Academic literature on the topic 'Security control framework'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security control framework.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security control framework"
Wang, Yu Fei, Tao Zhang, Yuan Yuan Ma, and Bo Zhang. "An Information Security Assessments Framework for Power Control Systems." Advanced Materials Research 805-806 (September 2013): 980–84. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.980.
Full textAl Ketbi, Maitha, Khaled Shuaib, Ezedin Barka, and Marton Gergely. "Establishing a Security Control Framework for Blockchain Technology." Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 307–30. http://dx.doi.org/10.28945/4837.
Full textLu, Bo, Ruohan Cao, Luyao Tian, Hao Wang, and Yueming Lu. "FMNISCF: Fine-Grained Multi-Domain Network Interconnection Security Control Framework." Applied Sciences 10, no. 1 (January 6, 2020): 409. http://dx.doi.org/10.3390/app10010409.
Full textJamieson, Rodger, and Graham Low. "Local Area Network Operations: A Security, Control and Audit Perspective." Journal of Information Technology 5, no. 2 (June 1990): 63–72. http://dx.doi.org/10.1177/026839629000500202.
Full textCHEN, TSUNG-YI. "A MULTIPLE-LAYER KNOWLEDGE MANAGEMENT SYSTEM FRAMEWORK CONSIDERING USER KNOWLEDGE PRIVILEGES." International Journal of Software Engineering and Knowledge Engineering 19, no. 03 (May 2009): 361–87. http://dx.doi.org/10.1142/s0218194009004192.
Full textBinghui, ZHENG, WANG Lijing, LI Hong, and LI Xiaobao. "Technical framework for ecological security control in lakes and reservoirs." Journal of Lake Sciences 26, no. 2 (2014): 169–76. http://dx.doi.org/10.18307/2014.0201.
Full textEL Yamany, Hany F., Miriam A. M. Capretz, and David S. Allison. "Intelligent security and access control framework for service-oriented architecture." Information and Software Technology 52, no. 2 (February 2010): 220–36. http://dx.doi.org/10.1016/j.infsof.2009.10.005.
Full textNaoui, Sarra, Mohamed Elhoucine Elhdhili, and Leila Azouz Saidane. "Novel Enhanced LoRaWAN Framework for Smart Home Remote Control Security." Wireless Personal Communications 110, no. 4 (November 16, 2019): 2109–30. http://dx.doi.org/10.1007/s11277-019-06832-x.
Full textPavlich-Mariscal, Jaime A., Steven A. Demurjian, and Laurent D. Michel. "A framework for security assurance of access control enforcement code." Computers & Security 29, no. 7 (October 2010): 770–84. http://dx.doi.org/10.1016/j.cose.2010.03.004.
Full textHu, An Ming. "The Application Research of Lightweight J2EE Security Framework." Advanced Materials Research 989-994 (July 2014): 4342–45. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4342.
Full textDissertations / Theses on the topic "Security control framework"
Viljoen, Melanie. "A framework towards effective control in information security governance." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/887.
Full textBenjuma, Nuria Mahmud. "An educational framework to support industrial control system security engineering." Thesis, De Montfort University, 2017. http://hdl.handle.net/2086/15494.
Full textHuang, Qing. "An extension to the Android access control framework." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064.
Full textOkere, Irene Onyekachi. "A control framework for the assessment of information security culture." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1019861.
Full textMarin, Luis Franco. "SELinux policy management framework for HIS." Queensland University of Technology, 2008. http://eprints.qut.edu.au/26358/.
Full textRunsewe, Olubisi Atinuke. "A Policy-Based Management Framework for Cloud Computing Security." Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31503.
Full textRadhakrishnan, Sakthi Vignesh. "A framework for system fingerprinting." Thesis, Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47609.
Full textKlosinski, Vance J. "Population and resource control measures a conceptual framework for understanding and implementation." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FKlosinski.pdf.
