To see the other types of publications on this topic, follow the link: Security Framework.

Journal articles on the topic 'Security Framework'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security Framework.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Szpyra, Ryszard. "Military Security within the Framework of Security Studies: Research Results." Connections: The Quarterly Journal 13, no. 3 (2014): 59–82. http://dx.doi.org/10.11610/connections.13.3.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Balaji, K., and S. S. Manikandasaran. "Data Security and Deduplication Framework for Securing and Deduplicating Users’ Data in Public and Private Cloud Environment." Journal of Scientific Research 14, no. 1 (January 1, 2022): 153–65. http://dx.doi.org/10.3329/jsr.v14i1.54063.

Full text
Abstract:
Maintaining the security of data stored in the public or private cloud is a more tedious task. The cloud is the only arrangement for storing enormous amounts of data, but there is a possibility of storing the same data more than once. The traditional security system generates different unreadable data for the same readable content of a file. Therefore, it is necessary to address data security of the cloud and duplication in cloud storage. This paper concentrates on developing a data security and deduplication framework with different security techniques and mechanisms to address the said difficulties in the cloud. The framework proposed in this paper focuses on reducing security vulnerability as well as data duplication. The paper describes the components used in the frameworks. The main research contribution of the framework is having enhanced the convergent encryption technique, key generation techniques, and deduplication mechanism for maintaining a single copy of data in the cloud. The proposed framework’s efficiency is measured by implementing the work by developing a cloud-based application that coded for all the procedures of the proposed framework and tested in the cloud environment.
APA, Harvard, Vancouver, ISO, and other styles
3

Jain, Smriti, and Maya Ingle. "Generalized Software Security Framework." International Journal on Advanced Science, Engineering and Information Technology 1, no. 4 (2011): 413. http://dx.doi.org/10.18517/ijaseit.1.4.84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sterlicchi, John. "Security framework from Microsoft." Network Security 1996, no. 7 (July 1996): 7–8. http://dx.doi.org/10.1016/1353-4858(96)83735-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

K.N., Sunilkumar. "Security Framework for Physiological Signals Using Auto Encoder." Journal of Advanced Research in Dynamical and Control Systems 12, no. 01-Special Issue (February 13, 2020): 583–92. http://dx.doi.org/10.5373/jardcs/v12sp1/20201107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rizvi, Syed, Jungwoo Ryoo, John Kissell, William Aiken, and Yuhong Liu. "A security evaluation framework for cloud security auditing." Journal of Supercomputing 74, no. 11 (May 2, 2017): 5774–96. http://dx.doi.org/10.1007/s11227-017-2055-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Changchit, Chuleeporn. "Security Systems Framework, Security-Related Research, Web Threats." Journal of Information Privacy and Security 7, no. 4 (October 2011): 1–2. http://dx.doi.org/10.1080/15536548.2011.10855920.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lipiński, Bartosz, Wojciech Mazurczyk, Krzysztof Szczypiorski, and Piotr Śmietanka. "Towards Effective Security Framework for Vehicular Ad-Hoc Networks." Journal of Advances in Computer Networks 3, no. 2 (2015): 134–40. http://dx.doi.org/10.7763/jacn.2015.v3.155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pacheco, Jesus, Victor H. Benitez, and Zhiwen Pan. "Security Framework for IoT End Nodes with Neural Networks." International Journal of Machine Learning and Computing 9, no. 4 (August 2019): 381–86. http://dx.doi.org/10.18178/ijmlc.2019.9.4.814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Creado, Orhio Mark, Bala Srinivasan, Phu Dung Le, and Jeff Tan. "The Ideal Computing System Framework – A Novel Security Paradigm." SIJ Transactions on Computer Science Engineering & its Applications (CSEA) 02, no. 04 (August 7, 2014): 94–103. http://dx.doi.org/10.9756/sijcsea/v2i4/0203270402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Pati, Sharanappa. "Isms Framework in Design and Analysis of Information Security." Paripex - Indian Journal Of Research 3, no. 7 (January 1, 2012): 215–17. http://dx.doi.org/10.15373/22501991/july2014/86.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Lee, Ji-Yong. "China’s Maritime Ambition, Security Dilemma and Lack of Multilateral Framework." Journal of Asian Security and International Affairs 8, no. 2 (July 28, 2021): 195–217. http://dx.doi.org/10.1177/23477970211017729.

