Academic literature on the topic 'Security Framework'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security Framework.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security Framework"

1

Szpyra, Ryszard. "Military Security within the Framework of Security Studies: Research Results." Connections: The Quarterly Journal 13, no. 3 (2014): 59–82. http://dx.doi.org/10.11610/connections.13.3.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Balaji, K., and S. S. Manikandasaran. "Data Security and Deduplication Framework for Securing and Deduplicating Users’ Data in Public and Private Cloud Environment." Journal of Scientific Research 14, no. 1 (January 1, 2022): 153–65. http://dx.doi.org/10.3329/jsr.v14i1.54063.

Full text
Abstract:
Maintaining the security of data stored in the public or private cloud is a more tedious task. The cloud is the only arrangement for storing enormous amounts of data, but there is a possibility of storing the same data more than once. The traditional security system generates different unreadable data for the same readable content of a file. Therefore, it is necessary to address data security of the cloud and duplication in cloud storage. This paper concentrates on developing a data security and deduplication framework with different security techniques and mechanisms to address the said difficulties in the cloud. The framework proposed in this paper focuses on reducing security vulnerability as well as data duplication. The paper describes the components used in the frameworks. The main research contribution of the framework is having enhanced the convergent encryption technique, key generation techniques, and deduplication mechanism for maintaining a single copy of data in the cloud. The proposed framework’s efficiency is measured by implementing the work by developing a cloud-based application that coded for all the procedures of the proposed framework and tested in the cloud environment.
APA, Harvard, Vancouver, ISO, and other styles
3

Jain, Smriti, and Maya Ingle. "Generalized Software Security Framework." International Journal on Advanced Science, Engineering and Information Technology 1, no. 4 (2011): 413. http://dx.doi.org/10.18517/ijaseit.1.4.84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sterlicchi, John. "Security framework from Microsoft." Network Security 1996, no. 7 (July 1996): 7–8. http://dx.doi.org/10.1016/1353-4858(96)83735-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

K.N., Sunilkumar. "Security Framework for Physiological Signals Using Auto Encoder." Journal of Advanced Research in Dynamical and Control Systems 12, no. 01-Special Issue (February 13, 2020): 583–92. http://dx.doi.org/10.5373/jardcs/v12sp1/20201107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rizvi, Syed, Jungwoo Ryoo, John Kissell, William Aiken, and Yuhong Liu. "A security evaluation framework for cloud security auditing." Journal of Supercomputing 74, no. 11 (May 2, 2017): 5774–96. http://dx.doi.org/10.1007/s11227-017-2055-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Changchit, Chuleeporn. "Security Systems Framework, Security-Related Research, Web Threats." Journal of Information Privacy and Security 7, no. 4 (October 2011): 1–2. http://dx.doi.org/10.1080/15536548.2011.10855920.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lipiński, Bartosz, Wojciech Mazurczyk, Krzysztof Szczypiorski, and Piotr Śmietanka. "Towards Effective Security Framework for Vehicular Ad-Hoc Networks." Journal of Advances in Computer Networks 3, no. 2 (2015): 134–40. http://dx.doi.org/10.7763/jacn.2015.v3.155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pacheco, Jesus, Victor H. Benitez, and Zhiwen Pan. "Security Framework for IoT End Nodes with Neural Networks." International Journal of Machine Learning and Computing 9, no. 4 (August 2019): 381–86. http://dx.doi.org/10.18178/ijmlc.2019.9.4.814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Creado, Orhio Mark, Bala Srinivasan, Phu Dung Le, and Jeff Tan. "The Ideal Computing System Framework – A Novel Security Paradigm." SIJ Transactions on Computer Science Engineering & its Applications (CSEA) 02, no. 04 (August 7, 2014): 94–103. http://dx.doi.org/10.9756/sijcsea/v2i4/0203270402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security Framework"

1

Haley, Charles B. "Arguing security : a framework for analyzing security requirements." Thesis, Open University, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.439343.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haley, Charles B. "Arguing security : a framework for analyzing security requirements." n.p, 2006. http://ethos.bl.uk/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Colobran, Huguet Miquel. "A general-purpose security framework." Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/322814.

