Academic literature on the topic 'Security control framework'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security control framework.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security control framework"

1

Wang, Yu Fei, Tao Zhang, Yuan Yuan Ma, and Bo Zhang. "An Information Security Assessments Framework for Power Control Systems." Advanced Materials Research 805-806 (September 2013): 980–84. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.980.

Full text
Abstract:
Information and cyber security of Industrial Control Systems (ICS) faces severe challenges and has gained considerable importance. Information security assessment is an essential component of information security assurance infrastructure mechanisms. First, a hierarchical model of smart grid was abstracted. Based on the proposed model and the information security risks and information security protection demands of power control systems, an information security assessments framework for power control systems was proposed in dimensions of system layers and life cycle to guide the security assessment contents of power control systems. Finally, a test bed function design for power control system security assessment was proposed. The power control system security test bed may include four parts, such as power control system security assessment management platform, power control system simulation environment, security assessment tools, and security policy. The proposed security assessment framework and test bed functional design can be used to guide the electric power utilities in their power control system information security efforts.
APA, Harvard, Vancouver, ISO, and other styles
2

Al Ketbi, Maitha, Khaled Shuaib, Ezedin Barka, and Marton Gergely. "Establishing a Security Control Framework for Blockchain Technology." Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 307–30. http://dx.doi.org/10.28945/4837.

Full text
Abstract:
Aim/Purpose: The aim of this paper is to propose a new information security controls framework for blockchain technology, which is currently absent from the National and International Information Security Standards. Background: Blockchain technology is a secure and relatively new technology of distributed digital ledgers, which is based on inter-linked blocks of transactions, providing great benefits such as decentralization, transparency, immutability, and automation. There is a rapid growth in the adoption of blockchain technology in different solutions and applications and within different industries throughout the world, such as finance, supply chain, digital identity, energy, healthcare, real estate, and the government sector. Methodology: Risk assessment and treatments were performed on five blockchain use cases to determine their associated risks with respect to security controls. Contribution: The significance of the proposed security controls is manifested in complementing the frameworks that were already established by the International and National Information Security Standards in order to keep pace with the emerging blockchain technology and prevent/reduce its associated information security risks. Findings: The analysis results showed that the proposed security controls herein can mitigate relevant information security risks in blockchain-based solutions and applications and, consequently, protect information and assets from unauthorized disclosure, modification, and destruction. Recommendations for Practitioners: The performed risk assessment on the blockchain use cases herein demonstrates that blockchain can involve security risks that require the establishment of certain measures in order to avoid them. As such, practitioners should not blindly assume that through the use of blockchain all security threats are mitigated. Recommendation for Researchers: The results from our study show that some security risks not covered by existing Standards can be mitigated and reduced when applying our proposed security controls. In addition, researchers should further justify the need for such additional controls and encourage the standardization bodies to incorporate them in their future editions. Impact on Society: Similar to any other emerging technology, blockchain has several drawbacks that, in turn, could have negative impacts on society (e.g., individuals, entities and/or countries). This is mainly due to the lack of a solid national and international standards for managing and mitigating risks associated with such technology. Future Research: The majority of the blockchain use cases in this study are publicly published papers. Therefore, one limitation of this study is the lack of technical details about these respective solutions, resulting in the inability to perform a comprehensive risk identification properly. Hence, this area will be expanded upon in our future work. In addition, covering other standardization bodies in the area of distributed ledger in blockchain technology would also prove fruitful, along with respective future design of relevant security architectures.
APA, Harvard, Vancouver, ISO, and other styles
3

Lu, Bo, Ruohan Cao, Luyao Tian, Hao Wang, and Yueming Lu. "FMNISCF: Fine-Grained Multi-Domain Network Interconnection Security Control Framework." Applied Sciences 10, no. 1 (January 6, 2020): 409. http://dx.doi.org/10.3390/app10010409.

