The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security evaluation according to ISO 15408 (common criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take their products through a common criteria evaluation. To support security evaluation, the European Telecommunications Standards Institute (ETSI) has developed a threat, vulnerability, risk analysis (eTVRA) method for the Telecommunication...
The global trends have not changed lately: global socio-economic divisions, climate change, resource competition and maintaining security by military force [Oxford Research Group] remain on the top list. However the financial crisis has shifted the risk landscape dramatically [Global Risk 2009; WEF]. If extracting the root cause of this incident you find a company behavior or management pattern, which...
Grid computing has contributed to advances in computational and communication technologies, which has made economically feasible the conglomeration of multiple clusters of heterogeneous networked resources and services that, in turn, has lead to the development of large-scale distributed systems. However, available resources may be shortage. We propose a secure delivery and billing protocol between...
Security information exchange (SIE) is an information exchange system that lets analysts look at data in real time. Still in its early phase, the system already collects an enormous volume of data.
Code reviews with static analysis tools are today recommended by several security development processes. Developers are expected to use the tools' output to detect the security threats they themselves have introduced in the source code. This approach assumes that all developers can correctly identify a warning from a static analysis tool (SAT) as a security threat that needs to be corrected. We have...
In a supply chain network, suppliers normally offer price and service quotes for bidding while the purchasing company usually needs to evaluate suppliers before making buying decision. Due to competition, purchasing company doesnpsilat want suppliers to know anything about purchasing sensitive information except providing itemspsila retail prices and bidding notices. The confidentiality modeling has...
Today, personalized services are lucrative for service providers and their customers. With their increasing pervasiveness and interconnection, however, customers show concerns about their privacy. If customers were to refuse the processing of their personal data in general, the economic potential of personalized services could not be realized. We claim that such scepticism is a direct consequence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.