Full text
Abstract:
La Informàtica ha sofert grans transformacions al llarg de la seva curta història. Va començar amb grans màquines en entorns especialitzats i molt restringits i s'ha convertit en petits dispositius que formen part de la societat i la vida quotidiana de totes les persones. La seguretat ha estat una de les àrees més afectades per aquests canvis i ha sofert grans canvis també a nivell tecnològic. Per aquesta raó, creiem que la definició "tradicional" de la seguretat informàtica és insuficient, sobretot si tenim en compte les noves seguretats que han aparegut en altres àrees de coneixement. La definició actual prové dels anys 70 i la seguretat, al segle XXI, és conceptualment, teòrica i pràctica diferent. Per tant, l'objectiu principal d'aquesta tesi és revisar el concepte mateix de seguretat informàtica per tal de proposar una definició juntament amb un model genèric que permeti una implementació. Per tal d'aconseguir-ho es proposa un anàlisi del concepte. El mètode d'anàlisi es basa en mètodes conceptuals d'obtenció de coneixement utilitzats en l'enginyeria del coneixement. El model conceptual es realitza utilitzant el diagrama de classes (UML) com un llenguatge gràfic de representació. El mètode proposat s’aplica a un conjunt de fonts seleccionades prèviament, per tal d'obtenir el model. El model conceptual del concepte de seguretat s'expressa com un conjunt de conceptes i relacions entre conceptes. En base al model genèric proposat, es realitza una descripció formal del concepte de seguretat i, finalment, el model s'implementa per mitjà d'un sistema basat en el coneixement utilitzant una ontologia. En conseqüència, les contribucions principals de l'estudi són el desenvolupament d'una metodologia d'anàlisi conceptual i una definició de seguretat juntament amb el seu model genèric. El marc de seguretat està descrit en forma algebraica i també és possible implementar-lo utilitzant tecnologies com Java, proporcionant mètriques de seguretat. L'estructura de la tesi és la següent: A la part 1, es fa una aproximació teòrica del concepte de seguretat, posant especial atenció a altres disciplines no relacionades amb l'enginyeria. Es fa una aproximació històrica de l'estudi del concepte de seguretat, tenint cura d’aquells conceptes o models proposats pels experts en el camp de la seguretat (no exclusivament en el camp de la seguretat informàtica). La part 2 explica les eines que s'utilitzen per a construir el model. S’utilitzen eines de modelat conceptuals i de coneixement. Es defineix un mètode d'anàlisi i s'utilitza en el disseny del model. A la part 3 es proposa un model genèric de seguretat. L'objectiu és proposar un model integrador que inclogui moltes de les seguretat existents. A més es fa una formulació algebraica del model de seguretat. Finalment, la part 4 està dedicada a aplicar el model proposat en un escenari real. Això demostra que el model és operatiu i capaç de mesurar el nivell de seguretat.
Computer Science has undergone major transformations throughout its short history. It started with great machines and very restricted and specialized environments and It has become in small devices that are part of society and daily life of every person. Security has been one of the areas most affected by those changes and has undergone major changes in technology also. For this reason, we think that the “traditional” definition of computer security is narrow, especially if we consider the new securities that have appeared in other areas of knowledge. Current definition comes from the 70s and security, in the twenty-first century, is conceptually, theoretically and practically something different. Therefore, the main objective of this thesis is review the concept of computer security itself in order to propose a definition together with a framework model capable to be implemented. In order to achieve it, an analysis method is proposed. The analysis method is based on conceptual methods of obtaining knowledge (knowledge acquisition) used in knowledge engineering. The conceptual model is performed using the Class Diagram (UML) as a graphical representation language. After that, apply the proposed method to a set of selected sources, in order to obtain the model. The conceptual model of the concept of security is expressed as a set of concepts and relationships among concepts. Based on the proposed model, an algebraic expression of the concept of security is drawn, and finally the model is implemented by means of a knowledge-based system using an ontology. Consequently, the study’s principal contributions are the development of a methodology of conceptual analysis and a definition of security along with its framework. The framework is expressed in algebraic manner also and is capable to be implemented using technologies such as Java, providing security metrics. The structure of the thesis is as following: In part 1, a theoretic approach to the study of security, paying attention to other disciplines not related to engineering. An historical approach of the study of the concept of security is made, having special attention to those concepts or models proposed by scholars in the field of security (not exclusively in the field of computer security). Part 2 explains the tools used to build the model. Modeling tools are used both conceptual and knowledge based ones. A method of analysis is constructed and used in the model design. In part 3 a generic model of security is proposed. The aim is to propose an integrative model that includes many of the existing securities. Additionally an algebraic formulation of the security model is made. Finally, part 4 is dedicated to apply the proposed model to a real scenario. This demonstrates that the model is operative and capable to measure the level of security.
APA, Harvard, Vancouver, ISO, and other styles
4

