19,518 Hits in 4.5 sec

Towards automating the security compliance value chain

Smita Ghaisas, Manish Motwani, Balaji Balasubramaniam, Anjali Gajendragadkar, Rahul Kelkar, Harrick Vin
2015 Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2015  
In this paper, we present a generic approach towards automating different activities of the Security Compliance Value Chain (SCVC) in organizations.  ...  of appropriate security controls, and finally, (4) verification and reporting of compliance.  ...  We derive a Security Compliance Value Chain (SCVC) from the activities in regulatory compliance lifecycle.  ... 
doi:10.1145/2786805.2804435 dblp:conf/sigsoft/GhaisasMBGKV15 fatcat:bdzztytyhvdd3au5vrmobi2yaq

Cyber Security in Cloud: Risk Assessment Models [article]

Carlos Bendicho
2021 arXiv   pre-print
The review of literature shows that RA approaches leveraging CSA (Cloud Security Alliance) STAR Registry that have into account organizations security requirements present higher degree of compliance,  ...  This work shows a ranking of Cloud RA models and their degree of compliance with the theoretical reference Cloud Risk Assessment model.  ...  Cloud Cyber Security Risk Assessment Model (ACCSRAM).  ... 
arXiv:2107.01007v1 fatcat:fvib6ovbkrbklmp3qhtohgsh5q

Project Data Categorization, Adoption Factors, and Non-Functional Requirements for Blockchain Based Digital Twins in the Construction Industry 4.0

Benjamin Teisserenc, Samad Sepasgozar
2021 Buildings  
This new level of maturity leverages distributed blockchain networks to enhance collaboration, processes automation with smart contracts, and data sharing within a decentralized data value chain.  ...  Blockchain can improve data integrity and enhance trust in the data value chain throughout the entire lifecycle of projects.  ...  Digital twin Q24 automation Decentralized data value chain Table 8 8 Security Security Table 8 Refer to interview, Privacy Infrastructure Data value resilience chain BMS Table 8 Table 14 . 814 Cont  ... 
doi:10.3390/buildings11120626 fatcat:7ozrgh5xyvcdfcoqpz3o3ng25e

Evidence Collection in Cloud Provider Chains

Thomas Rübsamen, Christoph Reich, Nathan Clarke, Martin Knahl
2016 Proceedings of the 6th International Conference on Cloud Computing and Services Science  
Nevertheless, the collection at all participating providers is required to assess policy compliance in the whole chain.  ...  Cloud auditing becomes increasingly challenging for the auditor the more complex the cloud service provision chain becomes.  ...  ACKNOWLEDGEMENTS This work has been partly funded from the European Commission's Seventh Framework Programme (FP7/2007(FP7/ -2013, grant agreement 317550, Cloud Accountability Project -  ... 
doi:10.5220/0005788700590070 dblp:conf/closer/RubsamenRCK16 fatcat:vbuomutygrhrxdrovomzuccola

An approach for a business-driven cloudcompliance analysis covering public sector process improvement requirements [article]

Sachar Paulus, Ute Riemann
2013 arXiv   pre-print
value chain.  ...  It is a pre-requisite to identify the core elements of the value chain that are essential for the individual companys business and the root cause for any company success.  ...  The additional step towards the building of a value chain that goes beyond the classical concept of Porter is to segment the value chain in regards to a value-based value chain driven by process value  ... 
arXiv:1310.2832v1 fatcat:spcseoestbcvhf24gmz3sixwhu


Sachar Paulus1 And Ute Riemann2
2019 Zenodo  
The truth is, that neither all processes have the same usability for cloud services not do they have the same importance for a specific company.  ...  The need for process improvement is an important target that does affect as well the government processes.  ...  The additional step towards the building of a value chain that goes beyond the classical concept of Porter is to segment the value chain in regards to a value-based value chain driven by process value  ... 
doi:10.5281/zenodo.3246234 fatcat:2kqzfgfvdrh4hjymfbqs6nyjxy

The Governance of Corporate Forensics Using COBIT, NIST and Increased Automated Forensic Approaches

Henry Nnoli, Dale Lindskog, Pavol Zavarsky, Shaun Aghili, Ron Ruhl
2012 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing  
The degree of information security threats evolving on a daily basis has increasingly raised concerns for enterprise organizations.  ...  Today, the ability to investigate internal matters such as policy violations, regulatory compliance, and employee separation has become important in order for corporations to manage risk.  ...  ACKNOWLEDGEMENT The authors are thankful to the Faculty of Graduate Studies at Concordia University College of Alberta for providing resources used in the accomplishment of this research.  ... 
doi:10.1109/socialcom-passat.2012.109 dblp:conf/socialcom/NnoliLZAR12 fatcat:2iwi2svjvve3jfjelphthxitoi

What's Next in the Digital Transformation of Financial Industry?

