Security Modeling Technique: Visualizing Information of Security Plans

被引:0
|
作者
Ley, D. [1 ]
Dalinger, E. [1 ]
机构
[1] Fraunhofer Inst Commun Informat Proc & Ergon FKIE, Wachtberg, Germany
关键词
D O I
暂无
中图分类号
U [交通运输];
学科分类号
08 ; 0823 ;
摘要
Since the terrorist attacks of 11th September 2001 efforts are made to enhance the security standards in maritime shipping. The joint research project VESPER (improving the security of passengers on ferries) funded by the German Federal Ministry of Education and Research (BMBF) addresses among others the investigation of sea- and landside measures and processes. One of the results of the ongoing analysis phase is that the current representation of information in security plans can hardly be used for a complete real-time implementation of relevant measures in critical situations. As a result, information and design requirements to develop a Security Modeling Technique (SMT) were identified using the Applied Cognitive Work Analysis (ACWA). SMT intends to support decision making of security officers during the implementation of security levels. This contribution describes the phases of development and the resulting design concept.
引用
收藏
页码:417 / 422
页数:6
相关论文
共 50 条
  • [1] Issues in modeling information security
    Garrido, Jose M.
    [J]. INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS AND APPLICATIONS/INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, 2007, : 325 - 328
  • [2] Visualizing Circularly Polarized Long Afterglow for Information Security
    Zhao, Shanshan
    Li, Guangen
    Guo, Qi
    Wang, Yaxin
    Zhang, Mingjiang
    Zhou, Yajie
    Jin, Shan
    Zhu, Manzhou
    Zhuang, Taotao
    [J]. ADVANCED OPTICAL MATERIALS, 2023, 11 (10)
  • [3] Information security technique in frequency domain
    Abbas T.
    Beiji Z.
    Abdullah M.Y.
    [J]. International Journal of Digital Content Technology and its Applications, 2011, 5 (12) : 279 - 289
  • [4] A Security Technique for Authentication and Security of Medical Images in Health Information Systems
    Kester, Quist-Aphetsi
    Nana, Laurent
    Pascu, Anca Christine
    Gire, Sophie
    Eghan, Jojo M.
    Quaynor, Nii Narku
    [J]. 2015 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA), 2015, : 8 - 13
  • [5] Modeling of information systems to their security evaluation
    Zegzhda, D.
    Zegzhda, P.
    Pechenkin, A.
    Poltavtseva, M.
    [J]. SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 295 - 298
  • [6] Modeling and Simulating Information Security Management
    Sarriegi, Jose M.
    Santos, Javier
    Torres, Jose M.
    Imizcoz, David
    Egozcue, Elyoenai
    Liberal, Daniel
    [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2008, 5141 : 327 - +
  • [7] Critical Information Infrastructures Security Modeling
    Erokhin, Sergey
    Petukhov, Andrey
    Pilyugin, Pavel
    [J]. PROCEEDINGS OF THE 24TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2019, : 82 - 88
  • [8] Security Plans for SaaS
    Aime, Marco D.
    Lioy, Antonio
    Pomi, Paolo C.
    Vallini, Marco
    [J]. NEW FRONTIERS IN INFORMATION AND SOFTWARE AS SERVICES: SERVICE AND APPLICATION DESIGN CHALLENGES IN THE CLOUD, 2011, 74 : 81 - 111
  • [9] Adaptive model of information security technique investment
    Dong, Hong
    Qiu, Wan-Hua
    Lu, Jun-Jie
    Zhang, Wen
    [J]. Kongzhi yu Juece/Control and Decision, 2008, 23 (05): : 535 - 540
  • [10] AlertVision: Visualizing Security Alerts
    Hong, Jina
    Lee, JinKi
    Lee, HyunKyu
    Chang, YoonHa
    Choi, KwangHo
    Cha, Sang Kil
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2018, 2019, 11402 : 173 - 184