Full text
Abstract:
The security environment of the South China Sea has been disrupted as China strengthens its efforts at maritime ambition. The recent security situation in the Asia-Pacific, particularly the South China Sea, is characterised by arms building and balancing against China. It raises the possibility of conflict. For securing stability and peace, it is time to bring multilateralism back in, since a multilateral security framework contributes to taking the edge off power politics. However, there is no reliable multilateral framework to deal with the declining maritime security environment. This article highlights the lack of a multilateral framework and suggests an eclectic approach to multilateralism for securing the Asia-Pacific maritime order.
APA, Harvard, Vancouver, ISO, and other styles
13

Atoum, Issa, Ahmed Otoom, and Amer Abu Ali. "A holistic cyber security implementation framework." Information Management & Computer Security 22, no. 3 (July 8, 2014): 251–64. http://dx.doi.org/10.1108/imcs-02-2013-0014.

Full text
Abstract:
Purpose – The purpose of this paper is to propose a holistic cyber security implementation framework (HCS-IF) that lays out the ground for a conceptual, coherent, systematic, overarching and consolidated approach to implement cyber security strategies (CSSs). Design/methodology/approach – The HCS-IF is conceptually proposed to address the actual needs that are extracted from literature review. The HCS-IF uses and integrates a set of high-level conceptual security controls, solutions, processes, entities, tools, techniques or mechanisms that are already known in the domains of information security management, software engineering and project management to address the identified needs. Findings – The HCS-IF components and controls collectively interact and cooperate to implement CSSs. The proposed framework is compared with other related frameworks, and the results show that the HCS-IF outperforms other frameworks on most of the suggested comparison criteria. Originality/value – From a practical standpoint, governments and practitioners alike stand to gain from the findings of this research. Governments who want to implement CSSs on a national level will find the proposed framework useful in overseeing cyber security implementation. Practitioners will be prepared to address the anticipated cyber security implementation challenges and the required controls needed to facilitate cyber-security implementation in a holistic overarching manner.
APA, Harvard, Vancouver, ISO, and other styles
14

Sun, Linhui, Xun Li, Jie Gao, and Fangming Cheng. "Does an Information System Security Notice Format Influence Users’ Compliance Willingness from the Perspective of the Framing Effect?" Information 14, no. 1 (January 9, 2023): 39. http://dx.doi.org/10.3390/info14010039.

Full text
Abstract:
Information security issues have triggered both academic and practical circles to think about operation management and the sustainable development of information systems. Based on the theory of framing effect, this study constructs a theoretical model of the presentation framework of security notice information on users’ compliance willingness and empirically tests the proposed research hypotheses using a combination of behavioral experiments and questionnaires to analyze the mechanism of the information presentation framework on compliance willingness. The results show that (1) the information presentation framework has a significant effect on users’ decision to comply, but it varies according to specific frameworks. While the attribute and risk frameworks have a significant effect on users’ decision to comply, the goal framework does not have a significant effect on users’ decision to comply. (2) The security notice situation moderates the relationship between the security notice information presentation frame and users’ compliance willingness, but this varies according to the specific situation of the specific framework. The security notice situation moderates the relationship between the attribute framework, the risk framework, and users’ compliance willingness but not the relationship between the goal framework and users’ compliance willingness. (3) Information security cognition has a moderating effect on the relationship between the security notice presentation framework and users’ compliance willingness, but it varies by the specific frameworks. Information security cognition moderates the relationship between attribute frames, risk frames, and users’ compliance willingness but not the relationship between goal frames and users’ compliance willingness.
APA, Harvard, Vancouver, ISO, and other styles
15

Pathak, Vinay, Karan Singh, Sudhanshu Aggarwal, and Anshita Dhoot. "Ensuring security framework for WBANs." Journal of Discrete Mathematical Sciences and Cryptography 24, no. 3 (January 19, 2021): 697–710. http://dx.doi.org/10.1080/09720529.2020.1822542.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Muhammad Sani, Habiba, and Muhammad Mika'ilu Yabo. "A Database System Security Framework." International Journal of Computer Science and Information Technology 7, no. 6 (December 31, 2015): 165–74. http://dx.doi.org/10.5121/ijcsit.2015.7614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Alqahtani, Jawaher. "Security Framework for Cloud Computing." IARJSET 6, no. 12 (December 30, 2019): 27–31. http://dx.doi.org/10.17148/iarjset.2019.61207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Jing, Huiyun, Wei Wei, Chuan Zhou, and Xin He. "An Artificial Intelligence Security Framework." Journal of Physics: Conference Series 1948, no. 1 (June 1, 2021): 012004. http://dx.doi.org/10.1088/1742-6596/1948/1/012004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

