Academic literature on the topic 'Security compliance models'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security compliance models.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security compliance models"

1

Al-Hamdani, Wasim A. "Three Models to Measure Information Security Compliance." International Journal of Information Security and Privacy 3, no. 4 (2009): 43–67. http://dx.doi.org/10.4018/jisp.2009100104.

Full text
Abstract:
This work introduces three models to measure information security compliance. These are the cardinality model, the second’s model, which is based on vector space, and the last model is based on the priority principle. Each of these models will be presented with definitions, basic operations, and examples. All three models are based on a new theory to understand information security called the Information Security Sets Theory (ISST). The ISST is based on four basic sets: external sets, local strategy sets, local standard sets, and local implementation sets. It should be noted that two sets are
APA, Harvard, Vancouver, ISO, and other styles
2

Rajashekar, Reddy Yasani, and Venkatesh Ratnam Karthik. "Automating Cloud Security and Compliance at Scale Strategies and Best Practices." European Journal of Advances in Engineering and Technology 7, no. 2 (2020): 77–82. https://doi.org/10.5281/zenodo.13912688.

Full text
Abstract:
Many rules, guidelines, and software controls have been developed by various agencies and standards bodies throughout the world to address data protection concerns, and they are all meant to be applied to data stored in the Cloud. Compliance obligations have so increased for service providers who store private information about their end users. It takes a lot of human work to follow these rules because they aren't in a machine-processable format. Providers often have to put in extra work to meet all of the regulations because numerous laws have similar requirements but don't mention each other
APA, Harvard, Vancouver, ISO, and other styles
3

Okunlola, Oluwafemi Alabi, Jelil Olaoye, Okunlola Olalekan Samuel, Adeola Oluwaseyi Okunlola, and Opeyemi Alao. "Zero Trust Security Models in Cloud Environments: Compliance Implications." International Journal of Future Engineering Innovations 2, no. 2 (2025): 96–102. https://doi.org/10.54660/ijfei.2025.2.2.96-102.

Full text
Abstract:
The rapid adoption of cloud computing has led to an increasing need for robust security models that can protect sensitive data and ensure compliance with various regulatory frameworks. The Zero Trust security model, which operates on the principle of never trusting and always verifying, has emerged as a leading solution to address these challenges. This paper explores the role of Zero Trust in cloud security, particularly its effectiveness in meeting compliance requirements across industries such as finance, healthcare, and retail. It highlights the core components of Zero Trust, including con
APA, Harvard, Vancouver, ISO, and other styles
4

Tsohou, Aggeliki, and Philipp Holtkamp. "Are users competent to comply with information security policies? An analysis of professional competence models." Information Technology & People 31, no. 5 (2018): 1047–68. http://dx.doi.org/10.1108/itp-02-2017-0052.

Full text
Abstract:
Purpose Information security policies (ISPs) are used by organizations to communicate rules on the use of information systems (IS). Research studies show that compliance with the ISPs is not a straightforward issue and that several factors influence individual behavior toward ISP compliance, such as security awareness or individual perception of security threats. The purpose of this paper is to investigate the competencies associated with users’ ISP compliance behavior. Design/methodology/approach In order to reveal the competencies that are associated with the users’ ISP compliance behavior,
APA, Harvard, Vancouver, ISO, and other styles
5

Kamau, Eunice, Teemu Myllynen, Anuoluwapo Collins, Gideon Opeyemi Babatunde, and Abidemi Adeleye Alabi. "Advances in Full-Stack Development Frameworks: A Comprehensive Review of Security and Compliance Models." International Journal of Multidisciplinary Research and Growth Evaluation 5, no. 1 (2024): 1172–85. https://doi.org/10.54660/.ijmrge.2024.5.1.1172-1185.

