Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Security control framework.

Zeitschriftenartikel zum Thema „Security control framework“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Security control framework" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Kumar, Harsh. "Cloud Compliance Security Optimization." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49485.

Der volle Inhalt der Quelle
Annotation:
Abstract— Managing compliance with diverse regulatory standards in cloud environments poses considerable operational challenges for modern enterprises. Manual processes, duplicated efforts, and lack of traceability often complicate the audit lifecycle, especially when multiple frameworks like PCI DSS, ISO 27001, SOC 1, SOC 2, and C5 are involved. This paper introduces a scalable compliance optimization framework developed and deployed within Enterprise internal audit ecosystem to streamline audit readiness and control management. The framework integrates tools such as Compliance manager, Signa
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Wang, Yu Fei, Tao Zhang, Yuan Yuan Ma, and Bo Zhang. "An Information Security Assessments Framework for Power Control Systems." Advanced Materials Research 805-806 (September 2013): 980–84. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.980.

Der volle Inhalt der Quelle
Annotation:
Information and cyber security of Industrial Control Systems (ICS) faces severe challenges and has gained considerable importance. Information security assessment is an essential component of information security assurance infrastructure mechanisms. First, a hierarchical model of smart grid was abstracted. Based on the proposed model and the information security risks and information security protection demands of power control systems, an information security assessments framework for power control systems was proposed in dimensions of system layers and life cycle to guide the security assess
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Al Ketbi, Maitha, Khaled Shuaib, Ezedin Barka, and Marton Gergely. "Establishing a Security Control Framework for Blockchain Technology." Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 307–30. http://dx.doi.org/10.28945/4837.

Der volle Inhalt der Quelle
Annotation:
Aim/Purpose: The aim of this paper is to propose a new information security controls framework for blockchain technology, which is currently absent from the National and International Information Security Standards. Background: Blockchain technology is a secure and relatively new technology of distributed digital ledgers, which is based on inter-linked blocks of transactions, providing great benefits such as decentralization, transparency, immutability, and automation. There is a rapid growth in the adoption of blockchain technology in different solutions and applications and within different
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Abdulrahman, H. Altalhi1 Zailani Mohamed Sidek2 Norjihan Abdul Ghani3 Fazidah Othman4 and Maged Abdelkhaleq Al-Sheshtawil5. "ENHANCING THE SECURITY FRAMEWORK SECURECLOUD WITH THE SWIFT IDENTITY MANAGEMENT FRAMEWORK." International Journal on Cloud Computing: Services and Architecture(IJCCSA) 2, February (2018): 01–07. https://doi.org/10.5281/zenodo.1444289.

Der volle Inhalt der Quelle
Annotation:
SecureCloud is a comprehensive security framework for cloud computing environments consisting of different modules that handle the security and trust issues of key components. One of the modules is responsible for authentication and identity management (IDM). In SecureCloud, the author suggest, to implement the security solution for the Authentication and IDM module, it is important to ensure IDM services in the cloud can be integrated with the existing IDM framework. Existing techniques for use of pseudonyms and accommodating multiple identities to protect users’ privacy can help build
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Ji, Kaining, Yitian Liu, and Changju Hu. "Design of Security Control Framework for Power System Microservices." Advances in Engineering Technology Research 13, no. 1 (2025): 777. https://doi.org/10.56028/aetr.13.1.777.2025.

Der volle Inhalt der Quelle
Annotation:
With the development of power system, the data complexity and function hybridity of business system are getting higher, which brings new challenges to the traditional microservices security system of business system. In order to meet the large-scale API interface authorization requirements of the business system, improve the sensitivity of the security system to abnormal traffic, and enhance the system's ability to determine the source of the exception and trace the audit, this paper proposes a microservices security control framework to deal with complex business systems. Using Netty as the u
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Kumar, Anurag, and Prof Bibha Kumari. "Implementing Privacy Preserving Techniques in Distributed Big Data Framework on Cloud Computing." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem37051.

Der volle Inhalt der Quelle
Annotation:
Cloud-based deployment architectures have emerged as the preferred model for Big Data operations due to their scalability, flexibility, and cost-effectiveness. However, this shift raises new security concerns as data is no longer directly under the user's control. Securing Big Data in cloud environments is crucial for widespread adoption, but developing a comprehensive security plan is challenging without a thorough analysis of potential vulnerabilities.To address this, a novel security-by-design framework for Big Data deployment on cloud computing, termed Big Cloud, is proposed in this articl
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Yogesh Kumar Bhardwaj. "Securing Generative AI: Navigating Data Security Challenges in the AI Era." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 147–55. https://doi.org/10.32996/jcsts.2025.7.4.17.