Full text
Abstract:
The integrated air-ground multi-domain network provides users with a set of shared infrastructures. Security policies can be defined flexibly in the context of multi-domain network semantics. The packet filter module in the security gateway can run efficiently, which is an urgent requirement in this network environment. The framework combined with multi-domain network semantics implements the transformation into rules. It replaces the traditional manual method of configuring rules. The framework supports the whole life cycle management of rules from generation state and distribution state to execution state. In the aspect of security, the map security and semantic security are analyzed and optimized, respectively. Finally, through a series of experiments, compared with iptables/DPDK-IPFW/BSD-IPFW/BSD-pfsense, the high efficiency of the scheme is verified.
APA, Harvard, Vancouver, ISO, and other styles
4

Jamieson, Rodger, and Graham Low. "Local Area Network Operations: A Security, Control and Audit Perspective." Journal of Information Technology 5, no. 2 (June 1990): 63–72. http://dx.doi.org/10.1177/026839629000500202.

Full text
Abstract:
This paper provides a framework for the review of security and control within a local area network environment. Network operations are subdivided into several functional areas or components for further review. Each component or area is briefly explained and the security risks, issues and concerns highlighted. Controls and security measures are proposed as guidelines to counter these threats. An approach to the audit of each major area of network operations is proposed. This suggested framework provides guidance to information system security officers, auditors, communications and network administrators, consultants and information systems management for the review of local area network security during network operations.
APA, Harvard, Vancouver, ISO, and other styles
5

CHEN, TSUNG-YI. "A MULTIPLE-LAYER KNOWLEDGE MANAGEMENT SYSTEM FRAMEWORK CONSIDERING USER KNOWLEDGE PRIVILEGES." International Journal of Software Engineering and Knowledge Engineering 19, no. 03 (May 2009): 361–87. http://dx.doi.org/10.1142/s0218194009004192.

Full text
Abstract:
Success in a knowledge economy requires effectively using existing knowledge to create new knowledge. Security for knowledge sharing in enterprises is critical for protecting intellectual assets. This study develops the functional framework of a knowledge management system (KMS) with knowledge access control for effectively and securely sharing knowledge within an enterprise or across teams. The functional framework of the proposed KMS includes the following nine layers: user interface layer, knowledge access control and security layer, knowledge representation layer, knowledge process layer, conceptual knowledge layer, knowledge index layer, transport layer, middleware layer and physical knowledge layer. A method of conceptual knowledge representation in the knowledge representation layer is then proposed. Finally, an ontology-based knowledge access control model based on role-based access control (RBAC) model and the conceptual knowledge representation method is proposed for managing user knowledge privileges in a knowledge sharing enterprise. The proposed method can enhance (1) precision in describing knowledge and knowledge relationships, (2) ensure security of knowledge access and sharing within an enterprise and (3) accurately and rapidly identify user knowledge access privileges.
APA, Harvard, Vancouver, ISO, and other styles
6

Binghui, ZHENG, WANG Lijing, LI Hong, and LI Xiaobao. "Technical framework for ecological security control in lakes and reservoirs." Journal of Lake Sciences 26, no. 2 (2014): 169–76. http://dx.doi.org/10.18307/2014.0201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

EL Yamany, Hany F., Miriam A. M. Capretz, and David S. Allison. "Intelligent security and access control framework for service-oriented architecture." Information and Software Technology 52, no. 2 (February 2010): 220–36. http://dx.doi.org/10.1016/j.infsof.2009.10.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Naoui, Sarra, Mohamed Elhoucine Elhdhili, and Leila Azouz Saidane. "Novel Enhanced LoRaWAN Framework for Smart Home Remote Control Security." Wireless Personal Communications 110, no. 4 (November 16, 2019): 2109–30. http://dx.doi.org/10.1007/s11277-019-06832-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pavlich-Mariscal, Jaime A., Steven A. Demurjian, and Laurent D. Michel. "A framework for security assurance of access control enforcement code." Computers & Security 29, no. 7 (October 2010): 770–84. http://dx.doi.org/10.1016/j.cose.2010.03.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hu, An Ming. "The Application Research of Lightweight J2EE Security Framework." Advanced Materials Research 989-994 (July 2014): 4342–45. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4342.

