Filters








907,901 Hits in 6.0 sec

A method for designing secure solutions

J. J. Whitmore
2001 IBM Systems Journal  
accepted security design methods.  ...  This paper describes a systematic approach for defining, modeling, and documenting security functions within a structured design process in order to facilitate greater trust in the operation of resulting  ...  A patent application has been filed for the system and process, designated Method for Architecting Secure Solutions, or MASS.  ... 
doi:10.1147/sj.403.0747 fatcat:xhtry6g7incubcahk7usaz6vcu

Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analy ...

Emad Al Khoufi
2021 Basic and Applied Sciences - Scientific Journal of King Faisal University  
This finding helps to guide the treatment strategy for both genders.  ...  A significantly higher rate of diabetes was noted in females (62%) compared to males (48%) (p<0.012). Co-existing diabetes and hypertension was found in 70% of females as compared to 38% of males.  ...  Materials and Methods Study Design: This is an observational cross-sectional study based on a random collection of data from the electronic files of patients visiting the emergency department at the  ... 
doi:10.37575/b/med/0038 fatcat:5h5phkn4jjfvfceg4xasfjxsmy

Integrated Method for the Design and Evaluation of Safety & Secure Manufacturing Systems [article]

Kemajl Stuja, Günther Poszvek, Walter Wölfel, Erich Markl
2018 Zenodo  
Based on a product lifecycle -PL- this article introduces an integrated method for systemdesign, which supports engineering and management of safety/security for digital manufacturing systems.  ...  The outcomes of this method – integrated safety and security (ISS) - ought to help the factory designers, integrators and users for (re)designing, operating and maintaining of machines, robots as far work-cells  ...  In Figure 1 you can see the integral method for the risk analysis. This method explains the integrated method for machine safety and security for one concept solution.  ... 
doi:10.5281/zenodo.3402872 fatcat:crezl7csnzdy7ibhauplrksl5q

Software Architectural Design Meets Security Engineering

Stephan Bode, Anja Fischer, Winfried Kühnhauser, Matthias Riebisch
2009 2009 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems  
The method aims at designing a system's security architecture based on a small, precisely defined, and application-specific trusted computing base.  ...  Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements.  ...  We presented a method that guides the developer on a systematic way for the application of security principles and solutions.  ... 
doi:10.1109/ecbs.2009.17 dblp:conf/ecbs/BodeFKR09 fatcat:bhkqjxcpebhwvgfvbynenooozm

Security Levels for Web Authentication Using Mobile Phones [chapter]

Anna Vapen, Nahid Shahmehri
2011 IFIP Advances in Information and Communication Technology  
We provide a method for evaluating and designing authentication solutions using mobile phones, using an augmented version of the Electronic Authentication Guideline.  ...  While phones provide a flexible and capable platform, phone designs vary, and the security level of an authentication solution is influenced by the choice of channels and authentication methods.  ...  We propose a method for the evaluation and design of authentication solutions that use mobile phones as secure hardware devices.  ... 
doi:10.1007/978-3-642-20769-3_11 fatcat:o4vx3yhigzb5tgn4dobc2rvz5i

A Problem-Oriented Approach to Critical System Design and Diagnosis Support [chapter]

Vincent Leildé, Vincent Ribaud, Ciprian Teodorov, Philippe Dhaussy
2018 Communications in Computer and Information Science  
To cope with these constraints, the design activity should use new methods that foster knowledge sharing and reuse, in particular security problems and their solutions.  ...  In this paper, we present a problem-oriented method that follows a step-wise building of the solution.  ...  Conclusion Designing a solution for a given security problem, and diagnosing possible faults in the proposed solution, are tedious tasks.  ... 
doi:10.1007/978-3-030-02852-7_3 fatcat:3wmgobdekrggne4mussahpruna

A Review of PCI Express Protocol-Based Systems in Response to 5G Application Demand

Yen Lin, Jeng-Ywan Jeng, Yi-Yu Liu, Jheng-Jia Huang
2022 Electronics  
However, PC systems based on PCI Express, NVMe, USB, and TPM have been introduced into the market with more secure solutions, and common designs and predictable market demand can provide more reliable  ...  Based on performance and power requirements, application layer devices can use PCIe-based systems to provide secure solutions to extend 5G system reliability.  ...  For the IoT, security solutions from the secured IC will help IoT security solutions in a 5G environment [51] .  ... 
doi:10.3390/electronics11050678 fatcat:kjqxop3cqrag7ctwfh7f7diqsa

Security Via Related Disciplines

Jennifer Bayuk, Barry Horowitz, Rick Jones
2012 Procedia Computer Science  
It adapts the reactor-specific method for achieving diversity for the purposes of safety into a method for systems security engineering that may be applied generally to any system.  ...  This study follows the recommendation with a critical examination of methods for diversity in reactor protection systems where the goal is safety.  ...  A security pattern is an architecture that provides a well-proven solution for a recurring design problem.  ... 
doi:10.1016/j.procs.2012.01.070 fatcat:3mmtfsj7kvadjbktjtjnvee7gu