Der volle Inhalt der Quelle
Annotation:
This article examines the evolving security landscape for Generative Artificial Intelligence (GenAI) systems as they become increasingly integrated across critical sectors including healthcare, finance, and transportation. The proliferation of these technologies creates both transformative opportunities and significant security challenges that require specialized approaches. It explores key security vulnerabilities unique to GenAI implementations, including data protection vulnerabilities, access control complexities, data anonymization gaps, model integrity risks, monitoring challenges, intel
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Alshammari, Ahmad. "A Novel Security Framework to Mitigate and Avoid Unexpected Security Threats in Saudi Arabia." Engineering, Technology & Applied Science Research 13, no. 4 (2023): 11445–50. http://dx.doi.org/10.48084/etasr.6091.

Der volle Inhalt der Quelle
Annotation:
Many organizations around the world suffer large losses due to unexpected risks which can have a profound impact on their survival. This paper presents a novel security framework to address the security needs of Saudi organizations. There are four stages in the security framework: risk assessment and management, security intelligence and analytics, security policies and procedures, and security monitoring. A comprehensive security solution was provided by combining common security frameworks, e.g. ISO/IEC 27001:2013, NIST Cybersecurity Framework, and COBIT. The developed framework was designed
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Xu, Mudi, Benfeng Chen, Zhizhong Tan, et al. "AHAC: Advanced Network-Hiding Access Control Framework." Applied Sciences 14, no. 13 (2024): 5593. http://dx.doi.org/10.3390/app14135593.

Der volle Inhalt der Quelle
Annotation:
In the current context of rapid Internet of Things (IoT) and cloud computing technology development, the Single Packet Authorization (SPA) protocol faces increasing challenges, such as security threats from Distributed Denial of Service (DDoS) attacks. To address these issues, we propose the Advanced Network-Hiding Access Control (AHAC) framework, designed to enhance security by reducing network environment exposure and providing secure access methods. AHAC introduces an independent control surface as the access proxy service and combines it with a noise generation mechanism for encrypted acce
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Kalwani, Seema. "Quality Framework, Principles, control practices, benchmark, internal controls addressing needs of current world." International Journal of Multidisciplinary Research and Growth Evaluation 2, no. 4 (2021): 919–26. https://doi.org/10.54660/.ijmrge.2021.2.4.919-926.

Der volle Inhalt der Quelle
Annotation:
The article provides overview of Quality Assurance and Improvement Program. Describing quality 4.0 principles, tools, value propositions, quality management, planning, metrics and measurement used as benchmark to keep a check and continuously improve quality of work, products, processes. Internal control and security used by management, IT security, financial, accounting, and operational teams to meet their goals are discussed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Talha, Mohamed, and Anas Abou El Kalam. "Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms." JUCS - Journal of Universal Computer Science 27, no. 12 (2021): 1300–1324. http://dx.doi.org/10.3897/jucs.77046.

Der volle Inhalt der Quelle
Annotation:
Big Data often refers to a set of technologies dedicated to deal with large volumes of data. Data Quality and Data Security are two essential aspects for any Big Data project. While Data Quality Management Systems are about putting in place a set of processes to assess and improve certain characteristics of data such as Accuracy, Consistency, Completeness, Timeliness, etc., Security Systems are designed to protect the Confidentiality, Integrity and Availability of data. In a Big Data environment, data quality processes can be blocked by data security mechanisms. Indeed, data is often collected
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Talha, Mohamed, and El Kalam Anas Abou. "Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms." JUCS - Journal of Universal Computer Science 27, no. (12) (2021): 1300–1324. https://doi.org/10.3897/jucs.77046.

Der volle Inhalt der Quelle
Annotation:
Big Data often refers to a set of technologies dedicated to deal with large volumes of data. Data Quality and Data Security are two essential aspects for any Big Data project. While Data Quality Management Systems are about putting in place a set of processes to assess and improve certain characteristics of data such as Accuracy, Consistency, Completeness, Timeliness, etc., Security Systems are designed to protect the Confidentiality, Integrity and Availability of data. In a Big Data environment, data quality processes can be blocked by data security mechanisms. Indeed, data is often collected
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Nazmul, Hossain* Md. Alam Hossain Taposh Das Md. Tariqul Islam. "MEASURING THE CYBER SECURITY RISK ASSESSMENT METHODS FOR SCADA SYSTEM." Global Journal of Engineering Science and Research Management 4, no. 7 (2017): 1–12. https://doi.org/10.5281/zenodo.824955.

