Filters








977,399 Hits in 6.8 sec

How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners [chapter]

Fabio Massacci, Federica Paci
2012 Lecture Notes in Computer Science  
The paper reports on a medium scale qualitative study where master students in computer science and professionals have applied academic security requirements engineering methods to analyze the security  ...  risks of a specific application scenario.  ...  This work is partly supported by the projects EU-FP7-IST-NoE-NESSOS, EU-EIT-ICTLabs, EU-FP7-SEC-SECONOMICS, PAT-TRISE.  ... 
doi:10.1007/978-3-642-34210-3_7 fatcat:lnswfezgejdijkgm3ur6ea7thq

The Menlo Report

Michael Bailey, David Dittrich, Erin Kenneally, Doug Maughan
2012 IEEE Security and Privacy  
stemming from the series of working group meetings that broached these issues (see the "Menlo Report Working Group" sidebar). 2 Similar to the National Commission's approach, the DHSsupported working group  ...  a 16-month period to create the report. e Menlo Report working group participants are Other Supporting Activities In January 2010, an early version of the Menlo Report's principles and applications  ... 
doi:10.1109/msp.2012.52 fatcat:o3uvkqekgngcrfmrqiqsxvbv4q

Cryptographic Software Solution for Information Protection in a Corporate Intranet

Veselin Tselkov
2000 Information & Security An International Journal  
of security applications working on this workstation;  For each security application there is a ApplGrTbl -group table, containing a list of available groups of keys for each security application.  ...  Each workstation needs:  a list of security applications working on this workstation;  a list of available groups of keys for each security application.  ... 
doi:10.11610/isij.0406 fatcat:pb7iui6ofbce5cozsltn4lngym

Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders [chapter]

Helen Armstrong, Matt Bishop, Colin Armstrong
2013 IFIP Advances in Information and Communication Technology  
This paper describes an exercise that combines the business case for penetration testing with the application of the testing and subsequent management reporting.  ...  This paper explains the objectives and structure of the exercise and its planned execution by two groups of students, the first group being information systems students in Australia and the second group  ...  Chickowski (2013) reports that one of the challenges faced by security professionals is performing vulnerability testing on the applications that businesses can least afford to have compromised.  ... 
doi:10.1007/978-3-642-39377-8_2 fatcat:63qzustwyfc3pggyiipvxtlnsm

Self-Conceptualization and Multi Privileged Algorithm based Controller

2020 International Journal of Engineering and Advanced Technology  
The paper proposes to reduce the workspace, provide users to work on multiple applications in a single domain, provide the security for associates and the privileged people by giving a single sign on authentication  ...  The design is based on established technical specifications that have been taken for multi domain working, add the technological variations are required to be consolidated.  ...  In group they can assign applications to the group, can search group by group name, can remove group. In the below report page shows the generated reports which is structured by the system.  ... 
doi:10.35940/ijeat.d7557.049420 fatcat:morfhfzgnbd6bdpb4pbgila5sq

Comparison of secure messaging application (WhatsApp) and standard telephone usage for consultations on Length of Stay in the ED

Umut Gulacti
2017 Applied Clinical Informatics  
Comparison of secure messaging application (WhatsApp) and standard telephone usage for consultations on Length of Stay in the ED.  ...  The aim of this study was to determine the effect of secure messaging application (WhatsApp) usage for medical consultations on Emergency Department Length of Stay (ED LOS) and consult time.  ...  A study by Giordano et al (22) investigating consultations requested using the secure messaging application Messenger reported on the use of secure messaging application for initial documentation and  ... 
doi:10.4338/aci-2017-04-ra-0064 pmid:30027535 pmcid:PMC6220693 fatcat:rzby33s2nvfencigsq76qldzju

Health and Economic Impact of Atrial Fibrillation of Workers in Italy: Social Security Benefits

Marco Trabucco Aurilio, Francesco Saverio Mennini, Claudia Nardone, Andrea Piccioni, Matteo Bolcato, Vincenzo Russo, Valerio Sciannamea, Raffaele Migliorini, Luca Coppeta, Andrea Magrini
2022 International Journal of Environmental Research and Public Health  
assessing the economic impact on the social security system.  ...  Methods: We analyzed all applications for invalidity allowances and invalidity pensions throughout Italy over a 10-year period from 01.01.2009 to 31.12.2019, giving specific attention to all reports indicating  ...  Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable. Data Availability Statement: Data are available on request from the corresponding author.  ... 
doi:10.3390/ijerph19031883 pmid:35162904 pmcid:PMC8834668 fatcat:74molilpx5fgdo5vsz7kp3bfdi

D7/8 - Final Report on Standardization Analysis and Recommendations

Reinhard Herzog, Michael Jacoby, Hylke van der Schaaf, Giuseppe Bianchi, Giovanni Bartolomeo, Claudio Pisa, Kym Watson, Gino Carrozzo, Matteo Pardi, Gianluca Insolvibile, Ricardo Vitorino, João Garcia (+2 others)
2018 Zenodo  
It also gives recommendations on how to contribute or to make use of their results.  ...  The activities of ETSI TC CYBER include the following broad areas: • Cyber Security, • Security of infrastructures, devices, services, and protocols, The ongoing work item DTS/CYBER-0020 on "Application  ...  IETF -Constrained RESTful Environments The IETF "Constrained RESTful Environments Working Group" (CoRE WG) was established in IETF in late 2010 to work on defining a framework for resource-oriented applications  ... 
doi:10.5281/zenodo.2566414 fatcat:2ogydwwurvgl5f7lp5nasykj24