Full textThesis Advisor(s): Simmons, Anna. Second Reader: Lee, Doowan. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Population and resource control measures, Population control, Counterinsurgency, COIN, Populationcentric COIN, Social control, Social movement theory. Includes bibliographical references (p. 51-53). Also available in print.
Sunkaralakunta, Venkatarama Reddy Rakesh. "A User-Centric Security Policy Enforcement Framework for Hybrid Mobile Applications." University of Dayton / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1564744609523447.
Full textManning, Francis Jay. "A Framework for Enforcing Role Based Access Control in Open Source Software." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/228.
Full textBooks on the topic "Security control framework"
Victoria. Office of the Auditor-General. WoVG information security management framework. Melbourne, Vic: Victorian Government Printer, 2013.
Find full textPresident's Council on Integrity and Efficiency (U.S.), ed. Model framework for management control over automated information system. Washington, D.C: Executive Office of the President, Office of Management and Budget, 1988.
Find full textFighting computer crime: A new framework for protecting information. New York: Wiley, 1998.
Find full textDesigning an IAM framework with Oracle Identity and access management suite. New York: McGraw-Hill, 2010.
Find full textOttawa Verification Symposium (15th 1998 Montebello, Québec). Arms control and the rule of law: A framework for peace and security in outer space : proceedings of the Fifteenth Annual Ottawa NACD Verification Symposium. Toronto: Centre for International and Security Studies, York University, 1998.
Find full textMarshall, Beier J., Mataija Steven, and York Centre for International and Strategic Studies., eds. Arms control and the rule of law: A framework for peace and security in outer space : proceedings of the Fifteenth Annual Ottawa NACD Verification Symposium. Toronto,Canada: Centre for International and Security Studies, York University, 1998.
Find full textNemati, Hamid R. Privacy solutions and security frameworks in information protection. Hershey, PA: Information Science Reference, 2013.
Find full textOffice, General Accounting. Defense inventory: Improved management framework needed to guide Army best practice initiatives : report to Congressional committees. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textOffice, General Accounting. Defense inventory: Improved management framework needed to guide Air Force best practice initiatives : report to congressional committees. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textOffice, General Accounting. Defense inventory: DOD could improve Total Asset Visibility initiative with Results Act framework : report to Congressional requesters. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textBook chapters on the topic "Security control framework"
Tikk-Ringas, Eneken. "Legal Framework of Cyber Security." In Intelligent Systems, Control and Automation: Science and Engineering, 109–27. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18302-2_8.
Full textNabhen, Ricardo, Edgard Jamhour, and Carlos Maziero. "A Policy Based Framework for Access Control." In Information and Communications Security, 47–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39927-8_5.
Full textKayes, A. S. M., Jun Han, and Alan Colman. "ICAF: A Context-Aware Framework for Access Control." In Information Security and Privacy, 442–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31448-3_34.
Full textPosthumus, Shaun, and Rossouw von Solms. "A Responsibility Framework for Information Security." In Security Management, Integrity, and Internal Control in Information Systems, 205–21. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/0-387-31167-x_13.
Full textMaity, Soumya, and Soumya K. Ghosh. "A Cognitive Trust Model for Access Control Framework in MANET." In Information Systems Security, 75–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3_6.
Full textChau, Ngoc-Tu, Minh-Duong Nguyen, Seungwook Jung, and Souhwan Jung. "SecaaS Framework and Architecture: A Design of Dynamic Packet Control." In Information Security Applications, 190–201. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15087-1_15.
Full textChen, Shiping, Duminda Wijesekera, and Sushil Jajodia. "FlexFlow: A Flexible Flow Control Policy Specification Framework." In Data and Applications Security XVII, 358–71. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8070-0_26.
Full textZhu, Quanyan, and Zhiheng Xu. "A Game Framework to Secure Control of CBTC Systems." In Advances in Information Security, 91–114. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-60251-2_8.
Full textGow, James, and Ivan Zverzžhanovski. "Rules: The Legal and Institutional Framework for Democratic Control." In Security, Democracy and War Crimes, 83–100. London: Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137276148_5.
