2013 International Conference on Availability, Reliability and Security 2013
DOI: 10.1109/ares.2013.72
|View full text |Cite
|
Sign up to set email alerts
|

A Reference Model of Information Assurance & Security

Abstract: Information Assurance & Security (IAS) is a dynamic domain which changes continuously in response to the evolution of society, business needs and technology. This paper proposes a Reference Model of Information Assurance & Security (RMIAS), which endeavours to address the recent trends in the IAS evolution, namely diversification and deperimetrisation. The model incorporates four dimensions: Information System Security Life Cycle, Information Taxonomy, Security Goals and Security Countermeasures. In addition t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
94
0
4

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 147 publications
(99 citation statements)
references
References 18 publications
1
94
0
4
Order By: Relevance
“…Traditionally, when discussing security of systems, CIA (Confidentiality, Integrity, Availability) are considered the properties of systems that we wish to protect Cherdantseva and Hilton (2013). Confidentiality relates to data or systems only being disclosed to appropriate parties.…”
Section: Related Workmentioning
confidence: 99%
“…Traditionally, when discussing security of systems, CIA (Confidentiality, Integrity, Availability) are considered the properties of systems that we wish to protect Cherdantseva and Hilton (2013). Confidentiality relates to data or systems only being disclosed to appropriate parties.…”
Section: Related Workmentioning
confidence: 99%
“…Inspired by these works, there are several approaches extending BPMN 2.0 with security specifications, eg, Salnitri et al and Cherdantseva. 23,39 While they provide, on the one hand, further security properties that are not supported by SecureBPMN, they all have in common that the access control specifications are very coarse-grained (only supporting simple RBAC models). In contrast, our approach allows the fine-grained specification of security requirements for single tasks or data objects.…”
Section: Related Workmentioning
confidence: 99%
“…In the current digital age, numerous research papers and applications have been written and have developed proposed solutions to combat network based threats and to protect information systems. As a result, various security systems have emerged, which aim to ensure that the key goals of cybersecurity are met [1]. However, every day these stated security goals are flagrantly violated by breaches and security incidents, which raises questions about the capability of existing security systems.…”
Section: Introductionmentioning
confidence: 99%