Carlos Villarrubia - Academia.edu (original) (raw)
Papers by Carlos Villarrubia
international workshop on security, 2004
First International Conference on Availability, Reliability and Security (ARES'06), 2006
The use ofpcrsswords is the most common method to carry out the uuthenticafion of users in infirm... more The use ofpcrsswords is the most common method to carry out the uuthenticafion of users in infirmution systems. For thrs reason, quality in the password nzanagenzent is a need to reach reasonable levels in the ~p i c a l objective.^ of security. In this paper, we propose a set of metrics oJj7asswordpolicies based on the niosf outsrunding jiftrctors in thu az~thentic~ztzon mechunum. Together with the metrrc.~, we propose (I quulity indicator derived from these metrics that allows w to Rave a global vzsion of the quality o f the password management polrcy zd.sed. F~nully, we will ~ndicote the jktzrre worh to be performed to check the validity and usefiAIness of tire proposed metrics
Computational Science and Its Applications - ICCSA 2006, 2006
... Systems and Technologies Department, UCLM-Soluziona Research and Development Institute, Unive... more ... Systems and Technologies Department, UCLM-Soluziona Research and Development Institute, University of Castilla-La Mancha, Paseo de la Universidad, 4 13071 Ciudad Real, Spain {Carlos.Villarrubia, Eduardo.FdezMedina, Mario ... 2. A. Adams, MA Sasse, and P. Lunt. ...
Proceedings of the 4th International Workshop on Pattern Recognition in Information Systems, 2004
For the generation of trust in the use of information and communications technologies it is neces... more For the generation of trust in the use of information and communications technologies it is necessary to demonstrate security in the use of these technologies. Security metrics or assurance metrics are the most appropriate method to generate that trust. In this article we propose a series of features for classifying security metrics. We present the main conclusions obtained through this classification together with the list of metrics analyzed.
international workshop on security, 2004
First International Conference on Availability, Reliability and Security (ARES'06), 2006
The use ofpcrsswords is the most common method to carry out the uuthenticafion of users in infirm... more The use ofpcrsswords is the most common method to carry out the uuthenticafion of users in infirmution systems. For thrs reason, quality in the password nzanagenzent is a need to reach reasonable levels in the ~p i c a l objective.^ of security. In this paper, we propose a set of metrics oJj7asswordpolicies based on the niosf outsrunding jiftrctors in thu az~thentic~ztzon mechunum. Together with the metrrc.~, we propose (I quulity indicator derived from these metrics that allows w to Rave a global vzsion of the quality o f the password management polrcy zd.sed. F~nully, we will ~ndicote the jktzrre worh to be performed to check the validity and usefiAIness of tire proposed metrics
Computational Science and Its Applications - ICCSA 2006, 2006
... Systems and Technologies Department, UCLM-Soluziona Research and Development Institute, Unive... more ... Systems and Technologies Department, UCLM-Soluziona Research and Development Institute, University of Castilla-La Mancha, Paseo de la Universidad, 4 13071 Ciudad Real, Spain {Carlos.Villarrubia, Eduardo.FdezMedina, Mario ... 2. A. Adams, MA Sasse, and P. Lunt. ...
Proceedings of the 4th International Workshop on Pattern Recognition in Information Systems, 2004
For the generation of trust in the use of information and communications technologies it is neces... more For the generation of trust in the use of information and communications technologies it is necessary to demonstrate security in the use of these technologies. Security metrics or assurance metrics are the most appropriate method to generate that trust. In this article we propose a series of features for classifying security metrics. We present the main conclusions obtained through this classification together with the list of metrics analyzed.