Full text
Abstract:
The evolution of full-stack development frameworks has revolutionized the software development landscape, enabling seamless integration of front-end and back-end functionalities. With increasing reliance on web and mobile applications, security and compliance have become critical focal points in framework design and implementation. This review examines advances in full-stack development frameworks, emphasizing their security and compliance models to address modern-day challenges such as data breaches, unauthorized access, and regulatory non-compliance. The study explores prominent full-stack f
APA, Harvard, Vancouver, ISO, and other styles
6

Kamau, Eunice, Teemu Myllynen, Anuoluwapo Collins, Gideon Opeyemi Babatunde, and Abidemi Adeleye Alabi. "Advances in Full-Stack Development Frameworks: A Comprehensive Review of Security and Compliance Models." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 1 (2023): 639–52. https://doi.org/10.54660/.ijmrge.2023.4.1.639-652.

Full text
Abstract:
The evolution of full-stack development frameworks has revolutionized the software development landscape, enabling seamless integration of front-end and back-end functionalities. With increasing reliance on web and mobile applications, security and compliance have become critical focal points in framework design and implementation. This review examines advances in full-stack development frameworks, emphasizing their security and compliance models to address modern-day challenges such as data breaches, unauthorized access, and regulatory non-compliance. The study explores prominent full-stack f
APA, Harvard, Vancouver, ISO, and other styles
7

Sunday Adeola Oladosu, Christian Chukwuemeka Ike, Peter Adeyemo Adepoju, Adeoye Idowu Afolabi, Adebimpe Bolatito Ige, and Olukunle Oladipupo Amoo. "Advancing cloud networking security models: Conceptualizing a unified framework for hybrid cloud and on-premise integrations." Magna Scientia Advanced Research and Reviews 3, no. 1 (2021): 079–90. https://doi.org/10.30574/msarr.2021.3.1.0076.

Full text
Abstract:
As organizations increasingly adopt hybrid cloud environments, the complexity of managing and securing these infrastructures has grown. Hybrid cloud and on-premise integrations present unique challenges in terms of data security, access control, and compliance, requiring a more advanced and unified approach to cloud networking security. This review conceptualizes a unified security framework aimed at addressing the specific security needs of hybrid cloud and on-premise integrations. The framework is designed to balance the flexibility and scalability of cloud environments with the robustness o
APA, Harvard, Vancouver, ISO, and other styles
8

Dachepally, Raju. "Event-Driven Security: Automating Compliance and Threat Detection in Cloud Environments." International Journal of Multidisciplinary Research and Growth Evaluation. 3, no. 5 (2022): 604–6. https://doi.org/10.54660/.ijmrge.2022.3.5.604-606.

Full text
Abstract:
Cloud environments are increasingly becoming the backbone of modern IT infrastructure, yet they also present growing security and compliance challenges. Traditional security models rely on static, rule-based policies that fail to keep up with the dynamic and distributed nature of cloud ecosystems. Event-driven security is an emerging paradigm that enables organizations to proactively respond to security threats and compliance violations through real-time automation. This paper explores the implementation of event-driven security in cloud environments, covering key components such as event inge
APA, Harvard, Vancouver, ISO, and other styles
9

D., Kavitha, and Ravikumar S. "Software Security Requirement Engineering for Risk and Compliance Management." International Journal of Innovative Technology and Exploring Engineering 10, no. 5 (2021): 11–17. http://dx.doi.org/10.35940/ijitee.e8628.0210421.

Full text
Abstract:
The objective of the research work is to propose a software based security requirement engineering model using categorical and morphisms theory. The earlier security requirement engineering models focus different viewpoints on parallel processing and develop rewrite based knowledge centred models but does not include different functional mappings between the security objects to select the best strategy. The security models have not considered the needed security functions that are to be implemented in different environments with different levels of executions. The proposed requirement engineer
APA, Harvard, Vancouver, ISO, and other styles
10

Kavitha, D., and S. Ravikumar. "Software Security Requirement Engineering for Risk and Compliance Management." International Journal of Innovative Technology and Exploring Engineering 10, no. 5 (2021): 11–17. http://dx.doi.org/10.35940/ijitee.e8628.0310521.

