Academic literature on the topic 'Security Framework'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security Framework.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security Framework"
Szpyra, Ryszard. "Military Security within the Framework of Security Studies: Research Results." Connections: The Quarterly Journal 13, no. 3 (2014): 59–82. http://dx.doi.org/10.11610/connections.13.3.04.
Full textBalaji, K., and S. S. Manikandasaran. "Data Security and Deduplication Framework for Securing and Deduplicating Users’ Data in Public and Private Cloud Environment." Journal of Scientific Research 14, no. 1 (January 1, 2022): 153–65. http://dx.doi.org/10.3329/jsr.v14i1.54063.
Full textJain, Smriti, and Maya Ingle. "Generalized Software Security Framework." International Journal on Advanced Science, Engineering and Information Technology 1, no. 4 (2011): 413. http://dx.doi.org/10.18517/ijaseit.1.4.84.
Full textSterlicchi, John. "Security framework from Microsoft." Network Security 1996, no. 7 (July 1996): 7–8. http://dx.doi.org/10.1016/1353-4858(96)83735-4.
Full textK.N., Sunilkumar. "Security Framework for Physiological Signals Using Auto Encoder." Journal of Advanced Research in Dynamical and Control Systems 12, no. 01-Special Issue (February 13, 2020): 583–92. http://dx.doi.org/10.5373/jardcs/v12sp1/20201107.
Full textRizvi, Syed, Jungwoo Ryoo, John Kissell, William Aiken, and Yuhong Liu. "A security evaluation framework for cloud security auditing." Journal of Supercomputing 74, no. 11 (May 2, 2017): 5774–96. http://dx.doi.org/10.1007/s11227-017-2055-1.
Full textChangchit, Chuleeporn. "Security Systems Framework, Security-Related Research, Web Threats." Journal of Information Privacy and Security 7, no. 4 (October 2011): 1–2. http://dx.doi.org/10.1080/15536548.2011.10855920.
Full textLipiński, Bartosz, Wojciech Mazurczyk, Krzysztof Szczypiorski, and Piotr Śmietanka. "Towards Effective Security Framework for Vehicular Ad-Hoc Networks." Journal of Advances in Computer Networks 3, no. 2 (2015): 134–40. http://dx.doi.org/10.7763/jacn.2015.v3.155.
Full textPacheco, Jesus, Victor H. Benitez, and Zhiwen Pan. "Security Framework for IoT End Nodes with Neural Networks." International Journal of Machine Learning and Computing 9, no. 4 (August 2019): 381–86. http://dx.doi.org/10.18178/ijmlc.2019.9.4.814.
Full textCreado, Orhio Mark, Bala Srinivasan, Phu Dung Le, and Jeff Tan. "The Ideal Computing System Framework – A Novel Security Paradigm." SIJ Transactions on Computer Science Engineering & its Applications (CSEA) 02, no. 04 (August 7, 2014): 94–103. http://dx.doi.org/10.9756/sijcsea/v2i4/0203270402.
Full textDissertations / Theses on the topic "Security Framework"
Haley, Charles B. "Arguing security : a framework for analyzing security requirements." Thesis, Open University, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.439343.
Full textHaley, Charles B. "Arguing security : a framework for analyzing security requirements." n.p, 2006. http://ethos.bl.uk/.
Full textColobran, Huguet Miquel. "A general-purpose security framework." Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/322814.
Full textComputer Science has undergone major transformations throughout its short history. It started with great machines and very restricted and specialized environments and It has become in small devices that are part of society and daily life of every person. Security has been one of the areas most affected by those changes and has undergone major changes in technology also. For this reason, we think that the “traditional” definition of computer security is narrow, especially if we consider the new securities that have appeared in other areas of knowledge. Current definition comes from the 70s and security, in the twenty-first century, is conceptually, theoretically and practically something different. Therefore, the main objective of this thesis is review the concept of computer security itself in order to propose a definition together with a framework model capable to be implemented. In order to achieve it, an analysis method is proposed. The analysis method is based on conceptual methods of obtaining knowledge (knowledge acquisition) used in knowledge engineering. The conceptual model is performed using the Class Diagram (UML) as a graphical representation language. After that, apply the proposed method to a set of selected sources, in order to obtain the model. The conceptual model of the concept of security is expressed as a set of concepts and relationships among concepts. Based on the proposed model, an algebraic expression of the concept of security is drawn, and finally the model is implemented by means of a knowledge-based system using an ontology. Consequently, the study’s principal contributions are the development of a methodology of conceptual analysis and a definition of security along with its framework. The framework is expressed in algebraic manner also and is capable to be implemented using technologies such as Java, providing security metrics. The structure of the thesis is as following: In part 1, a theoretic approach to the study of security, paying attention to other disciplines not related to engineering. An historical approach of the study of the concept of security is made, having special attention to those concepts or models proposed by scholars in the field of security (not exclusively in the field of computer security). Part 2 explains the tools used to build the model. Modeling tools are used both conceptual and knowledge based ones. A method of analysis is constructed and used in the model design. In part 3 a generic model of security is proposed. The aim is to propose an integrative model that includes many of the existing securities. Additionally an algebraic formulation of the security model is made. Finally, part 4 is dedicated to apply the proposed model to a real scenario. This demonstrates that the model is operative and capable to measure the level of security.