IORDACHE, Dorin. "INTERNET OF THINGS SECURITY FRAMEWORK." STRATEGIES XXI - Security and Defense Faculty 17, no. 1 (November 1, 2021): 287–93. http://dx.doi.org/10.53477/2668-2001-21-36.

Full text
Abstract:
It was unimaginable for a non-professional user that access data to personal e-mail, bank or identity accounts could be stolen via a mobile phone interface or connection, no more than twenty years ago. Nowadays, people with bad intentions – hacker – can use smart devices, such as: webcams, microwaves, refrigerators, door controllers, and others, generically we named it IoT[1], to access accounts like the ones mentioned above, without much effort. The Internet of Things is the place where devices are digitally interconnected, interacts with almost every domain. IoT development is closely correlated with growing of Internet. These issues have generated an unprecedented upward trend in Wi-Fi and IoT interconnecting networks. Cyber-security has gained new meanings because of the increasing number and scope of IoT devices. By developing these devices, especially among regular users, it is necessary to improve their security more than ever. How prepared are regular users and how can they protect themselves in the context of IoT penetration into their daily lives? it is a question that needs to be answered, in terms of the actions it can take immediately or in the long run. [1] IoT - Internet of Things
APA, Harvard, Vancouver, ISO, and other styles
20

Chemerkin, Yury. "Increasing Security Guidelines’ Framework Efficiency." International Journal for Information Security Research 3, no. 4 (December 1, 2013): 354–63. http://dx.doi.org/10.20533/ijisr.2042.4639.2013.0041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Gulati, Aayush. "Proposing Security Requirement Prioritization Framework." International Journal of Computer Science, Engineering and Applications 2, no. 3 (June 30, 2012): 27–37. http://dx.doi.org/10.5121/ijcsea.2012.2303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Veiga, A. Da, and J. H. P. Eloff. "An Information Security Governance Framework." Information Systems Management 24, no. 4 (October 2, 2007): 361–72. http://dx.doi.org/10.1080/10580530701586136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Choi, Seongho, and Jin Kwak. "Enhanced SDIoT Security Framework Models." International Journal of Distributed Sensor Networks 12, no. 5 (January 2016): 4807804. http://dx.doi.org/10.1155/2016/4807804.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Yu, Yang, Yu Nan Wang, and Wei Yang. "Security Framework Based on SDN." Advanced Materials Research 989-994 (July 2014): 4690–93. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4690.

Full text
Abstract:
With the growing demand for information, it has a strategic importance for the future of sustainable development how to create a safe and robust network system to ensure the security of important information. Intrusion detection technology can proactively react against intrusion behavior and adjust its strategies in time. So it provides an effective means for network security to minimize or avoid loss when network system is attacked. It is an important part of network security system. This article first explains the current framework and the working principle of SDN. Then it explains the existing security threats of current framework. Next intrusion detection system based on SDN is proposed after the introduction of the intrusion detection system. And we made experiments to verify it. Finally we analyze the lack of the structure and propose some improvements.
APA, Harvard, Vancouver, ISO, and other styles
25

Pfleeger, Shari Lawrence. "A framework for security requirements." Computers & Security 10, no. 6 (October 1991): 515–23. http://dx.doi.org/10.1016/0167-4048(91)90076-p.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kim, Geunhye, and Mina Shim. "System security manager education framework." International Journal of Services Technology and Management 23, no. 1/2 (2017): 64. http://dx.doi.org/10.1504/ijstm.2017.081877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Kim, Geunhye, and Mina Shim. "System security manager education framework." International Journal of Services Technology and Management 23, no. 1/2 (2017): 64. http://dx.doi.org/10.1504/ijstm.2017.10002704.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Yousif, Samar Taha, and Zaid Abass Fadahl. "Proposed Security Framework for Mobile Data Management System." Journal of Engineering 27, no. 7 (July 1, 2021): 13–23. http://dx.doi.org/10.31026/j.eng.2021.07.02.