Full text
Abstract:
Lightweight J2EE framework to actually use efficiency, has been widely used in all kinds of information system development,However ,Spring is open source framework, its security and access control has been problem of concern,How to construct safe and effective Web applications, is the development process of the important link must be thinking。Based on the Spring frame structure technology on the basis of summing up the access authorization control methods and strategies, highlights the Spring framework in the development process of the advantage technology.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Security control framework"

1

Viljoen, Melanie. "A framework towards effective control in information security governance." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/887.

Full text
Abstract:
The importance of information in business today has made the need to properly secure this asset evident. Information security has become a responsibility for all managers of an organization. To better support more efficient management of information security, timely information security management information should be made available to all managers. Smaller organizations face special challenges with regard to information security management and reporting due to limited resources (Ross, 2008). This dissertation discusses a Framework for Information Security Management Information (FISMI) that aims to improve the visibility and contribute to better management of information security throughout an organization by enabling the provision of summarized, comprehensive information security management information to all managers in an affordable manner.
APA, Harvard, Vancouver, ISO, and other styles
2

Benjuma, Nuria Mahmud. "An educational framework to support industrial control system security engineering." Thesis, De Montfort University, 2017. http://hdl.handle.net/2086/15494.

Full text
Abstract:
Industrial Control Systems (ICSs) are used to monitor and control critical infrastructure such as electricity and water. ICS were originally stand-alone systems, but are now widely being connected to corporate national IT networks, making remote monitoring and more timely control possible. While this connectivity has brought multiple benefits to ICS, such as cost reductions and an increase in redundancy and flexibility, ICS were not designed for open connectivity and therefore are more prone to security threats, creating a greater requirement for adequate security engineering approaches. The culture gap between developers and security experts is one of the main challenges of ICS security engineering. Control system developers play an important role in building secure systems; however, they lack security training and support throughout the development process. Security training, which is an essential activity in the defence-indepth strategy for ICS security, has been addressed, but has not been given sufficient attention in academia. Security support is a key means by which to tackle this challenge via assisting developers in ICS security by design. This thesis proposes a novel framework, the Industrial Control System Security Engineering Support (ICS-SES), which aims to help developers in designing secure control systems by enabling them to reuse secure design patterns and improve their security knowledge. ICS-SES adapts pattern-based approach to guide developers in security engineering, and an automated planning technique to provide adaptive on-the-job security training tailored to personal needs. The usability of ICS-SES has been evaluated using an empirical study in terms of its effectiveness in assisting the design of secure control systems and improving developers’ security knowledge. The results show that ICS-SES can efficiently help control system designers to mitigate security vulnerabilities and improve their security knowledge, reducing the difficulties associated with the security engineering process, and the results have been found to be statically significant. In summary, ICS-SES provides a unified method of supporting an ICS security by design approach. It fosters a development environment where engineers can improve their security knowledge while working in a control system production line.
APA, Harvard, Vancouver, ISO, and other styles
3

Huang, Qing. "An extension to the Android access control framework." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064.

Full text
Abstract:
Several nice hardware functionalities located at the low level of operating system onmobile phones could be utilized in a better way if they are available to applicationdevelopers. With their help, developers are able to bring overall user experienceto a new level in terms of developing novel applications. For instance, one of thosehardware functionalities, SIM-card authentication is able to offer stronger andmore convenient way of authentication when compared to the traditional approach.Replacing the username-password combination with the SIM-card authentication,users are freed from memorizing passwords. However, since normally those kindsof functionalities are locked up at the low level, they are only accessible by a fewusers who have been given privileged access rights. To let the normal applicationsbe benefiting as well, they need to be made accessible at the application level. Onthe one hand, as we see the benefit it will bring to us, there is a clear intentionto open it up, however, on the other hand, there is also a limitation resultingfrom their security-critical nature that needs to be placed when accessing whichis restricting the access to trusted third parties. Our investigation is based on the Android platform. The problem that we havediscovered is the existing security mechanism in Android is not able to satisfy everyregards of requirements we mentioned above when exposing SIM-card authenticationfunctionality. Hence, our requirement on enhancing the access control modelof Android comes naturally. In order to better suit the needs, we proposed a solutionWhite lists & Domains (WITDOM) to improve its current situation in thethesis. The proposed solution is an extension to the existing access control modelin Android that allows alternative ways to specify access controls therefore complementingthe existing Android security mechanisms. We have both designedand implemented the solution and the result shows that with the service that weprovided, critical functionalities, such as APIs for the low-level hardware functionalitycan retain the same level of protection however in the meanwhile, with moreflexible protection mechanism.
APA, Harvard, Vancouver, ISO, and other styles
4