Full text
Abstract:
The objective of the research work is to propose a software based security requirement engineering model using categorical and morphisms theory. The earlier security requirement engineering models focus different viewpoints on parallel processing and develop rewrite based knowledge centred models but does not include different functional mappings between the security objects to select the best strategy. The security models have not considered the needed security functions that are to be implemented in different environments with different levels of executions. The proposed requirement engineer
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security compliance models"

1

Chung, Peter Wontae, and Tao Zhang. "A framework to evaluate interoperable data exchange models for Drug Supply Chain Security Act compliance." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/107520.

Full text
Abstract:
Thesis: M. Eng. in Logistics, Massachusetts Institute of Technology, Supply Chain Management Program, 2016.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (page 50).<br>The United States has one of the safest drug supply chains in the world. However, its security is threatened by new challenges such as counterfeit, diverted, and illegally imported drugs. To counter the new challenges, the Drug Supply Chain Security Act (DSCSA) was signed into law by President Obama on November 27, 2013, with a 10-year implementation timeframe. As a result, companies in the U.S.
APA, Harvard, Vancouver, ISO, and other styles
2

Saleh, Mohamed S. M. "Analysis of Information Security Risks and Protection Management Requirements for Enterprise Networks." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5414.

Full text
Abstract:
With widespread of harmful attacks against enterprises¿ electronic services, information security readiness of these enterprises is becoming of increasing importance for establishing the required safe environment for such services. Various approaches are proposed to manage enterprise information security risks and to assess its information security readiness. These approaches are, however, not adequate to manage information security risks, as all required information security components of its structural and procedural dimensions have not considered. In addition, current assessment approaches
APA, Harvard, Vancouver, ISO, and other styles
3

Saleh, Mohamed Saad Morsy. "Analysis of information security risks and protection management requirements for enterprise networks." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5414.

Full text
Abstract:
With widespread of harmful attacks against enterprises' electronic services, information security readiness of these enterprises is becoming of increasing importance for establishing the required safe environment for such services. Various approaches are proposed to manage enterprise information security risks and to assess its information security readiness. These approaches are, however, not adequate to manage information security risks, as all required information security components of its structural and procedural dimensions have not considered. In addition, current assessment approaches
APA, Harvard, Vancouver, ISO, and other styles
4

Alotaibi, Mutlaq. "A model for monitoring end-user security policy compliance." Thesis, University of Plymouth, 2017. http://hdl.handle.net/10026.1/10237.

Full text
Abstract:
Organisations increasingly perceive their employees as a great asset that needs to be cared for; however, at the same time, they view employees as one of the biggest potential threats to their cyber security. Organizations repeatedly suffer harm from employees who are not obeying or complying with their information security policies. Non-compliance behaviour of an employee, either unintentionally or intentionally, pose a real threat to an organization’s information security. As such, more thought is needed on how to encourage employees to be security compliant and more in line with a security
APA, Harvard, Vancouver, ISO, and other styles
5

Maphakela, Madidimalo Rabbie. "A model for legal compliance in the South African banking sector : an information security perspective." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/725.

Full text
Abstract:
In the past, many organisations used to keep their information on paper, which resulted in the loss of important information. In today’s knowledge era the information super-highway facilitates highly connected electronic environments where business applications can communicate on an intra- as well as inter-organizational level. As business expanded more into the cyber-world, so did the need to protect the information they have. Technology advances did not only bring benefits, it also increased the vulnerability of companies’ information. Information, the lifeblood of an organization, must be p
APA, Harvard, Vancouver, ISO, and other styles
6

Bitra, Pranavi, and Chandra Srilekha Achanta. "Development and Evaluation of an Artefact Model to Support Security Compliance for DevSecOps." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21106.