Full text
Abstract:
Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fundamental security functions demanded by organizations and whether these functions have been securely developed. Therefore, this paper proposes a security framework for mobile data that combines core security mechanisms to avoid these problems and protects sensitive information without spending time and money deploying several new applications.
APA, Harvard, Vancouver, ISO, and other styles
29

Rehman, Shafiq, and Volker Gruhn. "An Effective Security Requirements Engineering Framework for Cyber-Physical Systems." Technologies 6, no. 3 (July 12, 2018): 65. http://dx.doi.org/10.3390/technologies6030065.

Full text
Abstract:
Context and motivation: Cyber-Physical Systems (CPSs) are gaining priority over other systems. The heterogeneity of these systems increases the importance of security. Both the developer and the requirement analyst must consider details of not only the software, but also the hardware perspective, including sensor and network security. Several models for secure software engineering processes have been proposed, but they are limited to software; therefore, to support the processes of security requirements, we need a security requirements framework for CPSs. Question/Problem: Do existing security requirements frameworks fulfil the needs of CPS security requirements? The answer is no; existing security requirements frameworks fail to accommodate security concerns outside of software boundaries. Little or even no attention has been given to sensor, hardware, network, and third party elements during security requirements engineering in different existing frameworks. Principal Ideas/results: We have proposed, applied, and assessed an incremental security requirements evolution approach, which configures the heterogeneous nature of components and their threats in order to generate a secure system. Contribution: The most significant contribution of this paper is to propose a security requirements engineering framework for CPSs that overcomes the issue of security requirements elicitation for heterogeneous CPS components. The proposed framework supports the elicitation of security requirements while considering sensor, receiver protocol, network channel issues, along with software aspects. Furthermore, the proposed CPS framework has been evaluated through a case study, and the results are shown in this paper. The results would provide great support in this research direction.
APA, Harvard, Vancouver, ISO, and other styles
30

Nur, Rofil M., Jufriadif Na'am, Gunadi Widi Nurcahyo, and Syafri Arlis. "Peningkatan Keamanan Website Menggunakan Metode XML dengan Framework Codeigniter." Indonesian Journal of Computer Science 8, no. 2 (October 31, 2019): 156–63. http://dx.doi.org/10.33022/ijcs.v8i2.188.

Full text
Abstract:
Website security is needed in the dissemination of every information and data in cyberspace now. On the previous website the security used was not optimal in securing the website so we needed a reliable website security. XML (eXtensible Markup Language) is a markup language that is designed to store and deliver data by forming its own tags as needed. Codeigniter Framework is a php framework that is open source and uses the MVC method (Model, View, Controller). codeigniter is free or not paid if you use it. Codeigniter framework is made with the same purpose as other frameworks, namely to facilitate developers or programmers in building a web-based application without having to create it from scratch. The results of testing of this method are able to help and minimize the entry of hackers and secure data that will later become information. Using this method of combining can safeguard the entry of hackers and help secure the data and information on the website.
APA, Harvard, Vancouver, ISO, and other styles
31

Abdu Al-esaiy, Mohammad, and Nagi Ali Al-Shaibany. "ANALYSIS OF INFORMATION SECURITY MANAGEMENT SYSTEM FRAMEWORKS." International Journal of Computer Science and Mobile Computing 10, no. 11 (November 30, 2021): 29–46. http://dx.doi.org/10.47760/ijcsmc.2021.v10i11.005.

Full text
Abstract:
ISMS is a set of policies, activities, and procedures implemented by the Information Security Department to maintain the confidentiality, integrity, and availability of information from threats and risks. Activities and procedures include identifying security needs, strategies required for implementation, and measuring results for security improvement. This paper aims to review the previous literature to verify the factors that affect information security management. Examination of current information security frameworks and standards, and this paper concluded that, for an organization to adopt a specific framework, this framework must be evaluated based on the security needs of the organization. The framework must include all factors that affect information security from all organizational aspects, people, and technology. Otherwise, the organization will face difficulties and obstacles in implementing the framework and improving security.
APA, Harvard, Vancouver, ISO, and other styles
32

Subramaniam, Chandrasekaran, and Vinod Duraivelu. "An Integrated Information Security Framework for a Product Development Center." Indian Journal of Applied Research 3, no. 12 (October 1, 2011): 204–6. http://dx.doi.org/10.15373/2249555x/dec2013/60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Almomani, Iman, Mohanned Ahmed, and Leandros Maglaras. "Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia." PeerJ Computer Science 7 (September 9, 2021): e703. http://dx.doi.org/10.7717/peerj-cs.703.

