2016
DOI: 10.1016/j.cose.2016.09.007
|View full text |Cite
|
Sign up to set email alerts
|

A multifaceted evaluation of the reference model of information assurance & security

Abstract: The evaluation of a conceptual model, which is an outcome of a qualitative research, is an arduous task due to the lack of a rigorous basis for evaluation. Overcoming this challenge, the paper at hand presents a detailed example of a multifaceted evaluation of a Reference Model of Information Assurance & Security (RMIAS), which summarises the knowledge acquired by the Information Assurance & Security community to date in one all-encompassing model. A combination of analytical and empirical evaluation methods i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 19 publications
0
11
0
Order By: Relevance
“…Systems with high availability allow access to data all the time and prevent service disruptions due to hardware failure, system upgrades, power outages, power failure, and operating system or application problems [45]. All the experts agreed that the security framework designed to secure the VM image in cloud computing is comprehensive, with none of them adding more security requirements.…”
Section: Qualitative Datamentioning
confidence: 99%
“…Systems with high availability allow access to data all the time and prevent service disruptions due to hardware failure, system upgrades, power outages, power failure, and operating system or application problems [45]. All the experts agreed that the security framework designed to secure the VM image in cloud computing is comprehensive, with none of them adding more security requirements.…”
Section: Qualitative Datamentioning
confidence: 99%
“…But this type of approaches are not usable with real case scenarios because of the high complexity of the languages. SecBPMN-ml, overcomes this limitation extending BPMN with security concepts about information assurance and security defined in [3]. Figure 1 shows part of a SecBPMN-ml model of a business process used in an airport information system where users can use different web-interfaces to select the best option for a flight, buy tickets and perform most of the bureaucratic processes required to take the flight.…”
Section: Secbpmnmentioning
confidence: 99%
“…icons with a solid orange circle), that represent security aspects defined in [3]. Each security annotation is detailed by a predicate which specifies further details on the security aspects of the business process.…”
Section: Secbpmnmentioning
confidence: 99%
“…Means Confidentiality, Integrity, and Availability. We listed from the various literature of security to provide security with CI3ATNRP extension to Basic CIA [14].…”
Section: Security In the Scope Of Iotmentioning
confidence: 99%