Full text
Abstract:
Background. DevOps represents a set of principles and practices of the software development (Dev) and information technology operations (Ops) of the product lifecycle requirements. DevOps has become a buzzword in organizations because it is an agile software development offspring. Now-a-days, there is a shift in organizations from DevOps to DevSecOps, which is bringing in a higher level of security built into software delivery pipelines. DevSecOps ensures security is a core component in the workflow to implement secure development and operations processes of automating every aspect. Security i
APA, Harvard, Vancouver, ISO, and other styles
7

Tuyikeze, Tite. "A model for information security management and regulatory compliance in the South African health sector." Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/425.

Full text
Abstract:
Information Security is becoming a part of the core business processes in every organization. Companies are faced with contradictory requirements to ensure open systems and accessible information while maintaining high protection standards. In addition, the contemporary management of Information Security requires a variety of approaches in different areas, ranging from technological to organizational issues and legislation. These approaches are often isolated while Security Management requires an integrated approach. Information Technology promises many benefits to healthcare organizations. It
APA, Harvard, Vancouver, ISO, and other styles
8

Dala, Prittish. "A framework and model of operation for electronic personal information to achieve and maintain compliance with Condition 7 of the Protection of Personal Information (POPI) Act." Thesis, University of Pretoria, 2017. http://hdl.handle.net/2263/61578.

Full text
Abstract:
Privacy entails controlling the use and access to place, location and personal information. In South Africa, the first privacy legislation in the form of the Protection of Personal Information (POPI) Act (Act 4 of 2013) was signed into law on 26 November 2013. The POPI Act promotes the protection of personal information by South African institutions and specifies the minimum requirements in 12 Chapters, which includes 8 Conditions for lawful processing of personal information. Condition 7 of the POPI Act makes specific provision for security safeguards to ensure the confidentiality and integri
APA, Harvard, Vancouver, ISO, and other styles
9

Cheng, Sin Ying. "Health Insurance Portability and Accountability Act (HIPAA)-compliant privacy access control model for Web services /." View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?COMP%202006%20CHENGS.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kobayashi, Tiago Hiroshi. "Uma ferramenta de manipula??o de pacotes para an?lise de protocolos de redes industriais baseados em TCP/IP." Universidade Federal do Rio Grande do Norte, 2009. http://repositorio.ufrn.br:8080/jspui/handle/123456789/15292.

Full text
Abstract:
Made available in DSpace on 2014-12-17T14:55:38Z (GMT). No. of bitstreams: 1 TiagoHK.pdf: 2636025 bytes, checksum: ce24354f7859d7a6bcea2ea448265402 (MD5) Previous issue date: 2009-06-07<br>This work presents a packet manipulation tool developed to realize tests in industrial devices that implements TCP/IP-based communication protocols. The tool was developed in Python programming language, as a Scapy extension. This tool, named IndPM- Industrial Packet Manipulator, can realize vulnerability tests in devices of industrial networks, industrial protocol compliance tests, receive server replies
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Security compliance models"

1

Peldszus, Sven Matthias. Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants. Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-37665-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shitov, Viktor. Information content management. INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1842520.

Full text
Abstract:
The textbook describes methods of ensuring quality and compliance with legislation when publishing content, the legislation of the Russian Federation in the field of intellectual property, rules for the use of information materials on the Internet, general principles of differentiation of access rights to information on the Internet, ensuring information security, types of spam and unwanted content, methods and means of combating them, technologies for managing, processing and modifying content, technologies for transmitting information on the network, duties of a moderator of a website / foru
APA, Harvard, Vancouver, ISO, and other styles
3

Peldszus, Sven Matthias. Security Compliance in Model-Driven Development of Software Systems in Presence of Long-Term Evolution and Variants. Springer Fachmedien Wiesbaden GmbH, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Buffon, Marciano, and Ivan Luiz Steffens. Tributação e constituição: Por um modo de tributar hermeneuticamente adequado à principiologia constitucional brasileira. Brazil Publishing, 2020. http://dx.doi.org/10.31012/978-65-5861-066-3.

