Modeling stakeholder/value dependency through mean failure cost

Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

In an earlier series of works, Boehm et al. discuss the nature of information system dependability and highlight the variability of system dependability according to stakeholders. In a recent paper, the dependency patterns of this model are analyzed. In our recent works, we presented a stakeholder dependent quantitative security model, where we quantify security for a given stakeholder by the mean of the loss incurred by the stakeholder as a result of security threats. We show how this mean can be derived from the security threat configuration (represented as a vector of probabilities that reflect the likelihood of occurrence of the various security threats). We refer to our security metric as MFC, for Mean Failure Cost. In this paper, we analyze Boehm's model from the standpoint of the proposed metric, and show whether, to what extent, and how our metric addresses the issues raised by Boehm's Stakeholder/Value definition of system dependability.

Original languageEnglish (US)
Title of host publication6th Annual Cyber Security and Information Intelligence Research Workshop
Subtitle of host publicationCyber Security and Information Intelligence Challenges and Strategies, CSIIRW10
DOIs
StatePublished - 2010
Event6th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW10 - Oak Ridge, TN, United States
Duration: Apr 21 2010Apr 23 2010

Publication series

NameACM International Conference Proceeding Series

Other

Other6th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW10
Country/TerritoryUnited States
CityOak Ridge, TN
Period4/21/104/23/10

All Science Journal Classification (ASJC) codes

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Keywords

  • cyber security metrics
  • information security
  • risk management

Fingerprint

Dive into the research topics of 'Modeling stakeholder/value dependency through mean failure cost'. Together they form a unique fingerprint.

Cite this