Multiple personal security domains

R Matushima, YR Venturini, RRM Sakuragui… - Proceedings of the …, 2006 - dl.acm.org
security domains: Multiple PSD (MPSD). The infrastructure and SEL implementing this security
… We believe that this design can be used further to support virtual security domains in Ad …

[PDF][PDF] Personal security domains

P Chandrasiri, O Gurleyen, C Gehrmann, A Jonsson… - IWWST'04, 2004 - Citeseer
… The PSD concept developed in the SHAMAN project was based upon logical security
domains spanning multiple devices. The PSD consisted of members and a Controller. A device …

[PDF][PDF] Towards a single device for multiple security domains

F Skopik, A Bonitz, D Slamanig, M Kirschner… - Journal of Universal …, 2024 - skopik.at
security issues and aim to deliver a concept for a device that can be used in multiple security
domains, … of a single device concept for multiple security domains and evaluate the most …

Smart environment authentication: Multi-domain authentication, authorization, security policy for pervasive network

DG Lee, GW Kim, JW Han, YS Jeong… - 2008 International …, 2008 - ieeexplore.ieee.org
… in a smart environment security for guaranteeing … Personal CA [8, 9] provides localized
PKI model. However, to the best of our knowledge none of them are applicable for multi-domain

Security awareness in software-defined multi-domain 5G networks

J Suomalainen, K Ahola, M Majanen, O Mämmelä… - Future Internet, 2018 - mdpi.com
security measurements across administrative domains. We describe scenarios where the
correlation of multi-domain information improves the accuracy of security … explore the security

Understanding and recommending security requirements from problem domain ontology: A cognitive three-layered approach

BJ Kim, SW Lee - Journal of Systems and Software, 2020 - Elsevier
… A profound understanding of the problems across multiple dimensions of STS is the key in
security domain, such as methodology classification, categorization, principles, etc. Domain-…

Domain name system security and privacy: A contemporary survey

A Khormali, J Park, H Alasmary, A Anwar, M Saad… - Computer Networks, 2021 - Elsevier
… Phishing Attacks/DNS Manipulation: DNS manipulation may expose users to multiple
threats, such as phishing and malicious domains. Accordingly, a large number of studies …

Multi‐level information system security in outsourcing domain

M Razvi Doomun - Business Process Management Journal, 2008 - emerald.com
… In this paper, a multiple layer security framework for IS outsourcing was discussed. It can be
stated that there are three levels of security, first guidelines of technical security, second risk …

How to Strengthen Personal Cyber Security Competencies? Extending the Cyber Security Domain Model (CSDM) to Individuals: A Literature-Based Domain Analysis

F Schütz, L Scholz, S Hugenberg, J Warwas… - Workshop on e …, 2023 - Springer
multi-dimensional cyber security competencies. Therefore, we extend the Cyber Security
Domain … as the prerequisite for building cyber security competencies related to threats within an …

[PDF][PDF] A Multi-Domain Approach for Security Compliance, Insider Threat Modelling and Risk Management

T Fagade - 2018 - research-information.bris.ac.uk
… the holistic management of information security is difficult and not … a multi-domain approach
to support comprehensive securitysecurity model and how employees rationalise security