Okere, Irene Onyekachi. "A control framework for the assessment of information security culture." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1019861.

Full text
Abstract:
The modern organisation relies heavily on information to function effectively. With such reliance on information, it is vital that information be protected from both internal (employees) and external threats. The protection of information or information security to a large extent depends on the behaviour of humans (employees) in the organisation. The behaviour of employees is one of the top information security issues facing organisations as the human factor is regarded as the weakest link in the security chain. To address this human factor many researchers have suggested the fostering of a culture of information security so that information security becomes second nature to employees. Information security culture as defined for this research study exists in four levels namely artefacts, espoused values, shared tacit assumptions and information security knowledge. An important step in the fostering of an information security culture is the assessment of the current state of such a culture. Gaps in current approaches for assessing information security culture were identified and this research study proposes the use of a control framework to address the identified gaps. This research study focuses on the assessment of information security culture and addresses 5 research objectives namely 1) to describe information security culture in the field of information security, 2) to determine ways to foster information security culture in an organisation, 3) to demonstrate the gap in current approaches used to assess information security culture, 4) to determine the components that could be used for the assessment of information security culture for each of the culture’s underlying levels and 5) to describe a process for the assessment of information security culture for all four levels. This research study follows a qualitative approach utilising a design science strategy and multi-method qualitative data collection techniques including literature review, qualitative content analysis, argumentation, and modelling techniques. The research methods provide a means for the interpretation of the data and the development of the proposed control framework.
APA, Harvard, Vancouver, ISO, and other styles
5

Marin, Luis Franco. "SELinux policy management framework for HIS." Queensland University of Technology, 2008. http://eprints.qut.edu.au/26358/.

Full text
Abstract:
Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while managing healthcare information. Protecting the security and privacy of healthcare information is a very complex task (Liu, May, Caelli and Croll, 2008b). In order to simplify the complexity of providing security and privacy in HIS, appropriate information security services and mechanisms have to be implemented. Solutions at the application layer have already been implemented in HIS such as those existing in healthcare web services (Weaver et al., 2003). In addition, Discretionary Access Control (DAC) is the most commonly implemented access control model to restrict access to resources at the OS layer (Liu, Caelli, May, Croll and Henricksen, 2007a). Nevertheless, the combination of application security mechanisms and DAC at the OS layer has been stated to be insufficient in satisfying security requirements in computer systems (Loscocco et al., 1998). This thesis investigates the feasibility of implementing Security Enhanced Linux (SELinux) to enforce a Role-Based Access Control (RBAC) policy to help protect resources at the Operating System (OS) layer. SELinux provides Mandatory Access Control (MAC) mechanisms at the OS layer. These mechanisms can contain the damage from compromised applications and restrict access to resources according to the security policy implemented. The main contribution of this research is to provide a modern framework to implement and manage SELinux in HIS. The proposed framework introduces SELinux Profiles to restrict access permissions over the system resources to authorised users. The feasibility of using SELinux profiles in HIS was demonstrated through the creation of a prototype, which was submitted to various attack scenarios. The prototype was also subjected to testing during emergency scenarios, where changes to the security policies had to be made on the spot. Attack scenarios were based on vulnerabilities common at the application layer. SELinux demonstrated that it could effectively contain attacks at the application layer and provide adequate flexibility during emergency situations. However, even with the use of current tools, the development of SELinux policies can be very complex. Further research has to be made in order to simplify the management of SELinux policies and access permissions. In addition, SELinux related technologies, such as the Policy Management Server by Tresys Technologies, need to be researched in order to provide solutions at different layers of protection.
APA, Harvard, Vancouver, ISO, and other styles
6

Runsewe, Olubisi Atinuke. "A Policy-Based Management Framework for Cloud Computing Security." Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31503.

