P Chandrasiri, O Gurleyen, C Gehrmann, A Jonsson… - IWWST'04, 2004 - Citeseer
… The PSD concept developed in the SHAMAN project was based upon logical security domains spanning multiple devices. The PSD consisted of members and a Controller. A device …
… security issues and aim to deliver a concept for a device that can be used in multiplesecurity domains, … of a single device concept for multiplesecuritydomains and evaluate the most …
DG Lee, GW Kim, JW Han, YS Jeong… - 2008 International …, 2008 - ieeexplore.ieee.org
… in a smart environment security for guaranteeing … Personal CA [8, 9] provides localized PKI model. However, to the best of our knowledge none of them are applicable for multi-domain …
J Suomalainen, K Ahola, M Majanen, O Mämmelä… - Future Internet, 2018 - mdpi.com
… security measurements across administrative domains. We describe scenarios where the correlation of multi-domain information improves the accuracy of security … explore the security …
BJ Kim, SW Lee - Journal of Systems and Software, 2020 - Elsevier
… A profound understanding of the problems across multiple dimensions of STS is the key in … securitydomain, such as methodology classification, categorization, principles, etc. Domain-…
… Phishing Attacks/DNS Manipulation: DNS manipulation may expose users to multiple threats, such as phishing and malicious domains. Accordingly, a large number of studies …
M Razvi Doomun - Business Process Management Journal, 2008 - emerald.com
… In this paper, a multiple layer security framework for IS outsourcing was discussed. It can be stated that there are three levels of security, first guidelines of technical security, second risk …
F Schütz, L Scholz, S Hugenberg, J Warwas… - Workshop on e …, 2023 - Springer
… multi-dimensional cyber security competencies. Therefore, we extend the Cyber Security Domain … as the prerequisite for building cyber security competencies related to threats within an …
… the holistic management of information security is difficult and not … a multi-domain approach to support comprehensive security … security model and how employees rationalise security …