Der volle Inhalt der Quelle
Annotation:
The current situation with supervisory control and information procurement (SCADA) framework security is not similar with the vulnerabilities, dangers as on today and potential results. A large number of the SCADA frameworks are moderately shaky frameworks with endless and inescapable vulnerabilities. Seen data security dangers are once in a while talked about and assessed at administration level. Data security part of PC controlled basic foundations must be basically broke down. PC controlled foundations ought to be subjected to an extreme investigation. Challenges for SCADA framework securit
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Pradeep, Kumar. "Vault Security Framework Optimization for Improved Throughput and Security." International Journal of Leading Research Publication 4, no. 4 (2023): 1–29. https://doi.org/10.5281/zenodo.15026485.

Der volle Inhalt der Quelle
Annotation:
Enterprise applications increasingly rely on secure vault frameworks to manage sensitive configuration data, such as secrets, credentials, and encryption keys. However, these frameworks often introduce performance challenges due to complex security mechanisms, including encryption, role-based access control (RBAC), and frequent secret lookups. These challenges result in higher API response times, increased CPU utilization, and delayed security event detection.This research focuses on optimizing secure vault frameworks to enhance both throughput and security in large-scale enterprise systems. T
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Oladeji, Ifedayo, Ramon Zamora, and Tek Tjing Lie. "An Online Security Prediction and Control Framework for Modern Power Grids." Energies 14, no. 20 (2021): 6639. http://dx.doi.org/10.3390/en14206639.

Der volle Inhalt der Quelle
Annotation:
The proliferation of renewable energy sources distributed generation (RES-DG) into the grid results in time-varying inertia constant. To ensure the security of the grid under varying inertia, techniques for fast security assessment are required. In addition, considering the high penetration of RES-DG units into the modern grids, security prediction using varying grid features is crucial. The computation burden concerns of conventional time-domain security assessment techniques make it unsuitable for real-time security prediction. This paper, therefore, proposes a fast security monitoring model
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Oladeji, Ifedayo, Ramon Zamora, and Tek Tjing Lie. "An Online Security Prediction and Control Framework for Modern Power Grids." Energies 14, no. 20 (2021): 6639. http://dx.doi.org/10.3390/en14206639.

Der volle Inhalt der Quelle
Annotation:
The proliferation of renewable energy sources distributed generation (RES-DG) into the grid results in time-varying inertia constant. To ensure the security of the grid under varying inertia, techniques for fast security assessment are required. In addition, considering the high penetration of RES-DG units into the modern grids, security prediction using varying grid features is crucial. The computation burden concerns of conventional time-domain security assessment techniques make it unsuitable for real-time security prediction. This paper, therefore, proposes a fast security monitoring model
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Lu, Bo, Ruohan Cao, Luyao Tian, Hao Wang, and Yueming Lu. "FMNISCF: Fine-Grained Multi-Domain Network Interconnection Security Control Framework." Applied Sciences 10, no. 1 (2020): 409. http://dx.doi.org/10.3390/app10010409.

Der volle Inhalt der Quelle
Annotation:
The integrated air-ground multi-domain network provides users with a set of shared infrastructures. Security policies can be defined flexibly in the context of multi-domain network semantics. The packet filter module in the security gateway can run efficiently, which is an urgent requirement in this network environment. The framework combined with multi-domain network semantics implements the transformation into rules. It replaces the traditional manual method of configuring rules. The framework supports the whole life cycle management of rules from generation state and distribution state to e
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Park, Jong. "USF-PAS : Study on Core Security Technologies for Ubiquitous Security Framework." JUCS - Journal of Universal Computer Science 15, no. (5) (2009): 1065–80. https://doi.org/10.3217/jucs-015-05-1065.

