Página 1 dos resultados de 24 itens digitais encontrados em 0.001 segundos

Healthcare Critical Knowledge Monitor System Model : healthcare critical knowledge ontology component

Pereira, T.; Santos, Henrique Dinis dos
Fonte: COPEC - Science and Education Research Council Publicador: COPEC - Science and Education Research Council
Tipo: Conferência ou Objeto de Conferência
Publicado em //2013 Português
Relevância na Pesquisa
27.500967%
“Proceedings of Safety, Health and Environment World Congress, ISSN 2317-3173. Vol. 13, nr. 1 (2013)”; Healthcare organizations manage with personal information concerning to patients from many sources that, typically, are supported by computer-based systems therefore, demands cautious when there are ethical and legal aspects involved. Since not all clinical knowledge managed by healthcare organizations could be considered critical (or much critical) we need to define the value of clinical knowledge for further handle in risk management. With the key aspects of InfoSec: Confidentiality, Integrity, Availability and Privacy we intent to achieve the core critical knowledge that will be the source of the healthcare critical knowledge ontology. Critical knowledge ontology should be tailored to the healthcare organization in focus to comply with multiple factors, such as: organizational culture, terminology used, health department specifications, among others. With topic model approach we intent to automatically driven document topics and match with critical healthcare knowledge from ontology, thus, give value to the documents concerning its critical knowledge.; This work is financed by FEDER funds through the Competitive Factors Operational Program – COMPETE and Portuguese national funds through FCT – Fundação para a ciência e tecnologia in project FCOMP-01-0124-FEDER- 022674.

Examining end-user perceptions of information risks: an application of the Repertory Grid Technique

Pattinson, M.; Jerram, C.
Fonte: University of Plymouth; UK Publicador: University of Plymouth; UK
Tipo: Conference paper
Publicado em //2010 Português
Relevância na Pesquisa
27.500967%
This paper proposes a research method that investigates the risk perceptions of computer end-users relating to organisational Information Security (InfoSec) and the situational factors that influence these perceptions. This method uses the repertory grid technique (RGT) within recorded semi-structured interviews to elicit computer end-user perceptions, thoughts, beliefs and views pertaining to information security risks and threats. The suitability and appropriateness of using the RGT for this task is also discussed.; http://www.saismc.org/; M. R. Pattinson and C. Jerram

An examination of information system risk perceptions using the repertory grid technique.

Pattinson, Malcolm Robert
Fonte: Universidade de Adelaide Publicador: Universidade de Adelaide
Tipo: Tese de Doutorado
Publicado em //2012 Português
Relevância na Pesquisa
28.607954%
The increasing dependence on information systems (ISs) together with the emergence of new technologies, threats and risks has reinforced the need for a higher level of information security (InfoSec) within most organisations. The traditional management approach to mitigating such IS risks has been to implement hardware and software solutions. However, academics and practitioners are beginning to appreciate that solutions relating to the human behavioural aspects of InfoSec are an equally, if not more, effective solution. For example, if management know how their computer users perceive the risks to their organisation‘s ISs and what situational factors influence these perceptions, they can use this information to design and instigate intervention strategies to improve user behaviour. The aim of this research is to contribute to the knowledge pertaining to InfoSec behaviour by examining the perceptions that computer users have of the risks to their organisation‘s ISs and by indentifying the major situational factors that influence these perceptions. Due to the human cognitive aspect of this aim, the research design necessitated a qualitative component and therefore a two-stage hybrid qualitative-quantitative approach was adopted. Stage 1 involved a series of semi-structured interviews with typical computer users from a variety of organisations for the purpose of developing a Repertory Grid Technique (RGT) interviewing instrument to be used in the next stage. Stage 2 of this research involved a series of structured interviews...