Full text
Abstract:
Cloud Computing has changed how computing is done as applications and services are being consumed from the cloud. It has attracted a lot of attention in recent times due to the opportunities it offers. While Cloud Computing is economical, the security challenges it poses are quite significant and this has affected the adoption rate of the technology. With the potential vulnerabilities being introduced by moving data to the cloud, it has become imperative for cloud service providers to guarantee the security of information, leaving cloud service consumers (e.g., enterprises) with the task of negotiating the terms and conditions of services provided by the cloud service providers as well as trusting them with their data. Although various security solutions used for addressing the security of data within the enterprises are now being applied to the cloud, these security solutions are challenged due to the dynamic, distributed and complex nature of the cloud technology. This thesis proposes a novel Policy-Based Management (PBM) framework capable of achieving cross-tenant authorization, handling dynamic and anonymous users while reducing the security management task to address cloud security. The framework includes an access control model adapted to the cloud environment that adopts features from role-based, task-based and attribute-based access control frameworks for a fine-grained access control. We demonstrate how this framework can be applied to develop an access control system for an enterprise using cloud services. The framework verifies the correctness of access control policies for cloud security through reasoning technique.
APA, Harvard, Vancouver, ISO, and other styles
7

Radhakrishnan, Sakthi Vignesh. "A framework for system fingerprinting." Thesis, Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47609.

Full text
Abstract:
The primary objective of the proposed research is to develop a framework for smart and robust fingerprinting of networked systems. Many fingerprinting techniques have been proposed in the past, however most of these techniques are designed for a specific purpose, such as Operating System (OS) fingerprinting, Access Point (AP) fingerprinting, etc. Such standalone techniques often have limitations which render them dysfunctional in certain scenarios or against certain counter measures. In order to overcome such limitations, we propose a fingerprinting framework that can combine multiple fingerprinting techniques in a smart manner, using a centralized decision making engine. We believe that any given scenario or a counter measure is less likely to circumvent a group of diverse fingerprinting techniques, which serves as the primary motivation behind the aforementioned method of attack. Another major portion of the thesis concentrates on the design and development of a device and device type fingerprinting sub-module (GTID) that has been integrated into the proposed framework. This sub-module used statistical analysis of packet inter arrival times (IATs) to identify the type of device that is generating the traffic. This work also analyzes the performance of the identification technique on a real campus network and propose modifications that use pattern recognition neural networks to improve the overall performance. Additionally, we impart capabilities to the fingerprinting technique to enable the identification of 'Unknown' devices (i.e., devices for which no signature is stored), and also show that it can be extended to perform both device and device type identification.
APA, Harvard, Vancouver, ISO, and other styles
8

Klosinski, Vance J. "Population and resource control measures a conceptual framework for understanding and implementation." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FKlosinski.pdf.

Full text
Abstract:
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, December 2009.
Thesis Advisor(s): Simmons, Anna. Second Reader: Lee, Doowan. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Population and resource control measures, Population control, Counterinsurgency, COIN, Populationcentric COIN, Social control, Social movement theory. Includes bibliographical references (p. 51-53). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
9

Sunkaralakunta, Venkatarama Reddy Rakesh. "A User-Centric Security Policy Enforcement Framework for Hybrid Mobile Applications." University of Dayton / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1564744609523447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Manning, Francis Jay. "A Framework for Enforcing Role Based Access Control in Open Source Software." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/228.