Full text
Abstract:
The formal establishment of the Law and Democratic State by the 1988 Constitution introduces a paradigm shift with the commitment of a social nature to build a free, just and solidary society. In the tax field, this change suggests a targeted taxation to achieve these ends by the use of the redistributive function, with progressive taxation. However, despite the new institutional framework, the national taxation keeps regressive, and has promoted a redistribution of income in reverse. The study aims to address how taxation is being constructed and exercised, as well as its compliance with the
APA, Harvard, Vancouver, ISO, and other styles
5

Medeiros, Mauricio, Beatriz Fialho, Priscila Soares, and Daniel Lacerda, eds. A primeira vacina 100% brasileira contra a Covid-19: a conquista de Bio-Manguinhos/Fiocruz. Fundação Oswaldo Cruz / Bio-Manguinhos, 2022. http://dx.doi.org/10.35259/vacinacovid.2022_52830.

Full text
Abstract:
The Covid-19 pandemic is a unique event in the modern history of humanity, which has generated great challenges and, at the same time, valuable opportunities for public health. A number of examples of them are found in the more than three hundred pages of this book. In each chapter it is possible to understand how a vaccine for Covid-19 was developed in record time - due to the urgency of an antidote that would allow us to deal with this terrible disease - through the acceleration, compliance and improvement of all labor criteria, production, evaluation, timely release, and security. This enti
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Security compliance models"

1

Peldszus, Sven. "Security Compliance in Model-Driven Software Development." In Ernst Denert Award for Software Engineering 2022. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-44412-8_4.

Full text
Abstract:
AbstractTo ensure the security of a software system, it is vital to keep up with changing security precautions, attacks, and mitigations. Although model-based development enables addressing security already at design-time, design models are often inconsistent with the implementation or among themselves. Such inconsistencies hinder the effective realization and verification of secure software systems. In addition, variants of software systems are another burden to developing secure systems. Vulnerabilities must be identified and fixed on all variants or else attackers could be well-guided in at
APA, Harvard, Vancouver, ISO, and other styles
2

Spies, Marcus. "Rule-Enhanced Domain Models for Cloud Security Governance, Risk and Compliance Management." In Rule-Based Modeling and Computing on the Semantic Web. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24908-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Olatunji, Sunday O., Abdulrahman S. Almuhaidib, Abdulaziz S. Alhuwaishil, et al. "Automating Compliance Evidence Extraction with Machine Learning." In Proceedings in Technology Transfer. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-97-8588-9_3.

Full text
Abstract:
Abstract This paper integrates existing literature on the subject that converges with ongoing discussions concerning cyber security and machine learning. The paper advocates for the transformative potential of automation in compliance processes, offering increased efficiency and reliability. This study explores the intersection of cybersecurity and machine learning, focusing on how machine learning can independently analyze documents to establish whether they meet the prescribed evidence standards through programmed algorithms. Cybersecurity compliance evaluations typically require stakeholder
APA, Harvard, Vancouver, ISO, and other styles
4

Olivero, Sergio. "Implementation of Environmental Systems in Compliance with ISO 14001 Standard in the Context of SMEs in Northwestern Italy." In Deposit and Geoenvironmental Models for Resource Exploitation and Environmental Security. Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-010-0303-2_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Peldszus, Sven Matthias. "Static Security Compliance Checks." In Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants. Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-37665-9_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

von Solms, S. H., and R. von Solms. "The Control Part of the Model – An Information Security Compliance Management Environment." In Information Security Governance. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79984-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Al-Hamdani, Wasim A. "Three Models to Measure Information Security Compliance." In Security and Privacy Assurance in Advancing Technologies. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-200-0.ch022.

