A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Visual Analysis of Photo Policy Misconfigurations Using Treemaps
[article]
2019
arXiv
pre-print
Online photo privacy is a major concern for social media users. Numerous visualization tools have been proposed to help the users easily compose and understand policies on social networks. ...
We propose a tool that displays the photo albums w.r.t their policy misconfigurations using a Treemap visualization. ...
Their results indicated the users' privacy concern for their online photos. Being non-experts in access control-the users frequently end up giving access to unintended audience. ...
arXiv:1903.02612v1
fatcat:rhvo3xfn2zhndk7tlobgot7buy
Security, Control and Management of Smart Remote Laboratory for Remote Experiments in Electricity and Electronics
2020
International Journal of Advanced Trends in Computer Science and Engineering
In addition, this paper presents the major parts of developed, integrated and deployed resources for online experimenting and distance learning through this hybrid platform. ...
different techniques for smart environment control and management. ...
Moreover, we aim to optimize the control and management of deployed resources in term of security, online access and monitoring. ...
doi:10.30534/ijatcse/2020/234932020
fatcat:vlvycktmnjblpmltnz6uybzk7m
Security Professionals Must Reinforce Detect Attacks to Avoid Unauthorized Data Exposure
2021
Information Technology in Industry
Digital criminals are responsible for increased network breaches using elusive security tools to penetrate secure environments with sophistication. ...
Monetary investment in cybersecurity and management support plays a significant role in assuring the implementation of information security throughout any organizational processes. ...
The previous idea resolution incorporated the use of the least-privilege principle and access controls. The focus also shifted to better physical security and better access control. ...
doi:10.17762/itii.v8i1.76
fatcat:fp3fpedw3vbffm3c65lp4r5jcq
Detection of Vulnerabilities in Network-Connected Servers
2013
IOSR Journal of Engineering
This paper considers some of the facts why business need information security policies, procedures, technical measures used to prevent unauthorized access, alteration, theft or physical damages. ...
Today, computer networks and distributed software systems are pervasive. Thus, the idea of secure computing is paramount. ...
Policies for access control, authentication etc. ii) Physical Security refers to securing the building, work areas, devices and data in the form of documents. ...
doi:10.9790/3021-03523439
fatcat:44pe56jw4fdovkfcirjuue442e
A Review of Cyber-security Measuring and Assessment Methods for Modern Enterprises
2019
JOIV: International Journal on Informatics Visualization
cyber-security system followed and policies used in modern enterprises. ...
of a modern enterprise data network. ...
Authority and Access Control Policy: Access to a company's network and servers, must be through unique logins that require an authentication process in the form of passwords, tokens, biometrics, IDs. ...
doi:10.30630/joiv.3.3.241
fatcat:pn7gl76g4za7xi676rk2trhz5y
Relationship-based information sharing in cloud-based decentralized social networks
2014
Proceedings of the 4th ACM conference on Data and application security and privacy - CODASPY '14
DSNs have been presented as a valid alternative to Online Social Networks (OSNs), replacing the centralized paradigm of OSNs with a decentralized distribution of the features offered by the social networking ...
Indeed, it is nowadays well accepted that the definition of access control policies is an error-prone task. ...
access control policies, we set up an online platform tailored for such experiment. ...
doi:10.1145/2557547.2557574
dblp:conf/codaspy/AlbertiniC14
fatcat:isavxnqj65fd5cfbqh3si33qmi
Operational Security Requirements for Large Collaborative Compute Infrastructures
2006
2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing
In this paper we argue that gaps in security policies and procedures combined with organizational autonomy are the primary drivers motivating a set of requirements that go beyond those observed today. ...
In order to secure these infrastructures a comprehensive requirements study is needed that takes into account the novel risks, threats, and operational issues brought on by the large-scale, distributed ...
Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the ONR or NSF. ...
doi:10.1109/colcom.2006.361884
dblp:conf/colcom/KhuranaBWC06
fatcat:o4y3spvlfjfylnzhn2nhjitlw4
Social Networking Security during COVID-19: A Systematic Literature Review
2022
Wireless Communications and Mobile Computing
This research extensively discusses the social networking threats, challenges, online surveys, and future effects. ...
We conduct an online survey using the google forms platform to collect the responses of social networking sites (SNS) users within Pakistan to show how SNS affects health positively and negatively. ...
