5,052 Hits in 3.7 sec

Rethinking the Meaning of Cloud Computing for Health Care: A Taxonomic Perspective and Future Research Directions

Fangjian Gao, Scott Thiebes, Ali Sunyaev
2018 Journal of Medical Internet Research  
With the taxonomy, we focus on conceptualizing the relevant properties of cloud computing for service delivery to health care organizations and highlighting their specific meanings for health care.  ...  Methods: We employed a 2-stage approach in developing a taxonomy of cloud computing services for health care organizations.  ...  Conflicts of Interest None declared.  ... 
doi:10.2196/10041 pmid:29997108 pmcid:PMC6060303 fatcat:tmyr2unhxfhlbm7tke4dlypn5q

A survey of cloud computing taxonomies: Rationale and overview

Fahad Polash, Abdullah Abuhussein, Sajjan Shiva
2014 The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014)  
security taxonomies.  ...  It provides researchers with a tool to focus on the aspects that eliminate research gaps. This paper presents a survey of the existing cloud computing taxonomies for various purposes.  ...  CLOUD COMPUTING TAXONOMY CLASSIFICATION A well-established CC taxonomy can visibly and intelligibly shape a strong data management for all the concepts.  ... 
doi:10.1109/icitst.2014.7038856 dblp:conf/icitst/PolashAS14 fatcat:ru3via5h3vdzli6zjp2ipaq2wm

How to Quantify the Security Level of Embedded Systems? A Taxonomy of Security Metrics [article]

Ángel Longueira-Romero, Rosa Iglesias, David Gonzalez, Iñaki Garitano
2021 arXiv   pre-print
This paper analyzes the features that a good security metric should exhibit, introduces a taxonomy for classifying them, and finally, it carries out a literature survey on security metrics for the security  ...  This work aims to lay the foundations for constructing a security evaluation methodology that uses metrics to quantify the security level of an ES.  ...  SECURITY METRICS AND TAXONOMY In this section, the results of a literature review about security metrics, and a new taxonomy for security metrics are described. A.  ... 
arXiv:2112.05475v1 fatcat:bqsudvz2gff7vdkkenjxi5ma5q

High-Assurance Separation Kernels: A Survey on Formal Methods [article]

Yongwang Zhao, David Sanan, Fuyuan Zhang, Yang Liu
2017 arXiv   pre-print
Based on the proposed analytical framework, a taxonomy is designed according to formal methods application, functionalities, and properties of separation kernels.  ...  Formal methods are mandated by the security/safety certification of separation kernels and have been carried out since this concept emerged.  ...  Whilst the Common Criteria (CC) [National Security Agency 2012] provides guidelines for security-critical systems.  ... 
arXiv:1701.01535v1 fatcat:wivlgaqkmffc5nb2kalmpy77sy

A new Systemic Taxonomy of Cyber Criminal activity

Matej Babič, Damir Purković
2020 Politehnika  
We develop a new method for estimating the fractal dimension of networks to explore a new taxonomy of Cybercrime activity.  ...  Cybercrime Science combines the methodology of Crime Science with the technology of Information Security.  ...  Table 1 presents a fractal dimension of proposed taxonomy of cybercrime activity (Taxonomy CC) and another three existing taxonomy and its topological properties.  ... 
doi:10.36978/cte.4.1.2 fatcat:n7p3dt47gfahlosgtihkz4fx2u

Ontology-Based Security Problem Definition and Solution for the Common Criteria Compliant Development Process

Andrzej Bialas
2009 2009 Fourth International Conference on Dependability of Computer Systems  
The paper shows how to apply a new ontology-based approach to the security problem definition (SPD), which is the key stage of the IT security development process compliant with the ISO/IEC 15408 Common  ...  The paper gives some examples concerning a simple firewall, summarizes the results and experiences, and defines the plans of future works.  ...  All concepts, instances and their properties can be considered as the knowledge base dealing with a CC-compliant IT security development domain.  ... 
doi:10.1109/depcos-relcomex.2009.15 dblp:conf/depcos/Bialas09 fatcat:dl5o3d732bdjrebplldqzv4fwm

Trust as a facilitator in cloud computing: a survey

Sheikh Habib, Sascha Hauke, Sebastian Ries, Max Mühlhäuser
2012 Journal of Cloud Computing: Advances, Systems and Applications  
We identify the essential properties and corresponding research challenges to integrate the QoS+ parameters into trust and reputation systems.  ...  Trust-aided unified evaluation framework by leveraging trust and reputation systems can be used to assess trustworthiness (or dependability) of Cloud providers.  ...  Acknowledgements This work is supported by Center for Advanced Security Research Darmstadt (CASED).  ... 
doi:10.1186/2192-113x-1-19 fatcat:pgnqlqjq7rgetn3mwppipg5ere

A Survey on Proxy Re-Signature Schemes for Translating One Type of Signature to Another