Full text
Abstract:
This work introduces three models to measure information security compliance. These are the cardinality model, the second’s model, which is based on vector space, and the last model is based on the priority principle. Each of these models will be presented with definitions, basic operations, and examples. All three models are based on a new theory to understand information security called the Information Security Sets Theory (ISST). The ISST is based on four basic sets: external sets, local strategy sets, local standard sets, and local implementation sets. It should be noted that two sets are
APA, Harvard, Vancouver, ISO, and other styles
8

Vankayalapati, Ravi Kumar. "Security and compliance in hybrid cloud models." In Deep Science Publishing. Deep Science Publishing, 2025. https://doi.org/10.70593/978-81-984306-5-6_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mhia-Alddin, Dilshad Ahmad, and Akram Mahmoud Hussein. "AI-Powered Contract Security." In Advances in Computational Intelligence and Robotics. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-3296-3.ch002.

Full text
Abstract:
The rapid advancement of artificial intelligence (AI) has transformed contract security, offering innovative solutions for managing contract expiry, ensuring compliance, and mitigating risks. Traditional contract management systems often struggle with scalability, accuracy, and adaptability, leading to inefficiencies and potential legal vulnerabilities. This chapter explores how deep learning and large language models (LLMs) enhance contract security by automating contract review, expiration tracking, and regulatory compliance assessment. By leveraging natural language processing (NLP) and pre
APA, Harvard, Vancouver, ISO, and other styles
10

Koukovini, Maria N., Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Nikolaos L. Dellas, Dimitra I. Kaklamani, and Iakovos S. Venieris. "Privacy Compliance Requirements in Workflow Environments." In Cyber Law, Privacy, and Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch029.

Full text
Abstract:
Workflow management systems are used to run day-to-day applications in numerous domains, often including exchange and processing of sensitive data. Their native “leakage-proneness,” being the consequence of their distributed and collaborative nature, calls for sophisticated mechanisms able to guarantee proper enforcement of the necessary privacy protection measures. Motivated by the principles of Privacy by Design and its potential for workflow environments, this chapter investigates the associated issues, challenges, and requirements. With the legal and regulatory provisions regarding privacy
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security compliance models"

1

Weng, Yijie, Xuechun Yang, Xiaorui Zhang, Yihong Jin, Fu Lei, and Tianle Zhang. "SafeGen-X: A Comprehensive Framework for Enhancing Security, Compliance, and Robustness in Large Language Models." In 2025 8th International Conference on Advanced Algorithms and Control Engineering (ICAACE). IEEE, 2025. https://doi.org/10.1109/icaace65325.2025.11019350.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zahra, Aliya Fakhira, and Rio Guntur Utomo. "Factors Influencing Student Compliance With University Information Security Policies in Indonesia Using the Unified Model Information Security Policy Compliance (UM-ISPC)." In 2024 International Conference on Information Technology Systems and Innovation (ICITSI). IEEE, 2024. https://doi.org/10.1109/icitsi65188.2024.10929144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alexander, Michael, and Candiwan Candiwan. "A Conceptual Model of Information Security Compliance and Protection Behavior through Stimulus-Organism-Response Theory." In 2024 IEEE International Conference on Computing (ICOCO). IEEE, 2024. https://doi.org/10.1109/icoco62848.2024.10928261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zahid, Maryam, Alessio Bucaioni, and Francesco Flammini. "On the ISO Compliance of Model-Based Risk Assessment for Autonomous Cyber-Physical Production Systems." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rouland, Quentin, Stojanche Gjorcheski, and Jason Jaskolka. "A Security Compliance-by-Design Framework Utilizing Reusable Formal Models." In 2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security Companion (QRS-C). IEEE, 2023. http://dx.doi.org/10.1109/qrs-c60940.2023.00054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Anass, Rabii, Assoul Saliha, and Roudiès Ounsa. "A Concept & Compliance Study of Security Maturity Models with ISO 21827." In 22nd International Conference on Enterprise Information Systems. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009569703850392.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Guarda, Paolo, Silvio Ranise, and Hari Siswantoro. "Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems." In SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies. ACM, 2017. http://dx.doi.org/10.1145/3078861.3078879.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Saraiva, Juliana, Cleidson de Souza, and Sérgio Soares. "MMAI-LGPD: A Maturity Model for Governance and Data Compliance in Information Systems Institutions." In Simpósio Brasileiro de Sistemas de Informação. Sociedade Brasileira de Computação, 2025. https://doi.org/10.5753/sbsi.2025.246644.