Ødegård, Leif. "Framework Support for Web Application Security." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9314.

Full text
Abstract:

There are several good reasons to use a framework when you are developing a new web application. We often here that: *** frameworks use known patterns that result in an easily extendable architecture *** frameworks result in loose couplings between different modules in the application *** frameworks allow developer to concentrate on business logic instead of reinventing wheels that is already reinvented several times *** frameworks are often thoroughly tested and contains less bugs than custom solutions But security is rarely mentioned in this setting. Our main motivation in this thesis is therefore to discuss what three popular web application frameworks do to improve the overall security level. In this thesis we have chosen to research Spring, Struts and JSF. We use them to develop small applications and test whether they are vulnerable to different types of attacks or not. We focus on attacks involving metacharacters such that SQL-injection and cross-site scripting, but also security pitfalls connected to access control and error handling. We have found out that all three frameworks do implement some metacharacter handling. Since Spring tries to fill the role of a full-stack application framework, it provides some SQL metacharacter handling to avoid SQL-injections, but we have identified some implementation weaknesses that may lead to vulnerabilities. Cross-site scripting problems are handled in both Spring, Struts, and JSF by HTML-encoding as long as custom RenderKits are not introduced in JSF. When it comes to access control, the framework support is somewhat limited. They do support a role-based access control model, but this is not sufficient in applications where domain object access is connected to users rather than roles. To improve the access control in Struts applications, we provide an overall access control design that is based on aspect-oriented programming and integrates with standard Struts config files. Hopefully, this design is generic enough to suit several application's needs, but also useable to developers such that it results in a more secure access control containing less bugs than custom solutions.

APA, Harvard, Vancouver, ISO, and other styles
5

Islam, Gibrail, and Murtaza Ali Qureshi. "A Framework for Security Requirements Elicitation." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3448.

Full text
Abstract:
Context: Security considerations are typically incorporated in the later stages of development as an afterthought. Security in software system is put under the category of non-functional requirements by the researchers. Understanding the security needs of a system requires considerable knowledge of assets, data security, integrity, confidentiality and availability of services. Counter measures against software attacks are also a security need of a software system. To incorporate security in the earliest stages, i.e. requirement gathering, helps building secure software systems from the start. For that purpose researchers have proposed different requirements elicitation techniques. These techniques are categorized into formal and informal techniques on the basis of finiteness and clarity in activities of the techniques. Objectives: Limitations of formal methods and lack of systematic approaches in informal elicitation techniques make it difficult to rely on a single technique for security requirements elicitation. Therefore we decided to utilize the strengths of formal and informal technique to mitigate their weaknesses by combining widely used formal and informal security requirements elicitation techniques. The basic idea of our research was to integrate an informal technique with a formal technique and propose a flexible framework with some level of formality in the steps. Methods: We conducted a systematic literature review to see “which are the widely used security requirement elicitation techniques?” as a pre-study for our thesis? We searched online databases i.e. ISI, IEEE Xplore, ACM, Springer, Inspec and compendeX. We also conducted a literature review for different frameworks that are used in industry, for security requirement elicitation. We conducted an experiment after proposing a security requirements elicitation Framework and compared the result from the Framework with that of CLASP and Misuse cases. Results:Two types of analysis were conducted on results from the experiment: Vulnerability analysis and Requirements analysis with respect to a security baseline. Vulnerability analysis shows that the proposed framework mitigates more vulnerabilities than CLASP and Misuse Cases. Requirements analysis with respect to the security baseline shows that the proposed framework, unlike CLASP and Misuse cases, covers all the security baseline features. Conclusions:The framework we have proposed by combining CLASP, Misuse cases and Secure TROPOS contains the strengths of three security requirements elicitation techniques. To make the proposed framework even more effective, we also included the security requirements categorization by Bogale and Ahmed [11]. The framework is flexible and contains fifteen steps to elicit security requirements. In addition it also allows iterations to improve security in a system
APA, Harvard, Vancouver, ISO, and other styles
6

