[go: up one dir, main page]

Ojeniyi et al., 2016 - Google Patents

Enhanced Security Testbed Threat Model Based on Parametric Equation and Multi-Level Design Approach

Ojeniyi et al., 2016

View PDF
Document ID
17435420708113432318
Author
Ojeniyi J
Waziri V
Aibinu A
Inyiama H
Publication year

External Links

Snippet

The threat model of a security testbed provides quantitative and qualitative conceptual insights into robustness of the developed testbed. Security of any digitally designed system is not guaranteed until an appropriate modelling and assessment of threat is carried out and …
Continue reading at irepo.futminna.edu.ng:8080 (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
    • G06Q40/025Credit processing or loan processing, e.g. risk analysis for mortgages

Similar Documents

Publication Publication Date Title
Saleh et al. A new comprehensive framework for enterprise information security risk management
Yusop et al. Analysis of insiders attack mitigation strategies
Hughes et al. Three tenets for secure cyber-physical system design and assessment
Kavallieratos et al. Threat analysis in dynamic environments: The case of the smart home
Rodríguez et al. Modelling security of critical infrastructures: a survivability assessment
Korman et al. Analyzing the effectiveness of attack countermeasures in a SCADA system
Alavizadeh et al. Evaluating the security and economic effects of moving target defense techniques on the cloud
Ashraf A survey on data security in cloud computing using blockchain: challenges, existing-state-of-the-art methods, and future directions
Llamas et al. Balancing security and privacy: Web bot detection, privacy challenges, and regulatory compliance under the GDPR and AI act
Birleanu et al. Principles, architectures and challenges for ensuring the integrity, internal control and security of embedded systems
Sasubilli et al. A computational and analytical approach for cloud computing security with user data management
Gaidarski et al. Model driven architectural design of information security system
Malomo et al. A survey on recent advances in cloud computing security
Salini et al. Elicitation of security requirements for e-health system by applying Model Oriented Security Requirements Engineering (MOSRE) framework
Mohammadi et al. Towards an end-to-end architecture for run-time data protection in the cloud
Yassine et al. Security risk assessment methodologies in the internet of things: Survey and taxonomy
Gaydarski et al. Conceptual modeling of information security system and its validation through DLP systems
Malyuk et al. Information security theory for the future internet
Ojeniyi et al. Enhanced Security Testbed Threat Model Based on Parametric Equation and Multi-Level Design Approach
TW201546629A (en) Semantic restriction
Talib et al. Towards new data access control technique based on multi agent system architecture for cloud computing
Najat et al. Comparative study of the Security Analysis of IoT systems using attack trees algorithm
Tall et al. Integrating cybersecurity into a big data ecosystem
Howes et al. Enabling trustworthy spaces via orchestrated analytical security
Chou et al. Enforcing confidentiality in a SaaS cloud environment