Full text
Abstract:
Context: The General Data Protection Law (LGPD) in Brazil demands organizations implement governance, compliance, and data security frameworks. This requirement is particularly significant for institutions managing Information Systems (IS), which face challenges in aligning technological innovation with regulatory demands. The MMAI-LGPD addresses this gap by integrating legal, organizational, and technological dimensions into a structured compliance framework tailored for IS institutions. Problem: Despite the urgency of LGPD compliance, there is no widely adopted maturity model specifically de
APA, Harvard, Vancouver, ISO, and other styles
9

Mairaj ud din, Qazi, and Qadeer Ahmed. "Automated TARA Framework for Cybersecurity Compliance of Heavy Duty Vehicles." In WCX SAE World Congress Experience. SAE International, 2024. http://dx.doi.org/10.4271/2024-01-2809.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;Recent advancements towards autonomous heavy-duty vehicles are directly associated with increased interconnectivity and software driven features. Consequently, rise of this technological trend is bringing forth safety and cybersecurity challenges in form of new threats, hazards and vulnerabilities. As per the recent UN vehicle regulation 155, several risk-based security models and assessment frameworks have been proposed to counter the growing cybersecurity issues, however, the high budgetary cost to develop the tool and
APA, Harvard, Vancouver, ISO, and other styles
10

Jungbauer, Christoph, and Christian Luidold. "Certificates and the security of digital health information." In 13th International Conference on Human Interaction & Emerging Technologies: Artificial Intelligence & Future Applications. AHFE International, 2025. https://doi.org/10.54941/ahfe1005932.

Full text
Abstract:
The digitization of healthcare information has expanded access to medical data while raising concerns about its security, authenticity, and trustworthiness. This paper explores the role of digital certificates in addressing these challenges, focusing on their potential to verify the credibility of health information and protect sensitive data. It begins with a theoretical overview, emphasizing the importance of certificates in ensuring data authenticity and integrity, particularly in compliance with regulations such as the GDPR.The analysis examines current certificate models like HONcode and
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security compliance models"

1

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Full text
Abstract:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats,
APA, Harvard, Vancouver, ISO, and other styles
2

Pasupuleti, Murali Krishna. Automated Smart Contracts: AI-powered Blockchain Technologies for Secure and Intelligent Decentralized Governance. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv425.

Full text
Abstract:
Abstract: Automated smart contracts represent a paradigm shift in decentralized governance by integrating artificial intelligence (AI) with blockchain technologies to enhance security, scalability, and adaptability. Traditional smart contracts, while enabling trustless and automated transactions, often lack the flexibility to adapt to dynamic regulatory frameworks, evolving economic conditions, and real-time security threats. AI-powered smart contracts leverage machine learning, reinforcement learning, and predictive analytics to optimize contract execution, detect fraudulent transactions, and
APA, Harvard, Vancouver, ISO, and other styles
3

Howard, Heidi, Chad Helmle, Raina Dwivedi, and Daniel Gambill. Stormwater Management and Optimization Toolbox. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/39480.

Full text
Abstract:
As stormwater regulations for hydrologic and water quality control become increasingly stringent, Department of Defense (DoD) facilities are faced with the daunting task of complying with multiple laws and regulations. This often requires facilities to plan, design, and implement structural best management practices (BMPs) to capture, filter, and/or infiltrate runoff—requirements that can be complicated, contradictory, and difficult to plan. This project demonstrated the Stormwater Management Optimization Toolbox (SMOT), a spreadsheet-based tool that effectively analyzes and plans for complian
APA, Harvard, Vancouver, ISO, and other styles
4

Ryan, Matthew, Neerupma Bhardwaj, Miguel Camara, et al. Securing the future of microbiome research and innovation: the need for biobanking infrastructure in the UK. CABI, 2024. http://dx.doi.org/10.1079/20240382445.

