Ojeniyi et al., 2016 - Google Patents
Enhanced Security Testbed Threat Model Based on Parametric Equation and Multi-Level Design ApproachOjeniyi et al., 2016
View PDF- Document ID
- 17435420708113432318
- Author
- Ojeniyi J
- Waziri V
- Aibinu A
- Inyiama H
- Publication year
External Links
Snippet
The threat model of a security testbed provides quantitative and qualitative conceptual insights into robustness of the developed testbed. Security of any digitally designed system is not guaranteed until an appropriate modelling and assessment of threat is carried out and …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
- G06Q40/025—Credit processing or loan processing, e.g. risk analysis for mortgages
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Saleh et al. | A new comprehensive framework for enterprise information security risk management | |
| Yusop et al. | Analysis of insiders attack mitigation strategies | |
| Hughes et al. | Three tenets for secure cyber-physical system design and assessment | |
| Kavallieratos et al. | Threat analysis in dynamic environments: The case of the smart home | |
| Rodríguez et al. | Modelling security of critical infrastructures: a survivability assessment | |
| Korman et al. | Analyzing the effectiveness of attack countermeasures in a SCADA system | |
| Alavizadeh et al. | Evaluating the security and economic effects of moving target defense techniques on the cloud | |
| Ashraf | A survey on data security in cloud computing using blockchain: challenges, existing-state-of-the-art methods, and future directions | |
| Llamas et al. | Balancing security and privacy: Web bot detection, privacy challenges, and regulatory compliance under the GDPR and AI act | |
| Birleanu et al. | Principles, architectures and challenges for ensuring the integrity, internal control and security of embedded systems | |
| Sasubilli et al. | A computational and analytical approach for cloud computing security with user data management | |
| Gaidarski et al. | Model driven architectural design of information security system | |
| Malomo et al. | A survey on recent advances in cloud computing security | |
| Salini et al. | Elicitation of security requirements for e-health system by applying Model Oriented Security Requirements Engineering (MOSRE) framework | |
| Mohammadi et al. | Towards an end-to-end architecture for run-time data protection in the cloud | |
| Yassine et al. | Security risk assessment methodologies in the internet of things: Survey and taxonomy | |
| Gaydarski et al. | Conceptual modeling of information security system and its validation through DLP systems | |
| Malyuk et al. | Information security theory for the future internet | |
| Ojeniyi et al. | Enhanced Security Testbed Threat Model Based on Parametric Equation and Multi-Level Design Approach | |
| TW201546629A (en) | Semantic restriction | |
| Talib et al. | Towards new data access control technique based on multi agent system architecture for cloud computing | |
| Najat et al. | Comparative study of the Security Analysis of IoT systems using attack trees algorithm | |
| Tall et al. | Integrating cybersecurity into a big data ecosystem | |
| Howes et al. | Enabling trustworthy spaces via orchestrated analytical security | |
| Chou et al. | Enforcing confidentiality in a SaaS cloud environment |