Re-examining the Information Systems Security Problem from a Systems Theory Perspective

Diana K. Young, Wm. Arthur Conklin, Glenn B. Dietrich
2010 Americas Conference on Information Systems  
The authors then present a proposed holistic framework for integrating security into existing systems development methods.  ...  The paper concludes with a discussion of the need for more scholarly research in this area and suggestions for future research directions are offered.  ...  These meta-requirements specify that security design methods must focus on securing systems objects by gathering specific organizational system level security requirements and then designing solutions  ... 
dblp:conf/amcis/YoungCD10 fatcat:jiarq4k7ubevbjdeg6st7v6xze

SoSPa: A system of Security design Patterns for systematically engineering secure systems

Phu H. Nguyen, Koen Yskout, Thomas Heyman, Jacques Klein, Riccardo Scandariato, Yves Le Traon
2015 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS)  
This paper presents an MDS approach based on a unified System of Security design Patterns (SoSPa).  ...  SoSPa consists of not only interrelated security design patterns but also a refinement process towards their application. We applied SoSPa to design the security of crisis management systems.  ...  This step derives a detailed RAM design of a customised security solution for the concern, including its customisation interface and usage interface.  ... 
doi:10.1109/models.2015.7338255 dblp:conf/models/NguyenYHKST15 fatcat:wosu42o32jfqzc72za6oxu7hwq

A New Paradigm for Adding Security into is Development Methods [chapter]

Mikko Siponen, Richard Baskerville
2001 Advances in Information Security Management & Small Systems Security  
This framework is illustrated with an example of a framework-based solution: meta-notation for adding security into IS development methods.  ...  Consequently, several alternative approaches for designing and managing secure information systems (SIS) have been proposed. However, many of these approaches have shortcomings.  ...  ACKNOWLEDGEMENTS This research was supported by a research grant by University of Oulu (Finland), and also financed by OWLA-project (http://www.hytec.oulu.fi/).  ... 
doi:10.1007/0-306-47007-1_8 fatcat:aievtsw72fczdh4swewkzosb7m

On the Optimization of Behavioral Logic Locking for High-Level Synthesis [article]

Christian Pilato, Luca Collini, Luca Cassano, Donatella Sciuto, Siddharth Garg, Ramesh Karri
2021 arXiv   pre-print
Our method optimizes a given security metric better than topological locking: 1) we always identify a valid solution that optimizes the security metric; 2) we minimize the number of bits used for locking  ...  Second, optimizing a security metric is application-dependent and designers must evaluate and compare alternative solutions.  ...  However, in both cases designers miss a method to select which elements must be locked, incurring overheads and producing weak or infeasible solutions [10] .  ... 
arXiv:2105.09666v2 fatcat:rksyvyu7nres3p6xr25erfdmii

Modeling and analysis of security trade-offs – A goal oriented approach

Golnaz Elahi, Eric Yu
2009 Data & Knowledge Engineering  
From analyzing the limitations of existing methods, in Section 4, we propose a conceptual modeling technique for modeling and analyzing security trade-offs in a multi-actor setting.  ...  Conceptual Modeling Criteria for Security Trade-offs Analysis Trade-off analysis is a systematic examination of the advantages and disadvantages of requirements and/or design choices for a system to achieve  ...  UMLsec is used to verify if the design solutions satisfy the security requirements. Design solutions that pass the verification are then evaluated using security solution design trade-off analysis.  ... 
doi:10.1016/j.datak.2009.02.004 fatcat:7gtqcmcbdjgpfkre2fclqryqsy

A Design Theory for Secure Information Systems Design Methods

Juhani Heikka, Richard Baskerville, Mikko Siponen
2006 Journal of the AIS  
and violation of security demands) and provided solutions for discovered vulnerabilities accordingly.  ...  Purpose: The goal of this work is to provide a method for organisational and technical analysis of security issues in health care (using tools, methods and processes in a structured and traceable way).  ...  and violation of security demands) and provided solutions for discovered vulnerabilities accordingly.  ... 
doi:10.17705/1jais.00107 fatcat:w7hi7hjzwvanpat7aggmywo6si

Towards Developing Secure Software Using Problem-Oriented Security Patterns [chapter]

Azadeh Alebrahim, Maritta Heisel
2014 Lecture Notes in Computer Science  
The proposed method bridges the gap between security problems and security architectural solutions.  ...  Quality requirements such as security drive the architecture of a software, while design decisions such as security patterns on the architecture level in turn might constrain the achievement of quality  ...  peak and Attribute Driven Design [17] for the solution peak.  ... 
doi:10.1007/978-3-319-10975-6_4 fatcat:vel6ieab4zcp3ohwcizy46pugy
« Previous Showing results 1 — 15 out of 907,901 results