Full text
Abstract:
This report provides an in-depth review of the science and opportunities in microbiome biobanking, inspired by the success of the UK Biobank. It delivers actionable recommendations to establish a world-leading "UK Microbiome Biobank" (UKMB) to support academic and industrial research. The report highlights the importance of microbes in health, agriculture, and the environment, and the need to conserve microbial resources for research and innovation. Key recommendations include establishing the UKMB as a hub-and-spoke model with thematic areas, incorporating existing infrastructure, promoting d
APA, Harvard, Vancouver, ISO, and other styles
5

Orr, Kyla, Ali McKnight, Kathryn Logan, and Hannah Ladd-Jones. Scottish Inshore Fisheries Integrated Data System (SIFIDS): work package 7 final report engagement with inshore fisheries to promote and inform. Edited by Mark James. Marine Alliance for Science and Technology for Scotland (MASTS), 2020. http://dx.doi.org/10.15664/10023.23453.

Full text
Abstract:
[Extract from Executive Summary] This report documents Work Package 7 of the Scottish Inshore Fisheries Integrated Data Systems (SIFIDS) Project, which was designed to facilitate engagement with the key stakeholders including; inshore fishers, their representative bodies, Regional Inshore Fisheries Groups, Marine Scotland including Policy, Compliance and Science. The SIFIDS Project focused on 12 metre and under inshore fisheries vessels, of which around 1,500 are registered in Scotland including those that work part-time or seasonally. The facilitation team was set various targets for engageme
APA, Harvard, Vancouver, ISO, and other styles
6

Ragozin, Konstantin. High-tech ecosystem in construction. Intellectual Archive, 2024. http://dx.doi.org/10.32370/iaj.3187.

Full text
Abstract:
The issues of ensuring the stability and safety of energy generating equipment, including through various innovative aspects of cyber security, are currently extremely relevant; Energy equipment when used within the framework of construction projects is quite autonomous and issues of operational management and online control can be fully resolved within the capacity of their internal processors and controllers. In many cases, issues of computer modeling of the operating cycle parameters of such equipment, with the correct and economical formulation of the problem, can also be solved using the
APA, Harvard, Vancouver, ISO, and other styles
7

Demuynck, Méryl, Anna-Maria Andreeva, and George Kefford. A Practitioner’s Guide to Working with Children in VE-Affiliated Families: Protecting the Rights of the Child. ICCT, 2023. http://dx.doi.org/10.19165/2022.3.03.

Full text
Abstract:
The PREPARE (Promoting collaborative policies of inclusion relating to children of far right and Islamist parents in Western Europe) project aims to identify vulnerabilities and stigmas that children may face when their parents are involved in violent extremist (VE) networks, and how frontline practitioners can best address them through a collaborative approach centred on the needs of the child. It aims to support these children by supporting frontline practitioners working with these children and their families in six European countries (the Netherlands, Spain, France, Sweden, Germany and Kos
APA, Harvard, Vancouver, ISO, and other styles
8

Financial Stability Report - Second Semester of 2021. Banco de la República, 2022. http://dx.doi.org/10.32468/rept-estab-fin.sem2.eng-2021.

Full text
Abstract:
Banco de la República’s main objective is to preserve the purchasing power of the currency in coordination with the general economic policy that is intended to stabilize output and employment at long-term sustainable levels. Properly meeting the goal assigned to the Bank by the 1991 Constitution critically depends on preserving financial stability. This is understood to be a general condition in which the financial system assesses and manages the financial risks in a way that facilitates the economy’s performance and efficient allocation of resources while, at the same time, it is able to, on
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!