A national trusted computing strategy

Levin, Timothy E.; Dinolt, George W.
Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Tipo: Relatório
Português
Relevância na Pesquisa
27.500967%
Through neglect, the national capability to design and construct trusted computers and networks has begun to atrophy. Not only has the information infrastructure been built weakly, but also our capability to strengthen it continues to decline. The Nation is now lacking in both the research and development talent to produce trusted computing systems and the educational infrastructure to create this talent. The Center for INFOSEC Studies and Research (CISR) in Monterey, California, proposes a three-pronged approach to strengthen the national information infrastructure and reinvigorate the national capability to produce trustworthy computing systems. First, we describe our Trusted Computing Exemplar project as a worked example of how trusted computing systems and components can be constructed. Second, we define a national research initiative to advance the theoretical foundations for trusted computing and to produce a set of automated tools to support the development of high assurance systems; and third, we define an education at initiative based on nascent information Assurance education programs and the Trusted Computing Exemplar to provide a framework for Trusted Computer Development education. The result of this multi-faceted approach will be to increase the security of the national Information Infrastructure by increasing the availability of: Trusted Computer systems and components...

Diamond HASP trusted computing exemplar

Levin, Timothy E.; Dinolt, George W.; Irvine, Cynthia E.
Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Tipo: Relatório
Português
Relevância na Pesquisa
16.818885%
The National Information Infrastructure is weak; there are no high security, high assurance, off-the-shelf products available that can be used to strengthen it; and the National capability to design and construct such trusted computer systems and networks has atrophied. The purpose of the Trusted Computing Exemplar project is to provide a worked example to show how trusted computing systems and components can be constructed. A prototype high assurance development framework will be created first, and then used to produce a reference implementation trusted computing component the Embedded MicroKernel Prototype. A third-party evaluation of the component will be initiated during development (e.g., once the high-level design documentation is written). The documentation, source code, development framework and other deliverables will be made openly available as they are produced. We will develop a high assurance, embedded micro-kernel and a trusted application built on top of the micro-kernel as a reference implementation exemplar for trusted computing. Because the product as well as the process will be showpieces for trusted computing development, high assurance methodologies and techniques will be applied during the entire lifecycle. The goal is to produce a very small...

MYSEA security architecture

Irvine, Cynthia E.
Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Tipo: Relatório
Português
Relevância na Pesquisa
16.818885%
We describe an innovative architecture consisting of trusted security services and integrated operating system mechanisms for the protection of distributed multi-domain computing environments from malicious code and other attacks. These security services and mechanisms extend and interoperate with existing workstations, applications and open source operating systems, providing new capabilities for composing secure distributed systems using commercial off- the-shelf (COTS) components. The latter construct results from the realization that unless a secure system offers users comfortable and familiar interfaces for handling routine information, the secure system will fail due to lack of user acceptability.

Integrating a trusted computing base extension server and secure session server into the Linux operating system

Glover, Mark V.
Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Tipo: Tese de Doutorado
Português
Relevância na Pesquisa
16.818885%
Multilevel Secure Local Area Network (MLS LAN) Project at the Naval Postgraduate Schoolαs, Center for Information Security (INFOSEC) Studies and Research (NPS CISR) is building a trusted network system that is both necessary and sufficient to provide a multilevel networking solution for real world use. The current configuration provides the necessary trusted network services on the TCSEC Class B-3 evaluated XTS-300, which is a combination of the STOP version 4.4.2 multilevel secure operating system, and a Wang-supplied Intel x86 hardware base. The interface for the STOP operating is based on the System V.3 UNIX implementation. System V.3 lacks many of features available in more modern UNIX implementations such as System V.4 and BSD 4.3, and also lacks many of the features in POSIX and ANSI C standards. Finally, the CPU is several generations older than the more current Intel processors. This thesis discusses the port of several MLS trusted network services on the XTS- 300 to a Linux operating system running on an Intel Pentium Processor. The new Linux TCB Server configuration will permit further experimentation with MLS architectural issues in a more modern, flexible and easily modifiable environment. The port was accomplished by identifying and modifying the necessary software modules needed...

