Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Siv Hilde Houmb is active.

Publication


Featured researches published by Siv Hilde Houmb.


Information & Software Technology | 2009

An aspect-oriented methodology for designing secure applications

Geri Georg; Indrakshi Ray; Kyriakos Anastasakis; Behzad Bordbar; Manachai Toahchoodee; Siv Hilde Houmb

We propose a methodology, based on aspect-oriented modeling (AOM), for incorporating security mechanisms in an application. The functionality of the application is described using the primary model and the attacks are specified using aspects. The attack aspect is composed with the primary model to obtain the misuse model. The misuse model describes how much the application can be compromised. If the results are unacceptable, then some security mechanism must be incorporated into the application. The security mechanism, modeled as security aspect, is composed with the primary model to obtain the security-treated model. The security-treated model is analyzed to give assurance that it is resilient to the attack.


availability, reliability and security | 2009

Estimating ToE Risk Level Using CVSS

Siv Hilde Houmb; Virginia Nunes Leal Franqueira

Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, cost-benefit investments in security. Security investments must adhere to healthy business principles where both security and financial aspects play an important role. Information on the current and potential risk level is essential to successfully trade-off security and financial aspects. Risk level is the combination of the frequency and impact of a potential unwanted event, often referred to as a security threat or misuse. The paper presents a risk level estimation model that derives risk level as a conditional probability over frequency and impact estimates. The frequency and impact estimates are derived from a set of attributes specified in the Common Vulnerability Scoring System (CVSS). The model works on the level of vulnerabilities (just as the CVSS) and is able to compose vulnerabilities into service levels. The service levels define the potential risk levels and are modelled as a Markov process, which are then used to predict the risk level at a particular time.


WIT Transactions on the Built Environment | 2005

Modeling System Integrity Of A Security CriticalSystem Using Colored Petri Nets

Siv Hilde Houmb; Karin Sallhammar

Recently, the need for techniques for quantification of security attributes of IKT systems has been raised. This relates both to security requirements in QoS architectures, as well as input to trade-off analysis regarding the design and choice of security mechanisms to comply with an established security policy. Early research in this area has focused on state transition models, such as Markov or semi-Markov models. In the dependability domain these techniques are used to measure values such as mean time between failures (MTBF), and to quantify frequency and consequences of risks. The dynamics of security attacks makes it intractable to use, due to the problems with state explosions. To be able to express the complete state space of a security critical system, one needs to consider not only hardware, operating system. And application/services faults, but also the survivability of the system in terms of intentional and accidental security breaches. This paper builds a stochastic prediction system to estimate the system integrity of a security critical system. The paper makes use of Colored Petri Nets (CPN), a higher-level formalism for stochastic modeling, analysis, and simulation. The prediction system is implemented as a generic and hierarchic CPN model.


international conference on software engineering | 2009

Extended eTVRA vs. security checklist: Experiences in a value-web

Ayse Morali; Emmanuele Zambon; Siv Hilde Houmb; Karin Sallhammar; Sandro Etalle

Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take their products through a Common Criteria evaluation. To support security evaluation, the European Telecommunications Standards Institute (ETSI) has developed a threat, vulnerability, risk analysis (eTVRA) method for the Telecommunication (Telco) domain. eTVRA builds on the security risk management methodology CORAS and is structured in such a way that it provides output that can be directly fed into a Common Criteria security evaluation. In this paper, we evaluate the time and resource efficiency of parts of eTVRA and the quality of the result produced by following eTVRA compared to a more pragmatic approach (Protection Profile-based checklists). We use both approaches to identify and analyze risks of a new SIM card currently under joint development by a small hardware company and a large Telco provider.


Journal of Vacuum Science and Technology | 2008

Estimating Impact and Frequency of Risks to Safety and Mission Critical Systems Using CVSS

Siv Hilde Houmb; V. Nunes Leal Franqueira; E.A. Engum


Archive | 2011

Balancing Security and Performance Properties During System Architectural Design

Siv Hilde Houmb; Geri Georg; Dorina C. Petriu; Behzad Bordbar; Indrakshi Ray; Kyriakos Anastasakis


IEEE Transactions on Magnetics | 2008

Extended eTVRA vs. Security Checklist: Experiences in a Value-Web

Ayse Morali; Emmanuele Zambon; Siv Hilde Houmb; Karin Sallhammar; Sandro Etalle


Archive | 2012

SecInvest : Balancing Security Needs with Financial and Business Constraints

Siv Hilde Houmb; Indrajit Ray; Indrakshi Ray


Archive | 2009

An {A}spect-{O}riented {M}ethodology for {D}esinging {S}ecure {A}pplications

Geri Georg; Indrakshi Ray; Kyriakos Anastasakis; Behzad Bordbar; Manachai Toahchoodee; Siv Hilde Houmb


IEEE Conference Proceedings | 2009

Estimating ToE Risk Level using CVSS

Siv Hilde Houmb; V. Nunes Leal Franqueira

Collaboration


Dive into the Siv Hilde Houmb's collaboration.

Top Co-Authors

Avatar

Geri Georg

Colorado State University

View shared research outputs
Top Co-Authors

Avatar

Indrakshi Ray

Colorado State University

View shared research outputs
Top Co-Authors

Avatar

Behzad Bordbar

University of Birmingham

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge