Publications in Scientific Journals:

S. Fenz, A. Ekelhart:
"Verification, Validation, and Evaluation in Information Security Risk Management";
IEEE Security & Privacy, 9 (2011), 2; 58 - 65.

English abstract:
By surveying verification, validation and evaluation methods referenced in information security risk management (ISRM) literature, the authors discuss in which ISRM phases particular methods should be applied and demonstrate appropriate methods with a real-world example.

"Official" electronic version of the publication (accessed through its Digital Object Identifier - DOI)

Related Projects:
Project Head A Min Tjoa:
Security Ontologies

Created from the Publication Database of the Vienna University of Technology.