Kaushal, Shiv. "Grid security and the gridsite framework." Thesis, University of Manchester, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.506580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sharma, Dhirendra S. M. Massachusetts Institute of Technology. "Enterprise Information Security Management Framework [EISMF]." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/67568.

Full text
Abstract:
Thesis (S.M. in Engineering and Management)--Massachusetts Institute of Technology, Engineering Systems Division, System Design and Management Program, 2011.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 124-130).
There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, firewalls, and spam filters. There is no doubt in the fact that significant progress has been made in the technological side of information security. However, when we study causes of information security breaches, we find that a significant number are caused by non-technical reasons such as social engineering, theft of computing device or portable hard drive, human behavior, and human error. This leads us to conclude that information security should not be viewed through technology perspective only. Instead, a more holistic approach is required. This thesis provides a systems approach towards information security management and include technological, management and social aspects. This thesis starts with introduction especially background and motivation of the author, followed by literature research. Next, Enterprise Information Security Management Framework is presented leading to estimation of an organization's information security management maturity-level. Finally, conclusion and potential future work are presented.
by Dhirendra Sharma.
S.M.in Engineering and Management
APA, Harvard, Vancouver, ISO, and other styles
8

Bogale, Helen Yeshiwas, and Zohaib Ahmed. "A Framework for Security Requirements : Security Requirements Categorization and Misuse Cases." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5896.

Full text
Abstract:
Context: Security Requirements engineering is necessary to achieve secure software systems. Many techniques and approaches have been proposed to elicit security requirements in the initial phases of development. With the growing importance of security and immense increase in security breaches over the past few years, researchers and practitioners have been striving to achieve a mature process of coping with security requirements. Much of the activities in this regard are seen in academia but industry still seems to be lacking in giving the required importance to security requirements engineering. That is why, security requirements engineering is still not always considered as a central part of requirements engineering. This study is targeted to bridge this gap between academia and industry in terms of security requirements engineering and to provide a concrete approach to efficiently elicit and specify security requirements. The Misuse case technique is proposed for this purpose. However it lacks in providing guidelines for enabling scalable use. This limitation has been addressed to achieve a mature process of security requirements elicitation. Objectives: In this study, we propose a framework to elicit security requirements early in the software development using misuse case technique. Objective is to make misuse case technique scalable and applicable to the real-world projects. The proposed framework was presented to two representatives from the Swedish Armed Forces (SWAF). The feedback received from the representatives was utilized to refine, update and finalize the framework. Methods: The study involved a systematic review to gain an insight of the academic perspective in the area of study. Document extraction was adopted to observe the industrial trends in the said subject. These were the software requirements specification documents of the real-world systems. Document extraction was supported with informed brainstorming because the study revolved around misuse case technique and informed brainstorming is considered to be the most suitable technique for this purpose. A workshop was conducted with two representatives of Swedish Armed Forces followed by two subsequent asynchronous communication rounds and a facilitated session to get feedback about the proposed solution. This feedback was utilized to refine, update and finalize the proposed solution. Results: The results of the systematic review were organized in tabular forms for a clear understanding and easy analysis. A security requirements categorization was obtained as a result which was finalized after an initial validation with the help of real-world projects. Furthermore, a framework was proposed utilizing this categorization to address the limitations of misuse case technique. The framework was created and refined through workshop and different communication rounds with representatives of SWAF. Their feedback was used as input to further improve the usefulness and usability aspects of the framework. Conclusions: The significance of security requirements engineering is undisputedly accepted both in academia and industry. However, the area is not a subject of practice in industrial projects. The reasons include lack of mature processes as well as expensive and time consuming solutions. Lack of empirical evidences adds to the problems. The conducted study and proposed process of dealing with this issue is considered as a one step forward towards addressing the challenges.
Säkerhet Kravhantering är nödvändigt för att uppnå säkra programvarusystem. Många tekniker och metoder har föreslagits för att framkalla säkerhetskraven i de inledande faserna i utvecklingen. Med den växande betydelsen av säkerhet och enorma ökning av brott mot säkerheten under de senaste åren har forskare och praktiker strävat efter att uppnå en mogen process för att klara säkerhetskraven. Mycket av verksamheten i detta avseende ses i den akademiska världen, men industrin fortfarande tycks saknas i att ge den nödvändiga betydelse för säkerheten kravhantering. Därför är säkerheten kravhantering fortfarande inte alltid som en central del av kravhantering. Denna studie är inriktad att överbrygga denna klyfta mellan akademi och näringsliv när det gäller säkerhet kravhantering och att ge en konkret strategi för att effektivt få fram och specificera säkerhetskrav. Missbruk fallet tekniken föreslås för detta ändamål. Men det saknar i att ge riktlinjer för att möjliggöra skalbar användning. Denna begränsning har åtgärdats för att uppnå en mogen process av säkerhetskrav elicitation.
+46 (0) 735 84 12 97, +46 (0) 760 60 96 55
APA, Harvard, Vancouver, ISO, and other styles
9