Security as a Dimension of Quality of Service in Active Service Environments

Irvine, Cynthia E.; Levin, Timothy E.; Sypropoulou, Evie; Allen, Bruce
Fonte: DARPA DISCEX Conference, April 2003 Publicador: DARPA DISCEX Conference, April 2003
Tipo: Artigo de Revista Científica
Português
Relevância na Pesquisa
16.818885%

The NPS CISR Graduate Program in INFOSEC Education: Six Years of Experience

Irvine, Cynthia E.; Warren, Daniel F.; Clark, Paul C.
Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Tipo: Artigo de Revista Científica
Português
Relevância na Pesquisa
28.078115%
The Naval Postgraduate School Center for Information Systems Security (INFOSEC) Studies and Research (NPS CISR) is developing a comprehensive program in INFOSEC education and research that can become a resource for DoN/DoD and U.S Government in terms of educational materials and research. A security track within the Computer Science curriculum at the Naval Postgraduate School has been established. Building upon a foundation of computer science laid by the departments core curriculum, the security track conveys vital concepts and techniques associated with INFOSEC today.

Amplifying Security Education in the Laboratory

Irvine, Cynthia E.,
Fonte: INFOSEC Publicador: INFOSEC
Tipo: Artigo de Revista Científica
Português
Relevância na Pesquisa
16.818885%
Computer and network security have become concerns for enterprises ranging from sole proprietorships run from home offices to global corporations and government agencies with hundred of thousands of employees. These concerns are reflected in the growing demand for computer security professionals to design, manage, and administer systems. Here a case is built for significant use of laboratory work to complement classroom and reading activities in computer security education.

The Reference Monitor Concept as a Unifying Principle in Computer Security Education

Irvine, Cynthia E.
Fonte: Proceeding IFIP TC11 WC11.8 First World Conference on INFOSEC Education Publicador: Proceeding IFIP TC11 WC11.8 First World Conference on INFOSEC Education
Tipo: Artigo de Revista Científica
Português
Relevância na Pesquisa
16.818885%
For over twenty-five years, the Reference Monitor Concept [1] has proved itself to be a useful tool for computer security practitioners. It can also be used as a conceptual tool in computer security education. This paper describes a computer security education program at the Naval Postgraduate School that has used the Reference Monitor concept as a unifying principle for courses, laboratory work, and student research. The intent of the program is to produce graduates who will think critically about the design and implementation of systems intended to enforce security policies.

Teaching introductory computer security at a Department of Defense university

Irvine, Cynthia E.
Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Tipo: Relatório
Português
Relevância na Pesquisa
16.818885%
The Naval Postgraduate School Center for Information Systems Security (INFOSEC) Studies and Research (NPS CISR) has developed an instructional program in computer security. Its objective is to insure that students not only understand practical aspects of computer security associated with current technology, but also learn the fundamental principles that can be applied to the development of systems for which high confidence in policy enforcement can be achieved. Introduction to Computer Security, the cornerstone course for our program is described here.

Maritime Domain AwarenessC4I for the 1000 Ship Navy

Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Tipo: Relatório
Português
Relevância na Pesquisa
16.818885%
Approved for public release, distribution unlimited; The study applies structured systems engineering methods, domain patterns, and tools to develop architectures, an information exchange standard, and a cost estimate of hosted mission applications for the Thousand Ship Navy (TSN) Command, Control, Computers, Communications, and Intelligence (C4I) system concept for the Global Maritime Partnership (GMP) enterprise.

Mass dissemination of INFOSEC lectures via the World Wide Web.