Full text
Abstract:
The Saudi Arabia government has proposed different frameworks such as the CITC’s Cybersecurity Regulatory Framework (CRF) and the NCA’s Essential Cybersecurity Controls (ECC) to ensure data and infrastructure security in all IT-based systems. However, these frameworks lack a practical, published mechanism that continuously assesses the organizations’ security level, especially in HEI (Higher Education Institutions) systems. This paper proposes a Cybersecurity Maturity Assessment Framework (SCMAF) for HEIs in Saudi Arabia. SCMAF is a comprehensive, customized security maturity assessment framework for Saudi organizations aligned with local and international security standards. The framework can be used as a self-assessment method to establish the security level and highlight the weaknesses and mitigation plans that need to be implemented. SCMAF is a mapping and codification model for all regulations that the Saudi organizations must comply with. The framework uses different levels of maturity against which the security performance of each organization can be measured. SCMAF is implemented as a lightweight assessment tool that could be provided online through a web-based service or offline by downloading the tool to ensure the organizations’ data privacy. Organizations that apply this framework can assess the security level of their systems, conduct a gap analysis and create a mitigation plan. The assessment results are communicated to the organization using visual score charts per security requirement per level attached with an evaluation report.
APA, Harvard, Vancouver, ISO, and other styles
34

Wang, Peng, and Li Ning Xing. "A Collaborative Framework for Information Security Management System Using Intelligent Multi-Agent." Key Engineering Materials 460-461 (January 2011): 428–32. http://dx.doi.org/10.4028/www.scientific.net/kem.460-461.428.

Full text
Abstract:
Business use of Internet has exposed security as one of the key-factors for successful online competition. There are very few sound existing ISG frameworks that can effectively guide most organizations in their information security governance endeavors. This paper presents a collaborative framework for information security management system in order to elucidate how information security should be addressed at an executive level. The advanced intelligent multi-agent technology is applied in this proposed framework. In order to evaluate the proposed framework, this paper describes a prototype system based on this proposed collaborative framework. This prototype system suggests that the proposed collaborative framework is feasible, correct and valid.
APA, Harvard, Vancouver, ISO, and other styles
35

Haufe, Knut, Ricardo Colomo-Palacios, Srdan Dzombeta, Knud Brandis, and Vladimir Stantchev. "A process framework for information security management." International Journal of Information Systems and Project Management 4, no. 4 (February 2, 2022): 27–47. http://dx.doi.org/10.12821/ijispm040402.

Full text
Abstract:
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization's information security. Key elements of the operation of an ISMS are ISMS processes. However, and in spite of its importance, an ISMS process framework with a description of ISMS processes and their interaction as well as the interaction with other management processes is not available in the literature. Cost benefit analysis of information security investments regarding single measures protecting information and ISMS processes are not in the focus of current research, mostly focused on economics. This article aims to fill this research gap by proposing such an ISMS process framework as the main contribution. It is based on a set of agreed upon ISMS processes in existing standards like ISO 27000 series, COBIT and ITIL. Within the framework, identified processes are described and their interaction and interfaces are specified. This framework helps to focus on the operation of the ISMS, instead of focusing on measures and controls. By this, as a main finding, the systemic character of the ISMS consisting of processes and the perception of relevant roles of the ISMS is strengthened.
APA, Harvard, Vancouver, ISO, and other styles
36

Paleti, Tarun, Kiran Kumar, and Shaik Riyaz. "On-line examination system of security application." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 166. http://dx.doi.org/10.14419/ijet.v7i2.8.10351.