Erturk, Volkan. "A Framework Based On Continuous Security Monitoring." Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/12610139/index.pdf.

Full text
Abstract:
Continuous security monitoring is the process of following up the IT systems by collecting measurements, reporting and analysis of the results for comparing the security level of the organization on continuous time axis to see how organizational security is progressing in the course of time. In the related literature there is very limited work done to continuously monitor the security of the organizations. In this thesis, a continuous security monitoring framework based on security metrics is proposed. Moreover, to decrease the burden of implementation a software tool called SecMon is introduced. The implementation of the framework in a public organization shows that the proposed system is successful for building an organizational memory and giving insight to the security stakeholders about the IT security level in the organization.
APA, Harvard, Vancouver, ISO, and other styles
10

Murufu, Mufudzi Anesu Chapman. "Development of an M-commerce security framework." Thesis, University of Fort Hare, 2014. http://hdl.handle.net/10353/833.

Full text
Abstract:
Research shows how M-Commerce has managed to find its way to previously inaccessible parts of the world as a major Information and Communication Technologies (ICT) tool for development due to widespread introduction of mobile phones in remote areas. M-Commerce has offered valuable advantages: anytime, anywhere, more personal, more location-aware, more context-aware, more age aware, always online and instant connectivity. But this is not without its problems, of which security is high on the list. The security issues span the whole M-Commerce spectrum, from the top to the bottom layer of the OSI network protocol stack, from machines to humans. This research proposes a threat-mitigation modular framework to help address the security issues lurking in M-Commerce systems being used by marginalised rural community members. The research commences with a literature survey carried out to establish security aspects related to M-Commerce and to determine requirements for a security framework. The framework classifies M-Commerce security threat-vulnerability-risks into four levels: human behaviour and mobile device interaction security, mobile device security, M-Commerce access channel security, wireless network access security. This is followed by a review of the supporting structures or related frameworks that the proposed framework could leverage to address security issues on M-Commerce systems as ICT4D initiatives. The proposed security framework based on the requirements discovered is then presented. As a proof-of-concept, a case study was undertaken at the Siyakhula Living Lab at Dwesa in the Eastern Cape province of South Africa in order to validate the components of the proposed framework. Following the application of the framework in a case study, it can be argued that the proposed security framework allows for secure transacting by marginalised users using M-Commerce initiatives. The security framework is therefore useful in addressing the identified security requirements of M-Commerce in ICT4D contexts.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security Framework"

1

A, LaMacchia Brian, ed. .NET framework security. Boston: Addison-Wesley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