Umentum, Bart James
Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Tipo: Tese de Doutorado
Português
Relevância na Pesquisa
28.078115%
Approved for public release; distribution is unlimited; The Naval Postgraduate School (NPS) Center for Information Systems Security (INFOSEC) Studies and Research (NPS CISR) invites experts in the field of INFOSEC to NPS to lecture on computer security. Other universities, government, and non-government organizations need similar lectures. Two problems arise: experienced security practitioners are few in number and cannot spend a considerable amount of time on the lecture circuit. Also, for many institutions a regular lecture series would be too costly. To solve these problems a method for mass distribution of the NPS security lectures must be designed. Multi media tools were used to capture INFOSEC lectures for cost effective mass dissemination. By using the appropriate equipment, computer technology, and software, a tool was developed which can distribute security lectures to an unlimited audience in multiple formats. The resulting product is a tutorial to give content providers a technique to take archived video tapes, digitize them, edit them, and export them. These lectures can be delivered in HTML, compact disk, and video taped formats. An analysis of the production process yields a set of recommendations for optimizing the user interface and balancing producer and user requirements such as memory conservation...

Toward a taxonomy and costing method for security services

Irvine, Cynthia; Levin, Timothy
Fonte: Naval Postgraduate School Publicador: Naval Postgraduate School
Tipo: Relatório
Português
Relevância na Pesquisa
16.818885%
A wide range of security services may be available to applications in a heterogeneous computer network. Resource Management Systems (RMSs) responsible for assigning computing and network resources to tasks need to know the resource-utilization costs associated with the various network security services. In order to understand the range of security services and RMS needs to manage, a preliminary security service taxonomy is defined. The taxonomy is used as framework for a preliminary method for defining the costs associated with network security services.

Graduate Education in Computer Security presentation: INFOSEC Research Council

Irvine, Cynthia
Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Tipo: Conferência ou Objeto de Conferência
Português
Relevância na Pesquisa
16.818885%

3Dsec: Trustworthy System Security through 3D Integrated Hardware [presentation]

Huffmire, Ted
Fonte: Escola de Pós-Graduação Naval Publicador: Escola de Pós-Graduação Naval
Tipo: Seminars, Panels, and Invited Talks
Português
Relevância na Pesquisa
16.818885%
Invited Talk, InfoSec Research Council (IRC) Meeting on the Topic of Hardware Security, Booz Allen Hamilton, Arlington, VA, 14 January 2010. [Agenda] [Slides]

Security Track Master’s Thesis Guidelines

Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Tipo: Periódico
Português
Relevância na Pesquisa
16.818885%
Thesis Writing Document; Approved for public release; distribution is unlimited.

Naval Postgraduate School Center for Infosec Studies and Research: Teaching the Science of Computer Security (U)

Irvine, Cynthia E.
Fonte: Escola de Pós-Graduação Naval Publicador: Escola de Pós-Graduação Naval
Tipo: Artigo de Revista Científica
Português
Relevância na Pesquisa
28.078115%
(U) The Naval Postgraduate School Center for Information Systems Security (INFOSEC) Studies and Research (NPS CISR) is developing a comprehensive program in INFOSEC education and research that can become a resource for DoN/DoD and U.S Government in terms of educational materials and research. A security track within the Computer Science curriculum has been established. Its philosophical core is the abstract notion of conceptually complete security mechanism, the Reference Monitor Concept. Building upon a core curriculum of computer science and engineering, the security courses convey vital concepts and techniques associated with INFOSEC today.

Call for participation first ACM workshop on education in computer security

Irvine, Cynthia; Orman, Hilarie
Fonte: Escola de Pós-Graduação Naval Publicador: Escola de Pós-Graduação Naval
Tipo: Outros
Português
Relevância na Pesquisa
16.818885%
Taken from the NPS website.; The security of information systems and networks is a growing concern. Experts are needed to design and organize the protection mechanisms for these systems. Both government and industry increasingly seek individuals with knowledge and skills in computer security. In the past, most traditional computer science curricula bypassed formal studies in computer security altogether. An understanding of computer security was achieved largely through on-the-job experience. This is both haphazard and inefficient. There is a need to include computer security in computer science education.