Ødegård, Leif. "Framework Support for Web Application Security." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9314.
Full textThere are several good reasons to use a framework when you are developing a new web application. We often here that: *** frameworks use known patterns that result in an easily extendable architecture *** frameworks result in loose couplings between different modules in the application *** frameworks allow developer to concentrate on business logic instead of reinventing wheels that is already reinvented several times *** frameworks are often thoroughly tested and contains less bugs than custom solutions But security is rarely mentioned in this setting. Our main motivation in this thesis is therefore to discuss what three popular web application frameworks do to improve the overall security level. In this thesis we have chosen to research Spring, Struts and JSF. We use them to develop small applications and test whether they are vulnerable to different types of attacks or not. We focus on attacks involving metacharacters such that SQL-injection and cross-site scripting, but also security pitfalls connected to access control and error handling. We have found out that all three frameworks do implement some metacharacter handling. Since Spring tries to fill the role of a full-stack application framework, it provides some SQL metacharacter handling to avoid SQL-injections, but we have identified some implementation weaknesses that may lead to vulnerabilities. Cross-site scripting problems are handled in both Spring, Struts, and JSF by HTML-encoding as long as custom RenderKits are not introduced in JSF. When it comes to access control, the framework support is somewhat limited. They do support a role-based access control model, but this is not sufficient in applications where domain object access is connected to users rather than roles. To improve the access control in Struts applications, we provide an overall access control design that is based on aspect-oriented programming and integrates with standard Struts config files. Hopefully, this design is generic enough to suit several application's needs, but also useable to developers such that it results in a more secure access control containing less bugs than custom solutions.
Islam, Gibrail, and Murtaza Ali Qureshi. "A Framework for Security Requirements Elicitation." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3448.
Full textKaushal, Shiv. "Grid security and the gridsite framework." Thesis, University of Manchester, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.506580.
Full textSharma, Dhirendra S. M. Massachusetts Institute of Technology. "Enterprise Information Security Management Framework [EISMF]." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/67568.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 124-130).
There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, firewalls, and spam filters. There is no doubt in the fact that significant progress has been made in the technological side of information security. However, when we study causes of information security breaches, we find that a significant number are caused by non-technical reasons such as social engineering, theft of computing device or portable hard drive, human behavior, and human error. This leads us to conclude that information security should not be viewed through technology perspective only. Instead, a more holistic approach is required. This thesis provides a systems approach towards information security management and include technological, management and social aspects. This thesis starts with introduction especially background and motivation of the author, followed by literature research. Next, Enterprise Information Security Management Framework is presented leading to estimation of an organization's information security management maturity-level. Finally, conclusion and potential future work are presented.
by Dhirendra Sharma.
S.M.in Engineering and Management
Bogale, Helen Yeshiwas, and Zohaib Ahmed. "A Framework for Security Requirements : Security Requirements Categorization and Misuse Cases." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5896.
Full textSäkerhet Kravhantering är nödvändigt för att uppnå säkra programvarusystem. Många tekniker och metoder har föreslagits för att framkalla säkerhetskraven i de inledande faserna i utvecklingen. Med den växande betydelsen av säkerhet och enorma ökning av brott mot säkerheten under de senaste åren har forskare och praktiker strävat efter att uppnå en mogen process för att klara säkerhetskraven. Mycket av verksamheten i detta avseende ses i den akademiska världen, men industrin fortfarande tycks saknas i att ge den nödvändiga betydelse för säkerheten kravhantering. Därför är säkerheten kravhantering fortfarande inte alltid som en central del av kravhantering. Denna studie är inriktad att överbrygga denna klyfta mellan akademi och näringsliv när det gäller säkerhet kravhantering och att ge en konkret strategi för att effektivt få fram och specificera säkerhetskrav. Missbruk fallet tekniken föreslås för detta ändamål. Men det saknar i att ge riktlinjer för att möjliggöra skalbar användning. Denna begränsning har åtgärdats för att uppnå en mogen process av säkerhetskrav elicitation.