(Corporation), NIIT, ed. Microsoft .NET Framework security. Cincinnati, Ohio: Premier Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Victoria. Office of the Auditor-General. WoVG information security management framework. Melbourne, Vic: Victorian Government Printer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Data Security Council of India. DSCI security framework: Best practices. New Delhi: Data Security Council of India, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Alsmadi, Izzat, Chuck Easttom, and Lo’ai Tawalbeh. The NICE Cyber Security Framework. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41987-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Alsmadi, Izzat. The NICE Cyber Security Framework. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02360-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Peikari, Cyrus. Windows .NET server security handbook. Upper Saddle River, NJ: Prentice Hall, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Macedonia) NATO Advanced Research Workshop on Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework (2013 Ohrid. Cyber security and resiliency policy framework. Amsterdam: IOS Press, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Institute for Defence Studies and Analyses, ed. Cooperative security framework for South Asia. New Delhi: Published by Pentagon Press in association with Institute for Defence Studies and Analyses, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Buzan, Barry. Security: A new framework for analysis. Boulder, Colo: Lynne Rienner Pub., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security Framework"

1

Esakova, Nataliya. "Theoretical framework." In European Energy Security, 35–133. Wiesbaden: VS Verlag für Sozialwissenschaften, 2012. http://dx.doi.org/10.1007/978-3-531-19201-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Werther-Pietsch, Ursula. "Changed Geopolitical Framework." In Transforming Security, 89–100. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87097-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ma, Jianfeng, Changguang Wang, and Zhuo Ma. "Security Architecture Framework." In Security Access in Wireless Local Area Networks, 29–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00941-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Freeman, Adam, and Steven Sanderson. "Security and Vulnerability." In Pro ASP.NET MVC 3 Framework, 711–30. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3405-0_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Alsmadi, Izzat. "Cyber Security Management." In The NICE Cyber Security Framework, 243–51. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02360-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sanderson, Steven. "Security and Vulnerability." In Pro ASP.NET MVC 2 Framework, 563–83. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-2887-5_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Alsmadi, Izzat. "Information Systems Security Management." In The NICE Cyber Security Framework, 31–53. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41987-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Turns, David, and Anicée Van Engeland. "The legal framework for security." In Managing Security, 46–59. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003137061-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shivakumar, Shailesh Kumar. "Digital Workplace Security Framework." In Build a Next-Generation Digital Workplace, 265–301. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5512-4_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Trivellato, Daniel, Sandro Etalle, Erik Luit, and Nicola Zannone. "The POLIPO Security Framework." In Situation Awareness with Systems of Systems, 189–208. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-6230-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security Framework"

1

Backes, Michael, Sven Bugiel, Sebastian Gerling, and Philipp von Styp-Rekowsky. "Android security framework." In the 30th Annual Computer Security Applications Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2664243.2664265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fielden, Kay. "Information security framework." In 2010 International Conference on Information Society (i-Society 2010). IEEE, 2010. http://dx.doi.org/10.1109/i-society16502.2010.6018758.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Yazhe, Shunan Ma, and Lei Ren. "A Security Framework for Cloud Manufacturing." In ASME 2014 International Manufacturing Science and Engineering Conference collocated with the JSME 2014 International Conference on Materials and Processing and the 42nd North American Manufacturing Research Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/msec2014-4082.

Full text
Abstract:
Cloud manufacturing has been considered as a promising new service-oriented manufacturing paradigm that can transform traditional industry. However security is one of the major issues which hamper the growth of cloud manufacturing industry. In this paper, we analyze the cloud manufacturing security issues and challenges, and propose a security framework for cloud manufacturing, which includes four levels: infrastructure security, identity and access management, data protection and security, and cloud security as a service. The Infrastructure security level can ensure an organization’s core IT infrastructure security at the network, host, and application levels; Identity and access management level can improve operational efficiency and to comply with privacy and data protection requirements; Data protection and security level can help users evaluate their data security scenarios and make informed judgments regarding risk for their organizations; security as a service level, which includes web security service, storage security service and IAM(Identity and Access Management) service, would extract security functions and capacities to assemble software as a service. The cloud manufacturing security framework we proposed can resolve the security issues and improve the security performance of cloud manufacturing industry.
APA, Harvard, Vancouver, ISO, and other styles
4

