The fact that security was often neglected in the design and construction of computer software has led to significant system changes in an attempt to add desired security functionality after the fact. Four methods of implementing security functionality, from augmentation through integration, are examined with respect to implementation strategy and efficacy of the desired security functionality. Using system theory, an examination of the issues associated with complex systems as applied to the addition of security functionality demonstrates the weaknesses of these approaches and the need to design security in from the beginning of a project. The application of system theory, the concepts of equifinality, feedback, control theory and the law ...
The security of software systems in recent years has been transformed from a mono-dimensional techni...
Architecting security solutions for today’s diverse computer systems is a challenge. The modern busi...
M.Com. (Information systems)This study has its origin in the growing need for information systems to...
The fact that security was often neglected in the design and construction of computer software has l...
While the importance of security has long been recognised, research efforts aimed at finding a solut...
D.Com. (Informatics)The complexity of modern computer-based information systems is such that, for al...
D.Com. (Informatics)The complexity of modern computer-based information systems is such that, for al...
Although security is a crucial issue for information systems, traditionally, it is considered after ...
“People are the weakest link in the security chain ” – Bruce Schneier The aim of the thesis is to i...
Modern software development depends on tools and techniques to represent implied information process...
Despite the acknowledged need for systems to be both usable and secure, we lack guidance on how deve...
Despite the acknowledged need for systems to be both usable and secure, we lack guidance on how deve...
Despite the acknowledged need for systems to be both us- able and secure, we lack guidance on how d...
Abstract This dissertation is composed of three contributions. First, it recognizes a set of key sec...
Security is rarely designed into systems and architectures from the beginning. Typically, security ...
The security of software systems in recent years has been transformed from a mono-dimensional techni...
Architecting security solutions for today’s diverse computer systems is a challenge. The modern busi...
M.Com. (Information systems)This study has its origin in the growing need for information systems to...
The fact that security was often neglected in the design and construction of computer software has l...
While the importance of security has long been recognised, research efforts aimed at finding a solut...
D.Com. (Informatics)The complexity of modern computer-based information systems is such that, for al...
D.Com. (Informatics)The complexity of modern computer-based information systems is such that, for al...
Although security is a crucial issue for information systems, traditionally, it is considered after ...
“People are the weakest link in the security chain ” – Bruce Schneier The aim of the thesis is to i...
Modern software development depends on tools and techniques to represent implied information process...
Despite the acknowledged need for systems to be both usable and secure, we lack guidance on how deve...
Despite the acknowledged need for systems to be both usable and secure, we lack guidance on how deve...
Despite the acknowledged need for systems to be both us- able and secure, we lack guidance on how d...
Abstract This dissertation is composed of three contributions. First, it recognizes a set of key sec...
Security is rarely designed into systems and architectures from the beginning. Typically, security ...
The security of software systems in recent years has been transformed from a mono-dimensional techni...
Architecting security solutions for today’s diverse computer systems is a challenge. The modern busi...
M.Com. (Information systems)This study has its origin in the growing need for information systems to...