Full text
Abstract:
Online Examination Framework is Associate in Nursing programming arrangement, That which allows any Education system or institution to orchestrate, direct and superintend exams by suggests that of an internet domain. It may be done through the Web/Intranet and/Neighborhood System things. a little of the problems confronted amid manual examination frameworks ar the postponements occured in result handling, documenting represents a difficulty, separating of records is difficult . the chance of loss of records is high in addition record seeking is difficult . repairs of the framework is in addition exceptionally difficultand takes parcel of your time and labour. on-line examination is one in all the vital elements for on-line instruction framework. it's effective, sufficiently fast and reduces the intensive live of fabric plus. Associate in Nursing examination framework is formed in light-weight of the net. This paper depicts the quality of the framework, displays the basic parts of the framework, breaks down the auto-producing check paper calculation, and talks concerning the protection of the framework.
APA, Harvard, Vancouver, ISO, and other styles
37

Singh, Anuj Kumar, and B. D. K. Patro. "Signcryption-Based Security Framework for Low Computing Power Devices." Recent Advances in Computer Science and Communications 13, no. 5 (November 5, 2020): 845–57. http://dx.doi.org/10.2174/2213275912666190617161732.

Full text
Abstract:
Background: With technological advancements, the use of many kinds of computing devices has given birth to a new era of computing. RFID tags, smart cards, and wireless sensors are the low computing power devices, which are being used massively in sensitive applications. Therefore, securing these low computing environments has become a great concern. Proposed Work: In this paper, an elliptic curve signcryption based security framework for securing low computing power devices has been proposed which provides mutual authentication, confidentiality, non-repudiation, forward secrecy, integrity, availability, key privacy, and anonymity. In addition to this, the proposed security framework has the capability to resist replay attack, desynchronization attack, impersonation attack, key-compromise attack, location tracking attack, denial of service attack, and man-in-the-middle attack. Results: Results have revealed that the proposed framework is efficient in terms of computational time as compared to the other related schemes. Conclusion: The proposed protocol presented in this paper can be used as a building block in designing efficient security protocols for all kinds of low computing power devices including RFID, wireless sensors, and smart cards.
APA, Harvard, Vancouver, ISO, and other styles
38

., Sanjeev Kumar Mandal. "ENHANCED SECURITY FRAMEWORK TO ENSURE DATA SECURITY IN CLOUD USING SECURITY BLANKET ALGORITHM." International Journal of Research in Engineering and Technology 02, no. 10 (October 25, 2013): 225–29. http://dx.doi.org/10.15623/ijret.2013.0210033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Chandan, Madhavarapu, Sanakkayala Sri Venkat Sumanth, Garapati Samhita, and Kathi Priyanka Reddy. "Design & Development of a Home Security System Using IOT." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 374. http://dx.doi.org/10.14419/ijet.v7i2.32.15717.

Full text
Abstract:
The present existing frameworks are intended for short range PAN applications that have a few constraints as of, the application is fit in with a short scope territory and the framework ends if as far as possible crosser certain incentive next is the quantity of parameters the framework screens are less and the last one is the framework is just a solitary way or a simplex correspondence framework .i.e., the past frameworks are just ready frameworks and are not controllable. As talked about over the present tasks faces certain difficulties. Henceforth to defeat those impediments this paper proposes certain adjustments to the first framework which tends the framework to enhance its execution and offer fulfilling comes about that makes the general framework simple to deal with, work and reasonable without trading off the security requirements with assist of sensors. A Microcontroller and Global system for mobile communications which is a mobile system integrated with the sensors; All this system sent an SMS for the client for alert. Then User can give instructions as required via mobile.
APA, Harvard, Vancouver, ISO, and other styles
40

Mokhtari, Fariborz. "Security in the Persian Gulf: Is a Security Framework Possible?" American Foreign Policy Interests 26, no. 1 (February 2004): 1–10. http://dx.doi.org/10.1080/10803920490425346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Bhattacharyya, Anushree. "Understanding Security in Regionalism Framework: ASEAN Maritime Security in Perspective." Maritime Affairs:Journal of the National Maritime Foundation of India 6, no. 2 (December 2010): 72–89. http://dx.doi.org/10.1080/09733159.2010.559786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Quille, Gerrard. "The European Security Strategy: a framework for EU security interests?" International Peacekeeping 11, no. 3 (August 2004): 422–38. http://dx.doi.org/10.1080/1353331042000249028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Paulus, Erick, and Mochamad Azmi Fauzan. "A Framework to Ensure Data Integrity and Safety." Data Science: Journal of Computing and Applied Informatics 2, no. 1 (February 1, 2018): 1–11. http://dx.doi.org/10.32734/jocai.v2.i1-90.