Der volle Inhalt der Quelle
Annotation:
Ubi-Com has emerged as an exciting new paradigm to provide intelligent computig and communications at anytime and anywhere. But, In order to take the advantages of such services, it is important that intelligent security framework be suitable for Ubi-Com. In this paper, we propose privacy and access control scheme by surveillance which is one of core security technologies for ubiquitous hybrid intelligent security framework. In this scheme, the device information and the signature information can be added to the image data obtained by the image capturing device to maintain security of the imag
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Kang, Jeong Hwa, and Minhye Seo. "Enhanced Authentication for Decentralized IoT Access Control Architecture." Cryptography 7, no. 3 (2023): 42. http://dx.doi.org/10.3390/cryptography7030042.

Der volle Inhalt der Quelle
Annotation:
The internet of things (IoT) enables a hyperconnected society, offering intelligent services and convenience through various connections between people, objects, and services. However, the current state of the IoT still faces limitations in security. Security issues in the IoT are of significant concern, leading to the proposal of numerous security frameworks and solutions to address these challenges. Authentication and authorization are crucial security requirements in the IoT environment, considering the potential risks posed by inadequate authentication and incorrect authorization. To compr
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

CHEN, TSUNG-YI. "A MULTIPLE-LAYER KNOWLEDGE MANAGEMENT SYSTEM FRAMEWORK CONSIDERING USER KNOWLEDGE PRIVILEGES." International Journal of Software Engineering and Knowledge Engineering 19, no. 03 (2009): 361–87. http://dx.doi.org/10.1142/s0218194009004192.

Der volle Inhalt der Quelle
Annotation:
Success in a knowledge economy requires effectively using existing knowledge to create new knowledge. Security for knowledge sharing in enterprises is critical for protecting intellectual assets. This study develops the functional framework of a knowledge management system (KMS) with knowledge access control for effectively and securely sharing knowledge within an enterprise or across teams. The functional framework of the proposed KMS includes the following nine layers: user interface layer, knowledge access control and security layer, knowledge representation layer, knowledge process layer,
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Jamieson, Rodger, and Graham Low. "Local Area Network Operations: A Security, Control and Audit Perspective." Journal of Information Technology 5, no. 2 (1990): 63–72. http://dx.doi.org/10.1177/026839629000500202.

Der volle Inhalt der Quelle
Annotation:
This paper provides a framework for the review of security and control within a local area network environment. Network operations are subdivided into several functional areas or components for further review. Each component or area is briefly explained and the security risks, issues and concerns highlighted. Controls and security measures are proposed as guidelines to counter these threats. An approach to the audit of each major area of network operations is proposed. This suggested framework provides guidance to information system security officers, auditors, communications and network admin
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Aws, Hamed Hamad, Yousif Dawod Adnan, Fakhrulddin Abdulqader Mohammed, Al_Barazanchi Israa, and Muwafaq Gheni Hassan. "A secure sharing control framework supporting elastic mobile cloud computing." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 2270–77. https://doi.org/10.11591/ijece.v13i2.pp2270-2277.

Der volle Inhalt der Quelle
Annotation:
In elastic mobile cloud computing (EMCC), mobile devices migrate some computing tasks to the cloud for execution according to current needs and seamlessly and transparently use cloud resources to enhance their functions. First, based on the summary of existing EMCC schemes, a generic EMCC framework is abstracted; it is pointed out that the migration of sensitive modules in the EMCC program can bring security risks such as privacy leakage and information flow hijacking to EMCC; then, a generic framework of elastic mobile cloud computing that incorporates risk management is designed, which regar
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Dinesh, Thangaraju. "Integrated Security Control Platforms: A Unified Framework for Enterprise Data Protection and Compliance." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 6 (2024): 1–11. https://doi.org/10.5281/zenodo.15087110.

Der volle Inhalt der Quelle
Annotation:
This paper provides a comprehensive examination of integrated security control platforms that consolidate critical security functions, such as access control, governance, encryption, and compliance automation, into a unified framework. These platforms aim to address the growing complexity that enterprises face in managing security controls across their distributed on-premises, cloud, and hybrid IT environments. The research delves into the architectural components of these integrated platforms, analyzing how they enable centralized policy management, consistent enforcement mechanisms, and stre
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Wai, Eric, and C. K. M. Lee. "Seamless Industry 4.0 Integration: A Multilayered Cyber-Security Framework for Resilient SCADA Deployments in CPPS." Applied Sciences 13, no. 21 (2023): 12008. http://dx.doi.org/10.3390/app132112008.

Der volle Inhalt der Quelle
Annotation:
The increased connectivity and automation capabilities of Industry 4.0 cyber-physical production systems (CPPS) create significant cyber-security vulnerabilities in supervisory control and data acquisition (SCADA) environments if robust protections are not properly implemented. Legacy industrial control systems and new IP-enabled sensors, instruments, controllers, and appliances often lack basic safeguards like encryption, rigorous access controls, and endpoint security. This exposes manufacturers to substantial risks of cyberattacks that could manipulate, disrupt, or disable critical physical
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Ugbaja, Unomah Success, Uloma Stella Nwabekee, Wilfred Oseremen Owobu, and Olumese Anthony Abieba. "Conceptual Framework for Role-Based Network Access Management to Minimize Unauthorized Data Exposure Across IT Environments." International Journal of Social Science Exceptional Research 2, no. 1 (2023): 211–21. https://doi.org/10.54660/ijsser.2023.2.1.211-221.

Der volle Inhalt der Quelle
Annotation:
As organizations increasingly rely on digital infrastructures, managing network access securely has become a critical challenge. Unauthorized data exposure, whether due to insider threats, privilege escalation, or third-party vulnerabilities, poses significant risks to information security. This presents a conceptual framework for role-based network access management (RBNAM) to minimize unauthorized data exposure across IT environments. The framework is built on the principles of role-based access control (RBAC) and incorporates policy-based enforcement mechanisms, continuous monitoring, and a
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Amarendra Reddy, P., Sheikh Gouse, and P. Bhaskara Reddy. "Security and Privacy Mechanisms of Big Data." International Journal of Engineering & Technology 7, no. 4.39 (2018): 730–33. http://dx.doi.org/10.14419/ijet.v7i4.39.26264.

Der volle Inhalt der Quelle
Annotation:
Big Data advances in three key areas like storage, processing and analysis. Hadoop architecture is produced to store extensive measure of data through adaptable parallel handling with speed to get the outcomes. Organizations must guarantee that every single big data bases are resistant to security dangers and vulnerabilities. Amid data gathering, all the important security assurances, for example, continuous administration should to be satisfied. Remembering the big size of big data, Organizations should to recollect the way that overseeing such data could be troublesome and requires uncommon
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Mehra, Taresh. "The Evolution of Backup Security: Integrating Zero Trust, Encryption, and Access Control for Data Integrity." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem41976.

Der volle Inhalt der Quelle
Annotation:
With the increasing frequency and sophistication of cyber-attacks, ensuring the security of backup data has become a critical concern for organizations worldwide. Traditional backup security methods, often reliant on perimeter defenses and basic encryption, are no longer sufficient in the face of advanced persistent threats, insider risks, and evolving regulatory requirements. This research explores the evolution of backup security, focusing on the integration of three key security measures: Zero Trust, encryption, and access control. The Zero Trust security model, which operates on the princi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Aruljothi, A., N. Prabhu, and N. M. Mallika. "Network Security Based on Component for Information Network." Asian Journal of Computer Science and Technology 8, S1 (2019): 15–17. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1986.

Der volle Inhalt der Quelle
Annotation:
It is a difficult building to ensure the security of data arrange, so it is important to consider out a new security control design and model in the viewpoint of foundational control. As indicated by the attributes and security requests of data net, another security control viewpoint and its engineering dependent on parts is proposed, the security control framework is made-up, and insights regarding the structure of control system, its different kinds, and capacities and spread methods of security control parts are presented, at that point the highlights of the control framework are outlined a
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Hu, An Ming. "The Application Research of Lightweight J2EE Security Framework." Advanced Materials Research 989-994 (July 2014): 4342–45. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4342.

Der volle Inhalt der Quelle
Annotation:
Lightweight J2EE framework to actually use efficiency, has been widely used in all kinds of information system development,However ,Spring is open source framework, its security and access control has been problem of concern,How to construct safe and effective Web applications, is the development process of the important link must be thinking。Based on the Spring frame structure technology on the basis of summing up the access authorization control methods and strategies, highlights the Spring framework in the development process of the advantage technology.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Ali, Mohammed H., and Nisreen K. Ali. "IoT based security system and intelligent home automation multi monitoring and control systems." IAES International Journal of Robotics and Automation (IJRA) 8, no. 3 (2019): 205–10. https://doi.org/10.11591/ijra.v8i3.pp205-210.

