Security management modeling in collaborative systems

被引:0
|
作者
Li, Xiangyang [1 ]
Shiau, Hun-Yan [2 ]
机构
[1] Univ Michigan, Dearborn, MI 48128 USA
[2] Chung Yuan Christian Univ, Chungli, Taiwan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security management of modern collaborative systems raises challenges to supply chain and enterprise management, demanding an integrated and holistic solution framework In this article we concentrate on two fundamental instruments to support the pursuit of a security centric management (SCM) mission. Firstly the security taxonomy within the SCM context provides a comprehensive knowledge map of relevant artifacts and issues for players to communicate and collaborate in this special field. Ultimately it supplies building blocks for qualitative modeling required by security management. Secondly security management in SCM seeks practical computation and analysis capabilities, thus requiring a migration from qualitative models to quantitative models. We utilize dependency modeling as the bridging facility and probabilistic modeling as the inference engine in our solution to deal with complexity and uncertainty dominant in SCM. In addition we explore the proposition within essential application of healthcare security management.. Noticing the enormous challenge presented by the new research mission, we emphasize identifying and examining generic issues and potential solutions, rather than particular problems or algorithms with limited usage and significance.
引用
收藏
页码:1553 / +
页数:2
相关论文
共 50 条
  • [1] Modeling Big Data Management Systems in Information Security
    Poltavtseva, M. A.
    Kalinin, M. O.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 895 - 902
  • [2] Modeling Big Data Management Systems in Information Security
    M. A. Poltavtseva
    M. O. Kalinin
    [J]. Automatic Control and Computer Sciences, 2019, 53 : 895 - 902
  • [3] An Administrative Model for Collaborative Management of ABAC Systems and its Security Analysis
    Jha, Sadhana
    Sural, Shamik
    Atluri, Vijayalakshmi
    Vaidya, Jaideep
    [J]. 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (IEEE CIC), 2016, : 64 - 73
  • [4] S-Port: Collaborative Security Management of Port Information Systems
    Polemi, Despoina
    Ntouskas, Theodoros
    Georgakakis, Emmanouil
    Douligeris, Christos
    Theoharidou, Marianthi
    Gritzalis, Dimitris
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 225 - 230
  • [5] CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud Systems
    Bracciale, Lorenzo
    Loreti, Pierpaolo
    Raso, Emanuele
    Naldi, Maurizio
    Bianchi, Giuseppe
    [J]. ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 361 - 368
  • [6] A Collaborative Process Based Risk Analysis for Information Security Management Systems
    Karabacak, Bilge
    Ozkan, Sevgi
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 182 - 192
  • [7] Management of Security and Security for Management Systems
    Westphall, Carlos Becker
    Mueller, Peter
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2010, 18 (03) : 241 - 243
  • [8] Management of Security and Security for Management Systems
    Carlos Becker Westphall
    Peter Mueller
    [J]. Journal of Network and Systems Management, 2010, 18 : 241 - 243
  • [9] STORM - Collaborative Security Management Environment
    Ntouskas, Theodoros
    Pentafronimos, George
    Papastergiou, Spyros
    [J]. INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION, 2011, 6633 : 320 - 335
  • [10] Analyzing security in distributed collaborative systems
    Gantenbein, RE
    James, TL
    DeGroot, G
    Allen, HL
    Shin, SY
    [J]. COMPUTERS AND THEIR APPLICATIONS, 2000, : 72 - 75