+46 (0) 735 84 12 97, +46 (0) 760 60 96 55
Erturk, Volkan. "A Framework Based On Continuous Security Monitoring." Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/12610139/index.pdf.
Full textMurufu, Mufudzi Anesu Chapman. "Development of an M-commerce security framework." Thesis, University of Fort Hare, 2014. http://hdl.handle.net/10353/833.
Full textBooks on the topic "Security Framework"
(Corporation), NIIT, ed. Microsoft .NET Framework security. Cincinnati, Ohio: Premier Press, 2002.
Find full textVictoria. Office of the Auditor-General. WoVG information security management framework. Melbourne, Vic: Victorian Government Printer, 2013.
Find full textData Security Council of India. DSCI security framework: Best practices. New Delhi: Data Security Council of India, 2010.
Find full textAlsmadi, Izzat, Chuck Easttom, and Lo’ai Tawalbeh. The NICE Cyber Security Framework. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41987-5.
Full textAlsmadi, Izzat. The NICE Cyber Security Framework. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02360-7.
Full textPeikari, Cyrus. Windows .NET server security handbook. Upper Saddle River, NJ: Prentice Hall, 2002.
Find full textMacedonia) NATO Advanced Research Workshop on Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework (2013 Ohrid. Cyber security and resiliency policy framework. Amsterdam: IOS Press, 2014.
Find full textInstitute for Defence Studies and Analyses, ed. Cooperative security framework for South Asia. New Delhi: Published by Pentagon Press in association with Institute for Defence Studies and Analyses, 2013.
Find full textBuzan, Barry. Security: A new framework for analysis. Boulder, Colo: Lynne Rienner Pub., 1998.
Find full textBook chapters on the topic "Security Framework"
Esakova, Nataliya. "Theoretical framework." In European Energy Security, 35–133. Wiesbaden: VS Verlag für Sozialwissenschaften, 2012. http://dx.doi.org/10.1007/978-3-531-19201-7_2.
Full textWerther-Pietsch, Ursula. "Changed Geopolitical Framework." In Transforming Security, 89–100. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87097-3_6.
Full textMa, Jianfeng, Changguang Wang, and Zhuo Ma. "Security Architecture Framework." In Security Access in Wireless Local Area Networks, 29–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00941-9_2.
Full textFreeman, Adam, and Steven Sanderson. "Security and Vulnerability." In Pro ASP.NET MVC 3 Framework, 711–30. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3405-0_21.
Full textAlsmadi, Izzat. "Cyber Security Management." In The NICE Cyber Security Framework, 243–51. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02360-7_10.
Full textSanderson, Steven. "Security and Vulnerability." In Pro ASP.NET MVC 2 Framework, 563–83. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-2887-5_15.
Full textAlsmadi, Izzat. "Information Systems Security Management." In The NICE Cyber Security Framework, 31–53. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41987-5_2.
Full textTurns, David, and Anicée Van Engeland. "The legal framework for security." In Managing Security, 46–59. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003137061-4.
Full textShivakumar, Shailesh Kumar. "Digital Workplace Security Framework." In Build a Next-Generation Digital Workplace, 265–301. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5512-4_10.
Full textTrivellato, Daniel, Sandro Etalle, Erik Luit, and Nicola Zannone. "The POLIPO Security Framework." In Situation Awareness with Systems of Systems, 189–208. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-6230-9_12.
Full textConference papers on the topic "Security Framework"
Backes, Michael, Sven Bugiel, Sebastian Gerling, and Philipp von Styp-Rekowsky. "Android security framework." In the 30th Annual Computer Security Applications Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2664243.2664265.
Full textFielden, Kay. "Information security framework." In 2010 International Conference on Information Society (i-Society 2010). IEEE, 2010. http://dx.doi.org/10.1109/i-society16502.2010.6018758.