Persch, Henrique, Lisandra Fontoura, and Adriano Fontoura. "SPRO: Security Process Framework." In The 31st International Conference on Software Engineering and Knowledge Engineering. KSI Research Inc. and Knowledge Systems Institute Graduate School, 2019. http://dx.doi.org/10.18293/seke2019-015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"Security framework of AeroMACS." In 2013 Integrated Communications, Navigation and Surveillance Conference (ICNS). IEEE, 2013. http://dx.doi.org/10.1109/icnsurv.2013.6548591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tunc, Cihan, Salim Hariri, Mheni Merzouki, Charif Mahmoudi, Frederic J. De Vaulx, Jaafar Chbili, Robert Bohn, and Abdella Battou. "Cloud Security Automation Framework." In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W). IEEE, 2017. http://dx.doi.org/10.1109/fas-w.2017.164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ohki, Eijiroh, Yonosuke Harada, Shuji Kawaguchi, Tetsuo Shiozaki, and Tetsuyuki Kagaya. "Information security governance framework." In the first ACM workshop. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1655168.1655170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ko, Hoon, and Carlos Ramos. "A Study on Security Framework for Ambient Intelligent Environment (ISyRAmISF: ISyRAmI Security Framework)." In 2009 Fifth International Conference on Wireless and Mobile Communications. IEEE, 2009. http://dx.doi.org/10.1109/icwmc.2009.22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Satoh, Fumiko, and Yumi Yamaguchi. "Generic Security Policy Transformation Framework for WS-Security." In IEEE International Conference on Web Services (ICWS 2007). IEEE, 2007. http://dx.doi.org/10.1109/icws.2007.92.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hartog, Tim, and Geert Kleinhuis. "Security analysis of the Dependability, Security Reconfigurability framework." In 2008 Third International Conference on Risks and Security of Internet and Systems( CRiSIS). IEEE, 2008. http://dx.doi.org/10.1109/crisis.2008.4757468.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security Framework"

1

Detry, Richard J., Stephen D. Kleban, and Patrick C. Moore. The Generalized Security Framework. Office of Scientific and Technical Information (OSTI), June 2001. http://dx.doi.org/10.2172/784196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Housley, R. Security Label Framework for the Internet. RFC Editor, May 1993. http://dx.doi.org/10.17487/rfc1457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fang, L., ed. Security Framework for MPLS and GMPLS Networks. RFC Editor, July 2010. http://dx.doi.org/10.17487/rfc5920.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fang, L., B. Niven-Jenkins, S. Mansfield, and R. Graveman, eds. MPLS Transport Profile (MPLS-TP) Security Framework. RFC Editor, April 2013. http://dx.doi.org/10.17487/rfc6941.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lopez, D., E. Lopez, L. Dunbar, J. Strassner, and R. Kumar. Framework for Interface to Network Security Functions. RFC Editor, February 2018. http://dx.doi.org/10.17487/rfc8329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Research Institute (IFPRI), International Food Policy. Food security stocks and the WTO legal framework. Washington, DC: International Food Policy Research Institute, 2017. http://dx.doi.org/10.2499/9780896292499_09.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Glunz, Matthew P. The Framework for US-Canada Defense and Security Cooperation. Fort Belvoir, VA: Defense Technical Information Center, March 2007. http://dx.doi.org/10.21236/ada493562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Flom, Hernán. The Political Economy of Citizen Security: A Conceptual Framework. Inter-American Development Bank, January 2018. http://dx.doi.org/10.18235/0001237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fang, L., ed. Security Framework for Provider-Provisioned Virtual Private Networks (PPVPNs). RFC Editor, July 2005. http://dx.doi.org/10.17487/rfc4111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

AIR FORCE ACADEMY COLORADO SPRINGS CO. An Environmental Security Information Framework For Contingency Operations Overseas. Fort Belvoir, VA: Defense Technical Information Center, April 1998. http://dx.doi.org/10.21236/ada367347.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography