R. Anderson and T. Moore, The Economics of Information Security, Science, vol.314, issue.5799, pp.610-613, 2006.
DOI : 10.1126/science.1130992

J. Aspnes, Towards better definitions and measures of Internet security, Proc. Workshop on Large-Scale-Network Security and Deployment Obstacles, 2003.

D. A. Barnes, Deworming the internet Available at SSRN:http://ssrn, Texas Law Review, vol.83, issue.1, 2004.

R. Böhme, Cyber-insurance revisited, Proc. of Workshop on the Economics of Information Security (WEIS), 2005.

R. Böhme and G. Kataria, Models and measures for correlation in cyber-insurance

L. J. Camp and C. Wolfram, Pricing security, Proc. CERT Information Survivability Workshop, pp.24-26, 2000.

H. Chan, D. Dash, A. Perrig, and H. Zang, Modeling adoptability of secure BGP protocols, Proc. ACM Sigcomm 06, 2006.

W. R. Cheswick, S. Bellovin, and A. Rubin, Firewalls and Internet Security: Repelling the Wily Hacker, 2003.

P. Chen, Software diversity for information security, Proc. WEIS 2005, 2005.

D. Clark, The design philosophy of the DARPA Internet protocols, Proc. ACM Sigcomm 88, 1988.

D. Clark, J. Wroclawski, K. Sollins, and R. Braden, Tussle in cyberspace: defining tomorrow's internet, Proc. ACM Sigcomm 02, 2002.

E. G. Coffman-jr, Z. Ge, V. Misra, and D. Towsley, Network resilience: exploring cascading failures within BGP, Proc. 40th Annual Allerton Conference on Communications, Computing and Control, 2002.

J. C. Doyle, The "robust yet fragile" nature of the Internet, Proc. Nat. Acad. Sciences, 2005.
DOI : 10.1073/pnas.0501426102

I. Ehrlich and G. S. Becker, Market Insurance, Self-Insurance, and Self-Protection, Journal of Political Economy, vol.80, issue.4, pp.623-648, 1972.
DOI : 10.1086/259916

A. Ganesh, L. Massoulie, and D. Towsley, The effect of network topology on the spread of epidemics, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., 2005.
DOI : 10.1109/INFCOM.2005.1498374

C. Gollier, The Economics of Risk and Time, 2004.

J. Gong and P. Srinagesh, The economics of layered networks, Internet Economics, 1997.

L. Gordon and M. Loeb, Managing Cybersecurity Resources, 2005.

A. Hofmann, Internalizing externalities of loss prevention through insurance monopoly, Proc. Annual Meeting of American Risk and Insurance Association, 2006.

J. Jung, V. Paxson, A. Berger, and H. Balakrishnan, Fast portscan detection using sequential hypothesis testing, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 2004.
DOI : 10.1109/SECPRI.2004.1301325

G. Davie, M. Hardt, and F. Kelly, Network dimensioning, service costing, and pricing in a packet switched environment, Telecommunications Policy, pp.391-412, 2004.

M. Kearns and L. E. Ortiz, Algorithms for interdependent security games, Advances in Neural Information Processing Systems, 2004.

J. Kesan, R. Majuca, and W. Yurcik, The economic case for cyberinsurance, Securing Privacy in the Internet Age, 2005.

J. Kesan, R. Majuca, and W. Yurcik, Cyberinsurance as a market-based solution to the problem of cybersecurity:a case study, Proc. WEIS 2005, 2005.

L. Kleinrock, Research areas in computer communications, Computer Comm. Review, v, vol.4, issue.3, 1974.

H. Kunreuther and G. Heal, Interdependent security: the case of identical agents, Journal of Risk and Uncertainty, vol.26, issue.2, pp.231-249, 2003.
DOI : 10.3386/w8871

C. Lai, Endorsments, licensing, and insurance for distributed systems services, Proc. 2nd ACM Conf. Computer and Comm. Security (CCS), 1994.
DOI : 10.3998/3336451.0001.114

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.1406

J. Mackie-mason and H. Varian, Pricing the Internet, Public Access to the Internet, 1995.

R. P. Majuca, W. Yurcik, and J. P. Kesan, The evolution of cyberinsurance, Information Systems Frontier, 2005.

T. Mikosh, Non-Life Insurance Mathematics: An Introduction with Stochastic Processes, 2006.
DOI : 10.1007/978-3-540-88233-6

J. Mossin, Aspects of Rational Insurance Purchasing, Journal of Political Economy, vol.76, issue.4, Part 1, pp.553-568, 1968.
DOI : 10.1086/259427

A. Odlyzko, Economics, Psychology, and Sociology of Security, Proc. Financial Cryptography LNCS #2742, 2003.
DOI : 10.1007/978-3-540-45126-6_13

A. Ozment and S. Schechter, Bootstrapping the adoption of Internet security protocols, Workshop Economics Info. Sec, 2006.

S. Saniford, D. Moore, V. Paxson, and N. Weaver, The top speed of flash worms, Proc. ACM Workshop Rapid Malcode WORM'04, 2004.

S. Schechter, Quantitatively differentiating system security, Workshop Economics Info. Sec, 2002.

B. Schneier, Insurance and the computer industry, Communications of the ACM, vol.44, issue.3, 2001.
DOI : 10.1145/365181.365229

B. Schneier, Computer Security, Proc. WEIS 2002, 2002.
DOI : 10.1002/9781119183631.ch8

S. Shenker, D. Clark, D. Estrin, and S. Herzog, Pricing in computer networks, ACM SIGCOMM Computer Communication Review, vol.26, issue.2, pp.19-43, 1996.
DOI : 10.1145/231699.231703

H. Varian, J. Farrell, and C. Shapiro, The Economics of Information Technology, 2004.
DOI : 10.1017/CBO9780511754166

M. Vojnovic and A. Ganesh, On the Race of Worms, Alerts, and Patches, Proc. ACM Workshop on Rapid Malcode WORM05, 2005.
DOI : 10.1109/TNET.2007.909678

N. Weaver and V. Paxson, A worst-case worm See web site for opinion by S, Proc. 3rd Workshop Economics Info. Sec, 2004.

C. Zou, W. Gong, and D. Towsley, Code red worm propagation modeling and analysis, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002.
DOI : 10.1145/586110.586130

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.3262

I. Unité-de-recherche and . Lorraine, Technopôle de Nancy-Brabois -Campus scientifique 615, rue du Jardin Botanique -BP 101 -54602 Villers-lès-Nancy Cedex (France) Unité de recherche INRIA Rennes : IRISA, Campus universitaire de Beaulieu -35042 Rennes Cedex (France) Unité de recherche INRIA Rhône-Alpes : 655, avenue de l'Europe -38334 Montbonnot Saint-Ismier (France) Unité de recherche, 2004.

I. De-voluceau-rocquencourt, BP 105 -78153 Le Chesnay Cedex (France) http://www.inria.fr ISSN, pp.249-6399