Der volle Inhalt der Quelle
Annotation:
This paper presents the execution of savvy Smart Home with frameworks and propelled advances. A Home Automation System uses the technology of IoT for the screening and controlling of the electrical and electronic appliances at home from any remote area by essentially utilizing a Smartphone. The key control framework utilizes a remote Bluetooth system and a remote IoT strategy that gives remote access to the advanced cells. The framework configuration does not expel the current electrical switches yet it gives a more secure control over it with the low voltage utilization method. This framework
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Nicho, Mathew, Hussein Fakhry, and Charles Haiber. "An Integrated Security Governance Framework for Effective PCI DSS Implementation." International Journal of Information Security and Privacy 5, no. 3 (2011): 50–67. http://dx.doi.org/10.4018/jisp.2011070104.

Der volle Inhalt der Quelle
Annotation:
This paper analyses relevant IT governance and security frameworks/standards used in IT assurance and security to propose an integrated framework for ensuring effective PCI DSS implementation. Merchants dealing with credit cards have to comply with the Payment Card Industry Data Security Standards (PCI DSS) or face penalties for non-compliance. With more transactions based on credit cards, merchants are finding it costly and increasingly difficult to implement and interpret the PCI standard. One of the top reasons cited for merchants to fail PCI audit, and a leading factor in data theft, is th
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Binghui, ZHENG, WANG Lijing, LI Hong, and LI Xiaobao. "Technical framework for ecological security control in lakes and reservoirs." Journal of Lake Sciences 26, no. 2 (2014): 169–76. http://dx.doi.org/10.18307/2014.0201.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Naoui, Sarra, Mohamed Elhoucine Elhdhili, and Leila Azouz Saidane. "Novel Enhanced LoRaWAN Framework for Smart Home Remote Control Security." Wireless Personal Communications 110, no. 4 (2019): 2109–30. http://dx.doi.org/10.1007/s11277-019-06832-x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Pavlich-Mariscal, Jaime A., Steven A. Demurjian, and Laurent D. Michel. "A framework for security assurance of access control enforcement code." Computers & Security 29, no. 7 (2010): 770–84. http://dx.doi.org/10.1016/j.cose.2010.03.004.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

EL Yamany, Hany F., Miriam A. M. Capretz, and David S. Allison. "Intelligent security and access control framework for service-oriented architecture." Information and Software Technology 52, no. 2 (2010): 220–36. http://dx.doi.org/10.1016/j.infsof.2009.10.005.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Dehlaghi-Ghadim, Alireza, Ali Balador, Mahshid Helali Moghadam, Hans Hansson, and Mauro Conti. "ICSSIM — A framework for building industrial control systems security testbeds." Computers in Industry 148 (June 2023): 103906. http://dx.doi.org/10.1016/j.compind.2023.103906.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Nadia, Razzaq. "SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS." International Journal of Information Technology, Modeling and Computing (IJITMC) 1, August (2018): 01–22. https://doi.org/10.5281/zenodo.1435311.

Der volle Inhalt der Quelle
Annotation:
Enormous popularity of Social Networking Sites has introduced a great number of privacy risks. Even the most popular of all the social networking sites have characterized access control policies in terms of explicit tracking of the interpersonal relationships between the subjects, objects and their inter relation. In this paper we present a novel paradigm that accounts for a secure, yet sociable information flow model based on access control policies. We took advantage of real time success of the access control security policies in operating systems by implementing them on online social networ
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Kanobe, Fredrick, SP Sambo, and Billy Mathias Kalema. "Information Security Governance Framework in Public Cloud a Case in Low Resource Economies in Uganda." Journal of Innovation Information Technology and Application (JINITA) 4, no. 1 (2022): 82–92. http://dx.doi.org/10.35970/jinita.v4i1.1292.

Der volle Inhalt der Quelle
Annotation:
The study aimed at exploring the critical enablers to the development and usage of information security governance frameworks for cloud computing in Uganda. The study was motivated by the continuous information security governance challenges in the Public Cloud. The theoretical frameworks that underpinned this study included; Contingency management theory, the Risk Management framework, the Technological Organisational and Environmental (TOE) model and the Information Security Governance model. This study adopted a quantitative research approach to obtain data through a survey. Five key factor
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Kanobe, Fredrick, SP Sambo, and Billy Mathias Kalema. "Information Security Governance Framework in Public Cloud a Case in Low Resource Economies in Uganda." Journal of Innovation Information Technology and Application (JINITA) 4, no. 1 (2022): 82–92. http://dx.doi.org/10.35970/jinita.v4i1.1427.