Social Networking Security Based Online Survey Here, in this paper, we work on the social networking-based online survey to get the adverse or positive effect of SNS on audience or end-users. ...
doi:10.1155/2022/2975033
fatcat:xqvxb7mpwrhgvmmrstmry5dilq
Policy-by-example for online social networks
2012
Proceedings of the 17th ACM symposium on Access Control Models and Technologies - SACMAT '12
We introduce two approaches for improving privacy policy management in online social networks. ...
In addition, we demonstrated considerable reductions in policy authoring time using Same-As Policy Management over traditional group based policy management approaches. ...
[3] analyze the impacts of community information on access control policy decisions within social networks. ...
doi:10.1145/2295136.2295142
dblp:conf/sacmat/CheekS12
fatcat:ws2yzcq5cfgkza2r3rnknanvna
What you want is not what you get
2013
Proceedings of the 2013 ACM workshop on Artificial intelligence and security - AISec '13
Studies repeatedly show that users frequently misconfigure their policies or misunderstand the privacy features offered by social networks. ...
As the amount of content users publish on social networking sites rises, so do the danger and costs of inadvertently sharing content with an unintended audience. ...
Das et al. analyzed fileserver access-control policy to detect inconsistencies in the permissions given to otherwise similar users [11] . ...
doi:10.1145/2517312.2517317
dblp:conf/ccs/SinhaLB13
fatcat:x6rc6fitbre2vmontluoi65zwa
KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration
[article]
2021
arXiv
pre-print
We also demonstrate the utilization of the knowledge graph for automated misconfiguration mitigation in a Kubernetes cluster. ...
We assert that our knowledge graph based approach can help in addressing several challenges, e.g., misconfiguration of security, associated with manually configuring the security of CO. ...
International Conference on Advances in Social Networks Analysis and
[8] StackRox. (2020) The state of container and kubernetes security. Access Mining, 2019, pp. 879–886. ...
arXiv:2112.12595v1
fatcat:3ddw5irclrgxfooe3chpwzqfpi
Consumer-centric protection for online social networks
2014
Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)
Online Social Networks (OSNs) are a unique construct that is shaped by the advancement and availability of Internet technologies. ...
In this proposal, the individual user controls how her data can be accessed by her contacts (e.g. friends and family members) and others, thus giving control of user data back to the rightful owner -the ...
A large number of online users engage in one way or another with these social network sites, which are also called "Online Social Networks (OSNs)". ...
doi:10.1109/iri.2014.7051872
dblp:conf/iri/AkramKL14
fatcat:cus2e3ufefbkviczv5bosdw7xi
DEMACRO: Defense against Malicious Cross-Domain Requests
[chapter]
2012
Lecture Notes in Computer Science
In this paper, we confirm the findings of the aforementioned studies and we design DEMACRO, a client-side defense mechanism which detects potentially malicious cross-domain requests and de-authenticates ...
Three recent studies showed that a significant number of Web applications implement poor cross-domain policies allowing malicious domains to embed Flash and Silverlight applets which can conduct arbitrary ...
Beato et al. propose a client-side access-control system for social networks, where the publishing user can select who will get access to the published information [3] . ...
doi:10.1007/978-3-642-33338-5_13
fatcat:mf44zuokdfc3vefdb7kjpgojv4
Overview of the Impact of Human Error on Cybersecurity based on ISO/IEC 27001 Information Security Management
2021
Journal of Information Security and Cybercrimes Research
Information security is the practice of protecting information by mitigating the risk of cyber-attack, and typically includes preventing or reducing the possibility of unauthorized/inappropriate access ...
International standards related to information security such as ISO/IEC 27001 emphasis on effective implementation of the information security policies and applications without hampering the productivity ...
Your security policy should clearly outline how to handle critical data and passwords, who can access them, which security and monitoring software to use, etc. ...
doi:10.26735/wlpw6121
fatcat:js5qmakxmnebbaf5y3w7dxiczi
Network Error Logging: Client-side measurement of end-to-end web service reliability
2020
Symposium on Networked Systems Design and Implementation
Since 2014, NEL has been invaluable in monitoring all of Google's domains, allowing us to detect and investigate instances of DNS hijacking, BGP route leaks, protocol deployment bugs, and other problems ...
We present NEL (Network Error Logging), a planet-scale, client-side, network reliability measurement system. ...
In particular, we thank Emma Christie, Fred Douglas, Logan Ingalls, Martijn Stevenson, Matthew Steele, Steve Wang, Wesley Darlington, and Yan Avlasov for investigating issues that NEL has detected over ...
dblp:conf/nsdi/BurnettCCEGJMPR20
fatcat:q7pdxprtpndrhecyrj4hssdqke
« Previous
Showing results 1 — 15 out of 852 results