Notice of Violation of IEEE Publication PrinciplesWhich models should be applied to measure computer security and information assurance?

@article{Reznik2003NoticeOV,
  title={Notice of Violation of IEEE Publication PrinciplesWhich models should be applied to measure computer security and information assurance?},
  author={Leon Reznik},
  journal={The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03.},
  year={2003},
  volume={2},
  pages={1243-1248 vol.2}
}
The paper attempts to investigate a feasibility of developing new models and methodologies integrating probabilistic and soft computing techniques and applying them to measurement of computer system security. It reviews the methods, which have been developed and applied up to now for this purpose, and analyses their applicability. It concludes that neither of methodologies being applied for measurement of computer security and/or reliability may be considered as comprehensive and good… CONTINUE READING