Disclosure." IJSSE vol.6, no.2 2015: pp.70-89. http://doi.org/10.4018/IJSSE.2015040104

APA

Armando, A., Bezzi, M., Metoui, N., & Sabetta, A. (2015). Risk-Based Privacy-Aware Information Disclosure. International Journal of Secure Software Engineering (IJSSE), 6(2), 70-89. http://doi.org/10.4018/IJSSE.2015040104

Chicago

Armando, Alessandro, et al. "Risk-Based Privacy-Aware Information Disclosure," International Journal of Secure Software Engineering (IJSSE) 6, no.2: 70-89. http://doi.org/10.4018/IJSSE.2015040104

Export Reference

Mendeley
Published: Apr 1, 2015
DOI: 10.4018/IJSSE.2015040105
Volume 6
Gencer Erdogan, Fredrik Seehusen, Ketil Stølen, Jon Hofstad, Jan Øyvind Aagedal
The authors present the results of an evaluation in which the objective was to assess how useful testing is for validating and correcting security risk models. The evaluation is based on two... Show More
Download Sample (PDF): Article
Cite Article

MLA

Erdogan, Gencer, et al. "Assessing the Usefulness of Testing for Validating and Correcting Security Risk Models Based on Two Industrial Case Studies." IJSSE vol.6, no.2 2015: pp.90-112. http://doi.org/10.4018/IJSSE.2015040105

APA

Erdogan, G., Seehusen, F., Stølen, K., Hofstad, J., & Aagedal, J. Ø. (2015). Assessing the Usefulness of Testing for Validating and Correcting Security Risk Models Based on Two Industrial Case Studies. International Journal of Secure Software Engineering (IJSSE), 6(2), 90-112. http://doi.org/10.4018/IJSSE.2015040105

Chicago

Erdogan, Gencer, et al. "Assessing the Usefulness of Testing for Validating and Correcting Security Risk Models Based on Two Industrial Case Studies," International Journal of Secure Software Engineering (IJSSE) 6, no.2: 90-112. http://doi.org/10.4018/IJSSE.2015040105

Export Reference

Mendeley
IGI Global Open Access Collection

IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface that can easily searched or integrated into library discovery systems. Browse IGI Global Open
Access Collection

Contact
Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.com

Open Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.com

Production-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.com

Rights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.com

Publication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.com

Discoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com

Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100