[Back]


Publications in Scientific Journals:

S. Fenz, A. Ekelhart:
"Verification, Validation, and Evaluation in Information Security Risk Management";
IEEE Security & Privacy, 9 (2011), 2; 58 - 65.



English abstract:
By surveying verification, validation and evaluation methods referenced in information security risk management (ISRM) literature, the authors discuss in which ISRM phases particular methods should be applied and demonstrate appropriate methods with a real-world example.


"Official" electronic version of the publication (accessed through its Digital Object Identifier - DOI)
http://dx.doi.org/10.1109/MSP.2010.117



Related Projects:
Project Head A Min Tjoa:
Security Ontologies


Created from the Publication Database of the Vienna University of Technology.