2018
DOI: 10.3390/inventions3040071
|View full text |Cite
|
Sign up to set email alerts
|

A Robust Information Life Cycle Management Framework for Securing and Governing Critical Infrastructure Systems

Abstract: In modern societies, the rampant growth of the Internet, both on the technological and social level, has created fertile ground for the emergence of new types of risk. On top of that, it enhances pre-existing threats by offering new means for accessing and exploiting Critical Infrastructures. As the kinds of potential threats evolve, the security, safety and resilience of these infrastructures must be updated accordingly, both at a prevention, as well as a real-time confrontation level. Our research approaches… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…The governance dimension comprises 11 variables that examine relationships with external parties involved in the service (Limba et al , 2017). Within the regulation element, the variables encompass regulations about security goals, regulations governing security functions and regulations governing risk management (Moulos et al , 2018). The security standards element is represented by two variables, explicitly focusing on compliance with security function standards and adherence to applicable standards (Setiawan et al , 2015; Yamada et al , 2020).…”
Section: Resultsmentioning
confidence: 99%
“…The governance dimension comprises 11 variables that examine relationships with external parties involved in the service (Limba et al , 2017). Within the regulation element, the variables encompass regulations about security goals, regulations governing security functions and regulations governing risk management (Moulos et al , 2018). The security standards element is represented by two variables, explicitly focusing on compliance with security function standards and adherence to applicable standards (Setiawan et al , 2015; Yamada et al , 2020).…”
Section: Resultsmentioning
confidence: 99%
“…In a more general context, the tool compares any two databases that have the same schemas and highlights the differences and similarities between them. Diftong could be included in a more robust information life cycle management framework as described in [35]. Similarly by ensuring data quality, big data analytics [36] can be applied with more trust [37].…”
Section: Resultsmentioning
confidence: 99%