Full textCrampton, Jason, and Michael Huth. "Towards an Access-Control Framework for Countering Insider Threats." In Insider Threats in Cyber Security, 173–95. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3_8.
Full textConference papers on the topic "Security control framework"
Berhe, Abraham Belay, Ki-Hyung Kim, and Gebere Akele Tizazu. "Industrial control system security framework for ethiopia." In 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 2017. http://dx.doi.org/10.1109/icufn.2017.7993912.
Full textAftab, Farooq, Shaldon Leparan Suntu, and Zhongshan Zhang. "Self-Organized Security Framework for WiGig WLAN against Attacks and Threats." In 2018 13th APCA International Conference on Automatic Control and Soft Computing (CONTROLO). IEEE, 2018. http://dx.doi.org/10.1109/controlo.2018.8439750.
Full textMarina, Ninoslav, Aneta Velkoska, Natasha Paunkoska, and Ljupcho Baleski. "Security in Twin-code framework." In 2015 7th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, 2015. http://dx.doi.org/10.1109/icumt.2015.7382437.
Full textShrivas, Mahendra Kumar, Thomas Yeboah, and S. Selva Brunda. "Hybrid Security Framework for Blockchain Platforms." In 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T). IEEE, 2020. http://dx.doi.org/10.1109/icpc2t48082.2020.9071477.
Full textPrunicki, Andrew, and Tzilla Elrad. "Aclamate: An AOSD Security Framework for Access Control." In 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing. IEEE, 2006. http://dx.doi.org/10.1109/dasc.2006.16.
Full textKrishnan, K. Navaneeth, Roopesh Jenu, Tintu Joseph, and M. L. Silpa. "Blockchain Based Security Framework for IoT Implementations." In 2018 International CET Conference on Control, Communication, and Computing (IC4). IEEE, 2018. http://dx.doi.org/10.1109/cetic4.2018.8531042.
Full textAnitha Kumari, K., G. Sudha Sadasivam, R. Senthil Prabha, and G. Saranya. "Grid Based Security Framework for Online Trading." In 2011 International Conference on Process Automation, Control and Computing (PACC). IEEE, 2011. http://dx.doi.org/10.1109/pacc.2011.5978864.
Full textTao, Guo, Zhang Puhan, and Liang Hongliang. "Access Control Framework for Android System." In 1st International Workshop on Cloud Computing and Information Security. Paris, France: Atlantis Press, 2013. http://dx.doi.org/10.2991/ccis-13.2013.48.
Full textNeisse, Ricardo, Alexander Pretschner, and Valentina Di Giacomo. "A Trustworthy Usage Control Enforcement Framework." In 2011 Sixth International Conference on Availability, Reliability and Security (ARES). IEEE, 2011. http://dx.doi.org/10.1109/ares.2011.40.
Full textMohamed, Yasir Abdelgadir, and Azween B. Abdullah. "Immune inspired framework for ad hoc network security." In 2009 IEEE International Conference on Control and Automation (ICCA). IEEE, 2009. http://dx.doi.org/10.1109/icca.2009.5410147.
Full textReports on the topic "Security control framework"
Wayne F. Boyer and Miles A. McQueen. Primer Control System Cyber Security Framework and Technical Metrics. Office of Scientific and Technical Information (OSTI), May 2008. http://dx.doi.org/10.2172/935471.
Full textRobert P. Evans. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements. Office of Scientific and Technical Information (OSTI), September 2005. http://dx.doi.org/10.2172/911771.
Full textLong, Michael, Daniel Bush, Stephen Briggs, Tapan Patel, Eileen Westervelt, Daniel Shepard, Eric Lynch, and David Schwenk. An Army guide to navigating the cyber security process for Facility Related Control Systems : cybersecurity and risk management framework explanations for the real world. Engineer Research and Development Center (U.S.), January 2020. http://dx.doi.org/10.21079/11681/35294.
Full text