Full textWang, Yazhe, Shunan Ma, and Lei Ren. "A Security Framework for Cloud Manufacturing." In ASME 2014 International Manufacturing Science and Engineering Conference collocated with the JSME 2014 International Conference on Materials and Processing and the 42nd North American Manufacturing Research Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/msec2014-4082.
Full textPersch, Henrique, Lisandra Fontoura, and Adriano Fontoura. "SPRO: Security Process Framework." In The 31st International Conference on Software Engineering and Knowledge Engineering. KSI Research Inc. and Knowledge Systems Institute Graduate School, 2019. http://dx.doi.org/10.18293/seke2019-015.
Full text"Security framework of AeroMACS." In 2013 Integrated Communications, Navigation and Surveillance Conference (ICNS). IEEE, 2013. http://dx.doi.org/10.1109/icnsurv.2013.6548591.
Full textTunc, Cihan, Salim Hariri, Mheni Merzouki, Charif Mahmoudi, Frederic J. De Vaulx, Jaafar Chbili, Robert Bohn, and Abdella Battou. "Cloud Security Automation Framework." In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W). IEEE, 2017. http://dx.doi.org/10.1109/fas-w.2017.164.
Full textOhki, Eijiroh, Yonosuke Harada, Shuji Kawaguchi, Tetsuo Shiozaki, and Tetsuyuki Kagaya. "Information security governance framework." In the first ACM workshop. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1655168.1655170.
Full textKo, Hoon, and Carlos Ramos. "A Study on Security Framework for Ambient Intelligent Environment (ISyRAmISF: ISyRAmI Security Framework)." In 2009 Fifth International Conference on Wireless and Mobile Communications. IEEE, 2009. http://dx.doi.org/10.1109/icwmc.2009.22.
Full textSatoh, Fumiko, and Yumi Yamaguchi. "Generic Security Policy Transformation Framework for WS-Security." In IEEE International Conference on Web Services (ICWS 2007). IEEE, 2007. http://dx.doi.org/10.1109/icws.2007.92.
Full textHartog, Tim, and Geert Kleinhuis. "Security analysis of the Dependability, Security Reconfigurability framework." In 2008 Third International Conference on Risks and Security of Internet and Systems( CRiSIS). IEEE, 2008. http://dx.doi.org/10.1109/crisis.2008.4757468.
Full textReports on the topic "Security Framework"
Detry, Richard J., Stephen D. Kleban, and Patrick C. Moore. The Generalized Security Framework. Office of Scientific and Technical Information (OSTI), June 2001. http://dx.doi.org/10.2172/784196.
Full textHousley, R. Security Label Framework for the Internet. RFC Editor, May 1993. http://dx.doi.org/10.17487/rfc1457.
Full textFang, L., ed. Security Framework for MPLS and GMPLS Networks. RFC Editor, July 2010. http://dx.doi.org/10.17487/rfc5920.
Full textFang, L., B. Niven-Jenkins, S. Mansfield, and R. Graveman, eds. MPLS Transport Profile (MPLS-TP) Security Framework. RFC Editor, April 2013. http://dx.doi.org/10.17487/rfc6941.
Full textLopez, D., E. Lopez, L. Dunbar, J. Strassner, and R. Kumar. Framework for Interface to Network Security Functions. RFC Editor, February 2018. http://dx.doi.org/10.17487/rfc8329.
Full textResearch Institute (IFPRI), International Food Policy. Food security stocks and the WTO legal framework. Washington, DC: International Food Policy Research Institute, 2017. http://dx.doi.org/10.2499/9780896292499_09.
Full textGlunz, Matthew P. The Framework for US-Canada Defense and Security Cooperation. Fort Belvoir, VA: Defense Technical Information Center, March 2007. http://dx.doi.org/10.21236/ada493562.
Full textFlom, Hernán. The Political Economy of Citizen Security: A Conceptual Framework. Inter-American Development Bank, January 2018. http://dx.doi.org/10.18235/0001237.
Full textFang, L., ed. Security Framework for Provider-Provisioned Virtual Private Networks (PPVPNs). RFC Editor, July 2005. http://dx.doi.org/10.17487/rfc4111.
Full textAIR FORCE ACADEMY COLORADO SPRINGS CO. An Environmental Security Information Framework For Contingency Operations Overseas. Fort Belvoir, VA: Defense Technical Information Center, April 1998. http://dx.doi.org/10.21236/ada367347.
Full text