Shilpa Chaudhari, R. Aparna, Archana Rane
2021 Cybernetics and Information Technologies  
Blaze-Bleumer-Strauss discussed PRS in 1998 for translating a signature on a message from Alice into a signature from Bob on the same message at semi-trusted proxy which does not learn any signing-key  ...  This article provides a survey summarizing and organizing PRS-related research by developing eight-dimensional taxonomy reflecting the directional feature, re-transformation capability, re-signature key  ...  The authors of (S u n i t h a and A m b e r k e r [47] ) propose forward-secure PRS as a solution for design of multi-use unidirectional PRS problem using the property of forward-security based on the  ... 
doi:10.2478/cait-2021-0028 fatcat:47x4h2numbgx5duo6sdbcaqake

Survey and Classification of Automotive Security Attacks

Florian Sommer, Jürgen Dürrwang, Reiner Kriesten
2019 Information  
In order to be able to use the information that security attacks can provide for the development of security concepts and for testing automotive systems, we propose a comprehensive taxonomy with degrees  ...  However, in this paper we show that the existing taxonomies were not designed for application in the automotive development process and therefore do not provide enough degree of detail for supporting development  ...  Acknowledgments: We thank the reviewers for their inspiring comments. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/info10040148 fatcat:5t6rytnmgjc6hnylaq5rcia474

Taxonomy of SSL/TLS Attacks

Keerthi Vasan K., Arun Raj Kumar P.
2016 International Journal of Computer Network and Information Security  
A novel taxonomy of the attacks against SSL/TLS has been proposed in this paper. Index Terms-SSL/TLS, vulnerabilities, Man-In-The-Middle (MITM) attack, mitigations, taxonomy of attacks. 10.  ...  Change cipher specification: Both server and client agree to work using the decided parameters such as Taxonomy of SSL/TLS Attacks  ...  Computer Network and Information Security, 2016, 2, 15-24 Fig. 2 . 2 Taxonomy of SSL/TLS Attacks 2 . 2 Pseudo-random number generation algorithm used as seed for RC4 can is vulnerable by performing  ... 
doi:10.5815/ijcnis.2016.02.02 fatcat:uwdcva2fq5c5xcgqpuqhocanyy

Common Criteria Related Security Design Patterns for Intelligent Sensors—Knowledge Engineering-Based Implementation

Andrzej Bialas
2011 Sensors  
The paper presents the background and results of the previous research on patterns-based security specifications and introduces a new ontological approach.  ...  The contribution of the paper concerns the application of the knowledge engineering methodology to the previously developed Common Criteria compliant and pattern-based method for intelligent sensor security  ...  Acknowledgments This work was conducted using the Protégé resource, which is supported by the grant LM007885 from the United States National Library of Medicine.  ... 
doi:10.3390/s110808085 pmid:22164064 pmcid:PMC3231747 fatcat:aqdmig7jgrgcvhbgdwus43op6m

Can We Ever Build Survivable Systems from COTS Components? [chapter]

Howard F. Lipson, Nancy R. Mead, Andrew P. Moore
2002 Lecture Notes in Computer Science  
This paper describes a risk-mitigation framework for deciding when and how COTS components can be used to build survivable systems.  ...  Much of the literature on COTS-based systems concedes that such systems are not suitable for mission-critical applications.  ...  Carol A. Sledge, a colleague at the Software Engineering Institute, for her valuable comments and suggestions based on her review of an earlier draft of this paper.  ... 
doi:10.1007/3-540-47961-9_17 fatcat:tsp3uteffnawrndf3rl6rfir24

System Security Assurance: A Systematic Literature Review [article]

Ankur Shukla, Basel Katt, Livinus Obiora Nweke, Prosper Kandabongee Yeng, Goitom Kahsay Weldehawaryat
2021 arXiv   pre-print
In this paper, extensive efforts havebeen made to study the state-of-the-art, limitations and future research directions for security assurance of the ICT and cyber-physicalsystems (CPS) in a wide range  ...  Security assurance provides the confidence that security features, practices, procedures, and architecture of software systems mediateand enforce the security policy and are resilient against security  ...  a taxonomy on system security assurance.  ... 
arXiv:2110.01904v1 fatcat:nklqmfrzjnfh3oo3dqfgziqfmq

Vulnerability Assessment of Sensor Systems

Andrzej Bialas
2019 Sensors  
Security assurance is a key issue for sensors and for other information technology (IT) products.  ...  There are more and more applications of sensors in today's world. Moreover, sensor systems are getting more complex and they are used for many high-risk security-critical purposes.  ...  Acknowledgments: The author wishes to thank Barbara Flisiuk for language verification of this paper. Conflicts of Interest: The author declares no conflict of interest.  ... 
doi:10.3390/s19112518 fatcat:ioomyz6w4rcejga3dyv3rx3vdu

Security in cloud computing: A mapping study

Zapata Cruz, José Fernández-Alemán, Ambrosio Toval
2015 Computer Science and Information Systems  
A number of cloud applications are currently widely used. However, one of the main reasons for the slowing down in the growth of cloud computing is that of security.  ...  Our results demonstrate that cloud computing seems to be a promising area for security research and evaluation.  ...  This research is part of the projects PEGASO-PANGEA (TIN2009-13718-C02-02) financed by the Spanish Ministry of Science and Innovation (Spain), and GEODAS-REQ project (TIN2012-37493-C03-02) financed by  ... 
doi:10.2298/csis140205086c fatcat:32uf4tsu2ndqfkk3uhlbvgonya
« Previous Showing results 1 — 15 out of 5,052 results