Der volle Inhalt der Quelle
Annotation:
The study aimed at exploring the critical enablers to the development and usage of information security governance frameworks for cloud computing in Uganda. The study was motivated by the continuous information security governance challenges in the Public Cloud. The theoretical frameworks that underpinned this study included; Contingency management theory, the Risk Management framework, the Technological Organisational and Environmental (TOE) model and the Information Security Governance model. This study adopted a quantitative research approach to obtain data through a survey. Five key factor
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

H. Ali, Mohammed, and Nisreen K. Ali. "IoT based security system and intelligent home automation multi monitoring and control systems." IAES International Journal of Robotics and Automation (IJRA) 8, no. 3 (2019): 205. http://dx.doi.org/10.11591/ijra.v8i3.pp205-210.

Der volle Inhalt der Quelle
Annotation:
<p>This paper presents the execution of savvy Smart Home with frameworks and propelled advances. A Home Automation System uses the technology of IoT for the screening and controlling of the electrical and electronic appliances at home from any remote area by essentially utilizing <br /> a Smartphone. The key control framework utilizes a remote Bluetooth system and a remote IoT strategy that gives remote access to the advanced cells. The framework configuration does not expel the current electrical switches yet it gives a more secure control over it with the low voltage utilization
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Jagdish Jangid. "Secure Microservice Communication in Optical Networks." Journal of Information Systems Engineering and Management 10, no. 21s (2025): 911–26. https://doi.org/10.52783/jisem.v10i21s.3455.

Der volle Inhalt der Quelle
Annotation:
As optical network functions increasingly adopt microservice architectures, traditional con- tainer security mechanisms are proving insufficient against sophisticated attacks targeting these critical infrastructure components. This paper introduces a novel framework for securing microser- vice communications in optical networks through the application of Memory Protection Keys (MPK) for enhanced container isolation. Converging containerization technologies with optical networking introduces unique security challenges, particularly in maintaining isolation between sensitive optical control func
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Yu, Zhi Wei. "A Business Process-Based Risk Evaluation Framework." Advanced Materials Research 230-232 (May 2011): 1024–28. http://dx.doi.org/10.4028/www.scientific.net/amr.230-232.1024.

Der volle Inhalt der Quelle
Annotation:
To present the essence of information system risk evaluation and improve the effect of evaluation, the paper puts forward a business process-based information system risk evaluation after analyzing the current risk evaluation methods. The framework begins with the description of business process in perspective of information security and then analyzes and assesses the business activities. The risk-control evaluation of business activities is brought forward and the optional security control measures are comprehensively evaluated so as to ensure security of business activities. The framework fo
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Alrashede, Hamad, Fathy Eassa, Abdullah Marish Ali, Faisal Albalwy, and Hosam Aljihani. "A Blockchain-Based Security Framework for East-West Interface of SDN." Electronics 13, no. 19 (2024): 3799. http://dx.doi.org/10.3390/electronics13193799.

Der volle Inhalt der Quelle
Annotation:
Software-Defined Networking (SDN) has emerged as a revolutionary architecture in computer networks, offering comprehensive network control and monitoring capabilities. However, securing the east–west interface, which is crucial for communication between distributed SDN controllers, remains a significant challenge. This study proposes a novel blockchain-based security framework that integrates Ethereum technology with customized blockchain algorithms for authentication, encryption, and access control. The framework introduces decentralized mechanisms to protect against diverse attacks, includin
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Tung, Shu Chu, Wu Jeng Li, and Shih Miao Huang. "Home Security Service and Condition Control." Applied Mechanics and Materials 479-480 (December 2013): 661–64. http://dx.doi.org/10.4028/www.scientific.net/amm.479-480.661.

Der volle Inhalt der Quelle
Annotation:
This research creates home security service with social interaction based on a web-based multiple stations supervisory control framework. An Arduino controller is used as a thin-controller to control a home security system. Most control laws are computed in server-side, driving commands are transferred to local controllers for execution. A supervisory control server kept in a company can serve numerous Arduino controllers to provide home security service. The Arduino controller can sense door switch, motion detection, smoke detection, gas detection, CO detection, and an emergency button, and c
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Patel, Subhash Chandra, Sumit Jaiswal, Ravi Shankar Singh, and Jyoti Chauhan. "Access Control Framework Using Multi-Factor Authentication in Cloud Computing." International Journal of Green Computing 9, no. 2 (2018): 1–15. http://dx.doi.org/10.4018/ijgc.2018070101.

Der volle Inhalt der Quelle
Annotation:
The most challenging issues in cloud computing are access control and data security because users of the cloud outsource sensitive data and information to cloud provider servers, which are not within the same trusted domain as the data owner. Within cloud computing, various services and resources need protection from unauthorized use as a part of the security. Authentication is a key technology for information security. In recent years, a lot of research has been carried out throughout the world and several schemes have been proposed to improve authentication in the cloud. Remote authenticatio
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Wang, Chun Lei, Qing Miao, Lan Fang, and Yi Qi Dai. "A Novel Framework for Industrial Control System Malicious Code Analysis." Advanced Materials Research 765-767 (September 2013): 1936–42. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1936.

Der volle Inhalt der Quelle
Annotation:
industrial Control System (ICS) performs the tasks of supervisory control and data acquisition of critical infrastructures. With the widely application of computer and network techniques, ICS suffers serious security threats, and malicious codes are one of the most serious security problems. However, there is absent of analysis methods specific for ICS malicious code behaviors in current times. In this paper, a framework for ICS malicious code analysis is presented. Firstly, the ICS attack graph model is established based upon the hierarchical structure of industrial control system and the suf
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Mohajan, Avoy, and Sharmin Jahan. "Embedding Security Awareness into a Blockchain-Based Dynamic Access Control Framework for the Zero Trust Model in Distributed Systems." Electronics 14, no. 6 (2025): 1095. https://doi.org/10.3390/electronics14061095.

Der volle Inhalt der Quelle
Annotation:
The Zero Trust (ZT) model is pivotal in enhancing the security of distributed systems by emphasizing rigorous identity verification, granular access control (AC), and continuous monitoring. To address the complexity and scalability challenges of modern distributed systems, we propose a blockchain-based dynamic access control scheme (DACS) as a practical solution for implementing ZT principles. This framework dynamically manages access control lists (ACLs) and enforces policies through smart contracts. In the DACS framework, each blockchain node maintains an object list specifying access permis
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Narendra Chennupati. "Securing the Automated Enterprise: A Framework for Mitigating Security and Privacy Risks in AI-Driven Workflow Automation." Journal of Computer Science and Technology Studies 7, no. 3 (2025): 624–32. https://doi.org/10.32996/jcsts.2025.7.3.71.

Der volle Inhalt der Quelle
Annotation:
This article examines the evolving security and privacy challenges faced by enterprises implementing AI-driven workflow automation technologies. As organizations increasingly deploy artificial intelligence and robotic process automation to enhance operational efficiency, they simultaneously introduce novel security vulnerabilities and privacy concerns that traditional cybersecurity frameworks may inadequately address. Through a comprehensive analysis of current security practices, regulatory requirements, and emerging threats, this article proposes an integrated framework for risk mitigation i
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Ramaswamy, Mithilesh. "Enhancing Security in Bring Your Own Device Environments (BYOD) with Trusted Platform Modules, Continuous Monitoring, and Hardware Security Modules." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem6838.

Der volle Inhalt der Quelle
Annotation:
Bring Your Own Device (BYOD) policies have transformed organizational workflows, offering flexibility, cost savings, and increased employee satisfaction. However, they also introduce significant security challenges due to device heterogeneity, inconsistent security configurations, and increased attack surfaces. This paper proposes a comprehensive security framework tailored to BYOD environments, integrating Trusted Platform Modules (TPMs) for device attestation, Hardware Security Modules (HSMs) for secure key management, continuous monitoring for real-time threat detection, and dynamic access
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Agboola, Rihanat Bola, Zaharaddeen Salele Iro, Jamilu Awwalu, and Ibrahim Nasir Said. "Database security framework design using tokenization." Dutse Journal of Pure and Applied Sciences 8, no. 1b (2022): 16–26. http://dx.doi.org/10.4314/dujopas.v8i1b.3.

Der volle Inhalt der Quelle
Annotation:
One of the challenging tasks in database management system today is protecting sensitive data that are complex in the database system. Most organization opt for implementation of data encryption which is one of the most effective security control mechanism, but data encryption only render information unreadable to those that do not have the secret decryption key. The core issue with data encryption techniques is that, it is reversibly. In these regards, sensitive data need to be tokenized first before encrypting for better security. Therefore, this work is introducing tokenization technique. T
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!