Full text
Abstract:
The technology development allows people to more easily communicate and convey information. The current communication media can facilitate its users to send and receive digital data, such as text, sound or digital image. But in terms of security, communications media not always ensure the confidentiality and authentication of data traffic. Most people rely solely on the security provided by the communications media providers in securing their data, which is essentially still inadequate. This paper presents the development of a data security framework by applying the principles of cryptography and digital signatures, such as authenticity, integrity, and data confidentiality. The application is designed using the SHA-256 algorithm as digital signature, AES algorithm as file encryption, and RSA algorithm as asymmetric key in digital file distribution and signature. Then, several simulation testing was performed to ensure the robustness of the framework. Furthermore, we also evaluated the speed of framework based on CPU and memory capacity. Based on the experiment, our proposed framework can be a reliable solution for securing data in data transaction
APA, Harvard, Vancouver, ISO, and other styles
44

Kaušpadienė, Laima, Simona Ramanauskaitė, and Antanas Čenys. "INFORMATION SECURITY MANAGEMENT FRAMEWORK SUITABILITY ESTIMATION FOR SMALL AND MEDIUM ENTERPRISE." Technological and Economic Development of Economy 25, no. 5 (June 20, 2019): 979–97. http://dx.doi.org/10.3846/tede.2019.10298.

Full text
Abstract:
Information security is one of the key concerns of an enterprise or organization. To assure suitable management of information security a list of information security management frameworks has been developed by a number of institutions and authors. A condensed information in information security management framework is very important to a small and medium enterprise as this type of enterprise usually lacks resources for information security expertise and deep analysis. Despite the fact, the information security management process and its frameworks, on the other hand, are very complex and require a big number of different elements. At the moment the comparison it is very shallow, as all properties of the comparison are treated equally important. In real life, the importance of different criteria of information security management framework and their suitability for small and medium enterprise vary. Therefore we use the Analytic Hierarchy Process to construct a hierarchy of information security management frameworks quality and applicability in small and medium enterprise and define the weights for each of the criteria. Weighted criteria express the importance of the criteria and executed the final comparison of alternatives (five information security management frameworks) is more realistic (similar to experts opinion) comparing to existing comparisons.
APA, Harvard, Vancouver, ISO, and other styles
45

Lima, António, Luis Rosa, Tiago Cruz, and Paulo Simões. "A Security Monitoring Framework for Mobile Devices." Electronics 9, no. 8 (July 25, 2020): 1197. http://dx.doi.org/10.3390/electronics9081197.

Full text
Abstract:
Quite often, organizations are confronted with the burden of managing mobile device assets, requiring control over installed applications, security, usage profiles or customization options. From this perspective, the emergence of the Bring Your Own Device (BYOD) trend has aggravated the situation, making it difficult to achieve an adequate balance between corporate regulations, freedom of usage and device heterogeneity. Moreover, device and information protection on mobile ecosystems are quite different from securing other device assets such as laptops or desktops, due to their specific characteristics and limitations—quite often, the resource overhead associated with specific security mechanisms is more important for mobile devices than conventional computing platforms, as the former frequently have comparatively less computing capabilities and more strict power management policies. This paper presents an intrusion and anomaly detection framework specifically designed for managed mobile device ecosystems, that is able to integrate into mobile device and management frameworks for complementing conventional intrusion detection systems. In addition to presenting the reference architecture for the proposed framework, several implementation aspects are also analyzed, based on the lessons learned from developing a proof-of-concept prototype that was used for validation purposes.
APA, Harvard, Vancouver, ISO, and other styles
46

Shashwat, Anurag, Deepak Kumar, and Lovneesh Chanana. "A Framework with Enhanced Security for Service Oriented Architecture." International Journal of Sensors, Wireless Communications and Control 10, no. 3 (November 2, 2020): 325–33. http://dx.doi.org/10.2174/2210327909666190710122505.