Tom Butler
2020 IT Professional Magazine  
One important use case for DLT, however, is that the front-, middle-and back-office processes and the entire intra-and interfirm value chain can be automated using AI and data provenance guaranteed using  ...  Here, data created in each step in the financial value chain can be captured on the DLT in a trustworthy and transparent manner.  ... 
doi:10.1109/mitp.2019.2963490 fatcat:ahoiaainezalhafskknkk565ve

Multi-objective optimization for preemptive & predictive supply chain operation

Kiran Kumar Chandriah, N. V. Raghavendra
2020 International Journal of Electrical and Computer Engineering (IJECE)  
Therefore, the proposed system introduces an analytical model where predictive optimization is carried out towards bridging the gap between supply and demands in supply chain 4.0.  ...  meet the standard demands of supply chain planning.  ...  BIOGRAPHIES OF AUTHORS His research interests are in the field of manufacturing engineering, automation and technology management.  ... 
doi:10.11591/ijece.v10i2.pp1533-1543 fatcat:4ulwcuvsuvhapi4bljy6xelzwq

Enterprise Robotic Process Automation

Imesha Vitharanage, Queensland University of Technology, Australia, Amila Thibbotuwawa, University of Moratuwa, Sri Lanka
2021 Bolgoda Plains  
It increases compliances as it follows the rules and keeps audit trails.  ...  Robotic Process Automation (RPA) is an emerging technology widely used across multiple sectors such as human resources, healthcare, finance, accounting, manufacturing, higher education and supply chain  ...  It increases compliances as it follows the rules and keeps audit trails.  ... 
doi:10.31705/bprm.2021.2 fatcat:q7qulaqhszfixcjyzkhdsly2pi

Continuous Control Monitoring-Based Regulation: A Case in the Meat Processing Industry [chapter]

Joris Hulstijn, Rob Christiaanse, Nitesh Bharosa, Friso Schmid, Remco van Wijk, Marijn Janssen, Yao-Hua Tan
2011 Lecture Notes in Business Information Processing  
Participants concluded that the approach is technically feasible but requires a different mindset towards regulation, and a clear business case.  ...  The regulator gets access to a validated copy of key data elements from the company"s internal information systems, which serve as indicator of compliance to specific control objectives.  ...  We would like to thank the Food and Consumer Product Safety Authority (VWA) for their cooperation in this project.  ... 
doi:10.1007/978-3-642-22056-2_26 fatcat:7l5agrent5hpfilucvlkws6z7a

How Correct and Defect Decision Support Systems Influence Trust, Compliance, and Performance in Supply Chain and Quality Management [chapter]

Philipp Brauner, André Calero Valdez, Ralf Philipsen, Martina Ziefle
2017 Lecture Notes in Computer Science  
subjective and objective compliance with the system, as well as trust in the system.  ...  The article concludes with open research questions regarding trust and compliance in Decision Support Systems as well as actionable knowledge on how Decision Support Systems can mitigate supply chain disruptions  ...  The German Research Foundation (DFG) founded this project within the Cluster of Excellence "Integrative Production Technology for High-Wage Countries" (EXC 128) and the integrated cluster domain ICD-D1  ... 
doi:10.1007/978-3-319-58484-3_26 fatcat:csysid5wv5ht7oa7nhi4hv7fgm

Online Compliance Monitoring of Service Landscapes [chapter]

J. M. E. M. van der Werf, H. M. W. Verbeek
2015 Lecture Notes in Business Information Processing  
Today, it is a challenging task to keep a service application running over the internet safe and secure.  ...  As such, such an event log can be regarded as the ground truth for the entire application: A security requirement is violated if and only if it shows in the event log.  ...  In this way, ProMSecCo allows to automate the compliance checking process, which is an essential next step towards continuous auditing.  ... 
doi:10.1007/978-3-319-15895-2_8 fatcat:cju26jzzsvesdh622exfuzperm

Blockchain Reference System Architecture Description for the ISA95 Compliant Traditional and Smart Manufacturing Systems

Erkan Yalcinkaya, Antonio Maffei, Mauro Onori
2020 Sensors  
This heterogeneous ecosystem leads to challenges in systems scalability, interoperability, information security, and data quality domains.  ...  Therefore, the manufacturing industry is currently in a situation that the legacy and modern manufacturing systems share the same factory environment.  ...  Conflicts of Interest: The authors declare no conflict of interest. Sensors 2020, 20, 6456  ... 
doi:10.3390/s20226456 pmid:33198154 pmcid:PMC7696017 fatcat:ez2f5ldkcre6xjp2lr2q6tgo3m

Platform Boot Integrity: Foundation for Trusted Compute Pools [chapter]

Raghu Yeluri, Enrique Castro-Leon
2014 Building the Infrastructure for Cloud Security  
Also, the launch order of elements in the chain may vary, leading to different measurement values in PCRs. Keeping track of the expected values for integrity measurements becomes a nettlesome task.  ...  If this measurement chain continues through the entire boot sequence, the resultant PCR values will reflect the measurement of all files used.  ... 
doi:10.1007/978-1-4302-6146-9_3 fatcat:z5lukpm6szf23jlnujjnmqhv4i
« Previous Showing results 1 — 15 out of 19,518 results