User-centric security: optimization of the security-usability trade-off

Denis Feth
2015 Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2015  
Our methodology is based on active involvement of large user groups and analyzes user feedback in order to optimize security mechanisms with respect to their user experience, with a focus on security awareness  ...  Security measures are complex by nature and often complicate work flows. Vice versa, insecure systems are typically not usable in practice.  ...  Thus, a Root Cause Analysis has to be performed that maps a report to one or more security measures, if applicable.  ... 
doi:10.1145/2786805.2803195 dblp:conf/sigsoft/Feth15 fatcat:nrl6iuj5cvcdfpe6brpdj2wlb4

On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment [chapter]

Katsiaryna Labunets, Fabio Massacci, Federica Paci
2017 Lecture Notes in Computer Science  
[Question] We compare methods based on those two notations with respect to their actual and perceived efficacy when both groups are equipped with a domain-specific security catalogue (as typically available  ...  In the first experiment the perceived efficacy of tabular method was slightly better than the graphical one, and in the second experiment two methods are perceived as equivalent.  ...  The division of groups on good and "not good" was done based on security experts assessment of the final reports quality.  ... 
doi:10.1007/978-3-319-54045-0_15 fatcat:b5towbj2avamjgigjoelulp2cu

ETSI security standardization

Carmine Rizzo
2011 The Proceedings of 2011 9th International Conference on Reliability, Maintainability and Safety  
infrastructure, working on mobile/wireless communications, emergency telecommunications, lawful interception and data retention.  ...  To minimise exposure to risks, security must be built in from the beginning when designing new architectures, not added on later as an optional feature.  ...  on the security of identity in NGN [12] , and a report on the application of ISO 15408-2 requirements to ETSI standards (method and application with examples) [13]  ... 
doi:10.1109/icrms.2011.5979345 fatcat:frbi2xpbcnfxpexzcc7hsvrj74

A Survey on Smartphone Security

Di Liu, Ni Zhang, Kun Hu
2013 Applied Mechanics and Materials  
This paper proposes a survey on smartphone security from the aspect of mobile malware, specifications related to smartphone security, and smartphone security solutions.  ...  , and smartphone security solutions by security vendors.  ...  OMA OMA ARC-SEC group had a research on mobile phone security, i.e., project of autho4API [7] and Spam report [16] .  ... 
doi:10.4028/www.scientific.net/amm.347-350.3861 fatcat:d4wj7tno7rbgvbkdei62rqedcq

Standards News

2020 IEEE Communications Standards Magazine  
The group will work on three AI-focused aspects: securing AI from attack, mitigating against malicious AI, and using AI to enhance security measures.  ...  ; hsiao-yinG lin (huaWei), eTsi isG RaPPoRTeuR ETSI created the new Industry Specification Group on Securing Artificial Intelligence (ISG SAI) to develop technical reports and specifications to mitigate  ...  For more information on the standardization work of ITU-T Study Group 17, link to: https://www.itu.int/go/tsg  ... 
doi:10.1109/mcomstd.2020.9088322 fatcat:cn247ug4a5f65ljdlazue6qzii

Poster Abstract: Exploring Cloud Services with Body Area Networks for Medical Care

Shan Lin
2011 Proceedings of the 6th International ICST Conference on Body Area Networks  
To better support body network applications, mobile phones can also utilize cloud services.  ...  In this paper, we explore the opportunities to design and develop personal health care applications with cloud services.  ...  Application running on various mobile devices uses this technique to register itself to one or more such medical care groups.  ... 
doi:10.4108/icst.bodynets.2011.247237 dblp:conf/bodynets/ContractorL11 fatcat:ej6yagcapbd6zg7ei7cfaveely

D7.3 - Initial Report On Standardization Analysis And Recommendations

Reinhard Herzog, Hylke van der Schaaf, Michael Jacoby, Giuseppe Bianchi, Giovanni Bartolomeo, Claudio Pisa, Kym Watson, Gino Carrozzo, Matteo Pardi, Gianluca Insolvibile, Ricardo Vitorino, Joao Garcia
2017 Zenodo  
This deliverable provides a good overview on the current IoT standardization landscape and symbIoTe's positioning.  ...  IETF -Constrained RESTful Environments The IETF "Constrained RESTful Environments Working Group" (CoRE WG) was established in IETF in late 2010 to work on defining a framework for resource-oriented applications  ...  The ongoing work item DTS/CYBER-0020 on "Application of Attribute-Based Encryption (ABE) for data protection on smart devices, cloud and mobile services" is specifying an application of ABE to implement  ... 
doi:10.5281/zenodo.817494 fatcat:modvyfcpw5fgdn3q2ybn6p2vru
« Previous Showing results 1 — 15 out of 977,399 results