One of the best ways to protect an organization’s assets is to implement security requirements defined by different standards or best practices. However, such an approach is complicated and requires specific skills and knowledge. In case an organization applies multiple security standards, several problems can arise related to overlapping or conflicting security requirements, increased expenses on security requirement implementation, and convenience of security requirement monitoring. To solve these issues, we propose using graph theory techniques. Graphs allow the presentation of security requirements of a standard as graph vertexes and edges between vertexes, and would show the relations between different requirements. A vertex cove...
Let G = (V, E) be a graph. A set S subset of V is a defensive alliance if vertical bar N[x] boolean ...
Abstract. We present a unified theory for verifying network security policies. A security policy is ...
Electronic communications devices intended for government or military applications must be rigorousl...
One of the best ways to protect an organization’s assets is to implement security requirements defin...
This Paper illustrates that all the projects to design or develop secure information system for proc...
Abstract:- Determining who has access to personal data is an ongoing problem facing information syst...
Network systems often contain vulnerabilities that remain unmitigated in a network for various reaso...
Graph theory studies the properties of graphs and networks. Graphs are an excellent tool for designi...
International audienceThis paper presents an approach allowing for a given security and utility requ...
peer reviewedE-government services usually process large amounts of confidential data, but simultane...
Determining who has access to personal data is an ongoing problem facing information system entities...
Informally, a set of guards positioned on the vertices of a graph G is called eternally secure if th...
There are many security standards which the company can use. While security standards can differ in ...
Given a graph G, the security number of G is the cardinality of a minimum secure set of G, the small...
This paper describes way how to use graph theory in security analysis. As an environment is used net...
Let G = (V, E) be a graph. A set S subset of V is a defensive alliance if vertical bar N[x] boolean ...
Abstract. We present a unified theory for verifying network security policies. A security policy is ...
Electronic communications devices intended for government or military applications must be rigorousl...
One of the best ways to protect an organization’s assets is to implement security requirements defin...
This Paper illustrates that all the projects to design or develop secure information system for proc...
Abstract:- Determining who has access to personal data is an ongoing problem facing information syst...
Network systems often contain vulnerabilities that remain unmitigated in a network for various reaso...
Graph theory studies the properties of graphs and networks. Graphs are an excellent tool for designi...
International audienceThis paper presents an approach allowing for a given security and utility requ...
peer reviewedE-government services usually process large amounts of confidential data, but simultane...
Determining who has access to personal data is an ongoing problem facing information system entities...
Informally, a set of guards positioned on the vertices of a graph G is called eternally secure if th...
There are many security standards which the company can use. While security standards can differ in ...
Given a graph G, the security number of G is the cardinality of a minimum secure set of G, the small...
This paper describes way how to use graph theory in security analysis. As an environment is used net...
Let G = (V, E) be a graph. A set S subset of V is a defensive alliance if vertical bar N[x] boolean ...
Abstract. We present a unified theory for verifying network security policies. A security policy is ...
Electronic communications devices intended for government or military applications must be rigorousl...