Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Yolanta Beres"'
Publikováno v:
Journal of Computer Security. 18:541-572
Federated identity management is an emerging paradigm that is rightly getting a lot of standardization and research attention. One aspect that is not receiving enough attention is assurance. Given the challenges enterprises faced trying to demonstrat
Autor:
Jonathan McCune, Boris Balacheff, Adrian Perrig, Ahmad-Reza Sadeghi, Angela Sasse, Yolanta Beres
This book constitutes the refereed proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST 2011, held in Pittsburgh, PA, USA in June 2011.The 23 revised full papers presented were carefully reviewed and selected for
Autor:
Geoffrey B. Duggan, Chris Middup, Hilary Johnson, Marco Casassa Mont, Adrian Baldwin, Simon Shiu, Yolanta Beres
Publikováno v:
Economics of Information Security and Privacy III ISBN: 9781461419808
WEIS
WEIS
Increasing reliance on IT and the worsening threat environment mean that organisations are under pressure to invest more in information security. A challenge is that the choices are hard: money is tight, objectives are not clear, and there are many r
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1479663723a4bd937ab01bd6df761c0d
https://doi.org/10.1007/978-1-4614-1981-5_10
https://doi.org/10.1007/978-1-4614-1981-5_10
Autor:
Yolanta Beres, Jonathan Griffin
Publikováno v:
IFIP Advances in Information and Communication Technology ISBN: 9783642304354
SEC
SEC
Patch management of networks is essential to mitigate the risks from the exploitation of vulnerabilities through malware and other attacks, but by setting too rigorous a patching policy for network devices the IT security team can also create burdens
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b09ce6a0ce77e4775750a637c4da1119
https://doi.org/10.1007/978-3-642-30436-1_35
https://doi.org/10.1007/978-3-642-30436-1_35
Publikováno v:
ESEM
It is hard for security practitioners and decision-makers to know what level of protection they are getting from their investments in security, especially when they have invested in a number of technologies and processes which interact and combine to
Publikováno v:
Digital Identity Management
In this paper we address the appropriate management of risk in federated identity management systems by presenting an identity assurance framework and supporting technologies. We start by discussing the risk mitigation framework that should be part o
Publikováno v:
QoP
We present an innovative way to assess the effectiveness of security controls where measurable aspects of controls are first captured in models and then the models are used to analyze the security data gathered from the IT environment. The aim is to
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540260424
iTrust
iTrust
Events such as Enron's collapse have changed the regulatory and governance trends increasing executive accountable for the way companies are run and therefore for the underlying critical IT systems. Such IT functions are increasingly outsourced yet e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6ff5b5836f34326ae05bbf88b6fbfbbe
https://doi.org/10.1007/11429760_28
https://doi.org/10.1007/11429760_28
Autor:
Yolanta Beres, Chris I. Dalton
Publikováno v:
NSPW
Information flow control allows enforcement of end-to-end confidentiality policies but has been difficult to put in practice. This paper introduces a pragmatic new approach for tracking information flow while the process is running at the same time a
Autor:
Keith Alexander Harrison, Yolanta Beres, Simon Shiu, M. Casassa Mont, Adrian Baldwin, Martin Sadler
Publikováno v:
COMPSAC
Recent IT attacks demonstrated how vulnerable consumers and enterprises are when adopting commercial and widely deployed operating systems, software applications and solutions. Diversity in software applications is fundamental to increase chances of