Full text
Abstract:
Background: Service Oriented Architecture is one of the acceptable frameworks for application development which provides better functionality such as composability, reliability, reusability, distributed deployment and interoperability which meet enterprises dynamics. So, SOA framework is a point of attraction for consumers. Objective: However, SOA framework fails to provide security at a granular level. Along with SOA functionality, the consumer also needs a secure environment so that each application can be reliable. Methods: SOA functionality like modularity and reusability are helpful in cross-organization context but these quality requirements reduce the security of the applications. In the past years, many security techniques have been provided by different researchers, still, security is a concern of SOA framework. Results: Most of the research focus security enhancement at higher layers of SOA reference architecture only so that SOA functionality remains unaffected. In this paper, the author(s) provided a framework which enhances the security at both the higher layer and lower layer. Conclusion: Also, this framework focuses on security enhancement at the granular level so that application-level security can be enhanced. The author(s) also included a technique to keep SLA similar to the exiting application after the implementation of security at each layer. This framework will be helpful in enhancing the end to end security and reliability of an application.
APA, Harvard, Vancouver, ISO, and other styles
47

Singh, Arunabh. "Cyber Security Frameworks." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (January 31, 2022): 590–99. http://dx.doi.org/10.22214/ijraset.2022.39843.

Full text
Abstract:
Abstract: In this paper we attempt to explain and establish certain frameworks that can be assessed for implementing security systems against cyber-threats and cyber-criminals. We give a brief overview of electronic signature generation procedures which include its validation and efficiency for promoting cyber security for confidential documents and information stored in the cloud. We strictly avoid the mathematical modelling of the electronic signature generation process as it is beyond the scope of this paper, instead we take a theoretical approach to explain the procedures. We also model the threats posed by a malicious hacker seeking to induce disturbances in the functioning of a power transmission grid via the means of cyber-physical networks and systems. We use the strategy of a load redistribution attack, while clearly acknowledging that the hacker would form its decision policy on inadequate information. Our research indicate that inaccurate admittance values often cause moderately invasive cyber-attacks that still compromise the grid security, while inadequate capacity values result in comparatively less efficient attacks. In the end we propose a security framework for the security systems utilised by companies and corporations at global scale to conduct cyber-security related operations. Keywords: Electronic signature, Key pair, sequence modelling, hacker, power transmission grid, Threat response, framework.
APA, Harvard, Vancouver, ISO, and other styles
48

Liu, Ling Xia, Dong Xia Wang, Min Huan Huang, and Rui Zhang. "An Integrated Security Framework for SOA." Applied Mechanics and Materials 427-429 (September 2013): 2151–54. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2151.

Full text
Abstract:
In today's Web environment, Service Oriented Architecture (SOA) becomes an efficient paradigm to integrate distributed applications. Due to loosely coupled nature of SOA, security is one of the most important issues that must be considered in SOA-based environments. Most of the existing security solutions are proposed only from one certain point of view, and they are difficult to integrate together. In this paper, an integrated framework for SOA are proposed to provides an overall security solution, which contains a three-dimensional security model, a security architecture and related security standards.
APA, Harvard, Vancouver, ISO, and other styles
49

Somepalli, Sri Harsha, Sai Kishore Reddy Tangella, and Santosh Yalamanchili. "Information Security Management." HOLISTICA – Journal of Business and Public Administration 11, no. 2 (August 1, 2020): 1–16. http://dx.doi.org/10.2478/hjbpa-2020-0015.

Full text
Abstract:
AbstractInformation security management is a very important issue for anyone working in the field of technology, or for anyone at risk of security breach, who understands the implications of these vulnerabilities. Many organizations are always on the constant threat of a security breach. It is easy for an organization to experience a data breach that can seriously compromise their data. With the evolving threats of data security, organizations are always working to ensure that their data is protected. Frameworks associated with information security can be pivotal to an organization. Frameworks employed in organizations helps to protect the employee and user information which is essential as it puts employees and clients at ease that their information is secure. Identifying the ideal frameworks for an organization is important. However, this process can be a bit tricky as a lot has to be considered to identify the best framework for the organization.
APA, Harvard, Vancouver, ISO, and other styles
50

Ibrahim, Maizura, Siti Nurbahyah Hamdan, Saa’idi Ismail, Mohd Fauzi Haris, Mohamad Safuan Sulaiman, Sufian Norazam Mohamed Aris, Mohd Hasnor Bin Hasan, Mohd Dzul Aiman Aslan, Nur Fatini Abdul Ghani, and Amy Hamijah Ab Hamid. "Big data analytics nuclear security framework." IOP Conference Series: Materials Science and Engineering 1106, no. 1 (March 1, 2021): 012026. http://dx.doi.org/10.1088/1757-899x/1106/1/012026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography