TY - GEN
T1 - Diagraming approach to structure the security lessons
T2 - 7th International Conference on Trust and Trustworthy Computing, TRUST 2014
AU - He, Ying
AU - Johnson, Chris
AU - Evangelopoulou, Maria
AU - Lin, Zheng Shuai
PY - 2014
Y1 - 2014
N2 - Currently, the lessons learned from the security incidents are documented in add-hoc means such as lengthy security reports, free-style textual news letters, emails or informal meetings. This makes it difficult to effectively communicate security lessons among peers and organisations. The diagraming approach such as the Generic Security Template (G.S.T.) has been proposed to address this problem. This paper extends the work by evaluating its usability using the Cognitive Dimensions and identifies some aspects that need to be improved.
AB - Currently, the lessons learned from the security incidents are documented in add-hoc means such as lengthy security reports, free-style textual news letters, emails or informal meetings. This makes it difficult to effectively communicate security lessons among peers and organisations. The diagraming approach such as the Generic Security Template (G.S.T.) has been proposed to address this problem. This paper extends the work by evaluating its usability using the Cognitive Dimensions and identifies some aspects that need to be improved.
UR - http://www.scopus.com/inward/record.url?scp=84904164490&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-08593-7_19
DO - 10.1007/978-3-319-08593-7_19
M3 - Conference contribution
SN - 9783319085920
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 216
EP - 217
BT - Trust and Trustworthy Computing - 7th International Conference, TRUST 2014, Proceedings
PB - Springer Verlag
Y2 - 30 June 2014 through 2 July 2014
ER -