Full text
Abstract:
While Role Based Access Control (RBAC) has been a popular topic of research over the last several years, there are some gaps in the literature that have been waiting to be addressed. One of these gaps involves the application of RBAC to free and open source software (FOSS). With the prevalence of FOSS in most information systems growing rapidly, there is a need to be able to provide a level of confidence that the software will not compromise the data integrity of an environment, nor will it enable the violation of established access controls. Additionally, when utilizing FOSS software it is desirable to do so without having to modify its source code whenever an update is released in order to maintain a secure environment; this makes adding proprietary modules both time consuming and expensive. The challenges involved in maintaining proprietary changes to FOSS generates a particular interest in an RBAC environment that could be deployed without requiring modification to the source code. Developing this type of a framework presented a significant challenge due to the software having been established prior to the definition of any security requirements that would have to be applied by the proposed framework. What this research paper shows are the results of the development of a software framework that allowed security requirements engineering to seamlessly meld with an application after it had already been developed. This framework provided a mechanism to measurably reduce the attack surface of the application against which the framework was implemented, while performing these tasks without requiring alterations to the source code of the application. Additionally, this research introduced a mechanism that was utilized to measure the effectiveness of the framework. This mechanism provided a means of comparing the relative effectiveness of different frameworks against the same software, as well as the effectiveness of a framework against different pieces of software.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Security control framework"

1

Victoria. Office of the Auditor-General. WoVG information security management framework. Melbourne, Vic: Victorian Government Printer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

President's Council on Integrity and Efficiency (U.S.), ed. Model framework for management control over automated information system. Washington, D.C: Executive Office of the President, Office of Management and Budget, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fighting computer crime: A new framework for protecting information. New York: Wiley, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Designing an IAM framework with Oracle Identity and access management suite. New York: McGraw-Hill, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ottawa Verification Symposium (15th 1998 Montebello, Québec). Arms control and the rule of law: A framework for peace and security in outer space : proceedings of the Fifteenth Annual Ottawa NACD Verification Symposium. Toronto: Centre for International and Security Studies, York University, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Marshall, Beier J., Mataija Steven, and York Centre for International and Strategic Studies., eds. Arms control and the rule of law: A framework for peace and security in outer space : proceedings of the Fifteenth Annual Ottawa NACD Verification Symposium. Toronto,Canada: Centre for International and Security Studies, York University, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nemati, Hamid R. Privacy solutions and security frameworks in information protection. Hershey, PA: Information Science Reference, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Office, General Accounting. Defense inventory: Improved management framework needed to guide Army best practice initiatives : report to Congressional committees. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Office, General Accounting. Defense inventory: Improved management framework needed to guide Air Force best practice initiatives : report to congressional committees. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Office, General Accounting. Defense inventory: DOD could improve Total Asset Visibility initiative with Results Act framework : report to Congressional requesters. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Security control framework"

1

Tikk-Ringas, Eneken. "Legal Framework of Cyber Security." In Intelligent Systems, Control and Automation: Science and Engineering, 109–27. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18302-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nabhen, Ricardo, Edgard Jamhour, and Carlos Maziero. "A Policy Based Framework for Access Control." In Information and Communications Security, 47–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39927-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kayes, A. S. M., Jun Han, and Alan Colman. "ICAF: A Context-Aware Framework for Access Control." In Information Security and Privacy, 442–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31448-3_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Posthumus, Shaun, and Rossouw von Solms. "A Responsibility Framework for Information Security." In Security Management, Integrity, and Internal Control in Information Systems, 205–21. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/0-387-31167-x_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Maity, Soumya, and Soumya K. Ghosh. "A Cognitive Trust Model for Access Control Framework in MANET." In Information Systems Security, 75–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chau, Ngoc-Tu, Minh-Duong Nguyen, Seungwook Jung, and Souhwan Jung. "SecaaS Framework and Architecture: A Design of Dynamic Packet Control." In Information Security Applications, 190–201. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15087-1_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Shiping, Duminda Wijesekera, and Sushil Jajodia. "FlexFlow: A Flexible Flow Control Policy Specification Framework." In Data and Applications Security XVII, 358–71. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8070-0_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhu, Quanyan, and Zhiheng Xu. "A Game Framework to Secure Control of CBTC Systems." In Advances in Information Security, 91–114. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-60251-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gow, James, and Ivan Zverzžhanovski. "Rules: The Legal and Institutional Framework for Democratic Control." In Security, Democracy and War Crimes, 83–100. London: Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137276148_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Crampton, Jason, and Michael Huth. "Towards an Access-Control Framework for Countering Insider Threats." In Insider Threats in Cyber Security, 173–95. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security control framework"

1

Berhe, Abraham Belay, Ki-Hyung Kim, and Gebere Akele Tizazu. "Industrial control system security framework for ethiopia." In 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 2017. http://dx.doi.org/10.1109/icufn.2017.7993912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Aftab, Farooq, Shaldon Leparan Suntu, and Zhongshan Zhang. "Self-Organized Security Framework for WiGig WLAN against Attacks and Threats." In 2018 13th APCA International Conference on Automatic Control and Soft Computing (CONTROLO). IEEE, 2018. http://dx.doi.org/10.1109/controlo.2018.8439750.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Marina, Ninoslav, Aneta Velkoska, Natasha Paunkoska, and Ljupcho Baleski. "Security in Twin-code framework." In 2015 7th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, 2015. http://dx.doi.org/10.1109/icumt.2015.7382437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shrivas, Mahendra Kumar, Thomas Yeboah, and S. Selva Brunda. "Hybrid Security Framework for Blockchain Platforms." In 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T). IEEE, 2020. http://dx.doi.org/10.1109/icpc2t48082.2020.9071477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Prunicki, Andrew, and Tzilla Elrad. "Aclamate: An AOSD Security Framework for Access Control." In 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing. IEEE, 2006. http://dx.doi.org/10.1109/dasc.2006.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Krishnan, K. Navaneeth, Roopesh Jenu, Tintu Joseph, and M. L. Silpa. "Blockchain Based Security Framework for IoT Implementations." In 2018 International CET Conference on Control, Communication, and Computing (IC4). IEEE, 2018. http://dx.doi.org/10.1109/cetic4.2018.8531042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Anitha Kumari, K., G. Sudha Sadasivam, R. Senthil Prabha, and G. Saranya. "Grid Based Security Framework for Online Trading." In 2011 International Conference on Process Automation, Control and Computing (PACC). IEEE, 2011. http://dx.doi.org/10.1109/pacc.2011.5978864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tao, Guo, Zhang Puhan, and Liang Hongliang. "Access Control Framework for Android System." In 1st International Workshop on Cloud Computing and Information Security. Paris, France: Atlantis Press, 2013. http://dx.doi.org/10.2991/ccis-13.2013.48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Neisse, Ricardo, Alexander Pretschner, and Valentina Di Giacomo. "A Trustworthy Usage Control Enforcement Framework." In 2011 Sixth International Conference on Availability, Reliability and Security (ARES). IEEE, 2011. http://dx.doi.org/10.1109/ares.2011.40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mohamed, Yasir Abdelgadir, and Azween B. Abdullah. "Immune inspired framework for ad hoc network security." In 2009 IEEE International Conference on Control and Automation (ICCA). IEEE, 2009. http://dx.doi.org/10.1109/icca.2009.5410147.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security control framework"

1

Wayne F. Boyer and Miles A. McQueen. Primer Control System Cyber Security Framework and Technical Metrics. Office of Scientific and Technical Information (OSTI), May 2008. http://dx.doi.org/10.2172/935471.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Robert P. Evans. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements. Office of Scientific and Technical Information (OSTI), September 2005. http://dx.doi.org/10.2172/911771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Long, Michael, Daniel Bush, Stephen Briggs, Tapan Patel, Eileen Westervelt, Daniel Shepard, Eric Lynch, and David Schwenk. An Army guide to navigating the cyber security process for Facility Related Control Systems : cybersecurity and risk management framework explanations for the real world. Engineer Research and Development Center (U.S.), January 2020. http://dx.doi.org/10.21079/11681/35294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography