IEEE Organizations related to Security Management

Back to Top

No organizations are currently tagged "Security Management"



Conferences related to Security Management

Back to Top

No conferences are currently tagged "Security Management"


Periodicals related to Security Management

Back to Top

No periodicals are currently tagged "Security Management"


Most published Xplore authors for Security Management

Back to Top

Xplore Articles related to Security Management

Back to Top

Risks and Benefits: Game‐Theoretical Analysis and Algorithm for Virtual Machine Security Management in the Cloud

Assured Cloud Computing, None

The growth of cloud computing has spurred many entities, both small and large, to use cloud services in order to achieve cost savings. Public cloud computing has allowed for quick, dynamic scalability without much overhead or long‐term commitments. However, there are some disincentives to using cloud services, and one of the biggest is the inherent and unknown danger stemming from ...


The Research of System Survivability Architecture Based on Immunity Principle

2009 Second International Symposium on Information Science and Engineering, 2009

Survivability which gives a new way to research the network security is different from traditional network security. First, this paper summarized the research of survivability for network system and the immunity principle. On this basis, network system survivability management architecture based on immunity principle is proposed. Then the process of multi-agent is introduced. At last the paper summarized the characteristic ...


An Improved RBAC Model and its Application

2009 Third International Conference on Genetic and Evolutionary Computing, 2009

In this paper, it is proposed the improved RBAC model based on traditional RBAC. The improved RBAC model adds restrictions on the role assignment for the user and introduces user group, it improves the system security and flexibility, reducing the complexity of the permission assignment. The improved RBAC model can be easily applied to other information systems, now it has ...


The study of security of E-school management information system

2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT), 2010

With the popularity of network education and the development of network information management technology, the application of E-school system based on network becomes more and more extensive. On this open condition of web, the need of security of E-school management information system accordingly is higher than before. Considering on this, this article has brought out a series of security problem-solving ...


Development of a Security Application based on User-Centric Evaluation

2016 6th International Conference on IT Convergence and Security (ICITCS), 2016

In this paper, we designed and implemented a security management application based on user-centric evaluation, which is named HOT SAUCE. HOT SAUCE collects statistics of user's individual evaluation and comments about the security of applications, and it helps user to manage the security of installed applications. It also helps user to decide whether or not to install a new application ...


More Xplore Articles

Educational Resources on Security Management

Back to Top

IEEE-USA E-Books

  • Risks and Benefits: Game‐Theoretical Analysis and Algorithm for Virtual Machine Security Management in the Cloud

    The growth of cloud computing has spurred many entities, both small and large, to use cloud services in order to achieve cost savings. Public cloud computing has allowed for quick, dynamic scalability without much overhead or long‐term commitments. However, there are some disincentives to using cloud services, and one of the biggest is the inherent and unknown danger stemming from a shared platform – namely, the hypervisor. An attacker who compromises a virtual machine (VM) and then goes on to compromise the hypervisor can readily compromise all virtual machines on that hypervisor. That brings into play the game‐theoretic problem of negative externalities, in which the security of one player affects the security of another. Using game theory to model and solve these externalities, we show that there are multiple Nash equilibriums. Furthermore, we demonstrate that the VM allocation type can adversely affect the role that externality plays in the cloud security game. Finally, we propose an allocation method based on a Nash equilibrium such that the negative externality imposed on other players can be significantly lowered compared to that found with other common VM allocation methods.

  • The Research of System Survivability Architecture Based on Immunity Principle

    Survivability which gives a new way to research the network security is different from traditional network security. First, this paper summarized the research of survivability for network system and the immunity principle. On this basis, network system survivability management architecture based on immunity principle is proposed. Then the process of multi-agent is introduced. At last the paper summarized the characteristic of this architecture. Analysis proves it is very effective that immunity principle is used in the area of network survivability management. And many problems of building survivable network system are solved.

  • An Improved RBAC Model and its Application

    In this paper, it is proposed the improved RBAC model based on traditional RBAC. The improved RBAC model adds restrictions on the role assignment for the user and introduces user group, it improves the system security and flexibility, reducing the complexity of the permission assignment. The improved RBAC model can be easily applied to other information systems, now it has practical significance in the management information system.

  • The study of security of E-school management information system

    With the popularity of network education and the development of network information management technology, the application of E-school system based on network becomes more and more extensive. On this open condition of web, the need of security of E-school management information system accordingly is higher than before. Considering on this, this article has brought out a series of security problem-solving plan based on E-school, in allusion to the characteristic of NMIS, and also analyzed the security strategy in the plan.

  • Development of a Security Application based on User-Centric Evaluation

    In this paper, we designed and implemented a security management application based on user-centric evaluation, which is named HOT SAUCE. HOT SAUCE collects statistics of user's individual evaluation and comments about the security of applications, and it helps user to manage the security of installed applications. It also helps user to decide whether or not to install a new application by giving the security rating and comments on the application evaluated by other users. It is expected that HOT SAUCE provides Android users with enhanced security management.

  • SIISAM: A Model for Secure Inhomogeneous Information Systems

    SIISAM is a multilayered, Web-service-based architecture model designed to guide construction of a secure, interoperable, and extensible information system that allows smooth interoperation of legacy applications. A pilot e-government system in China built using the model has achieved its targets in both functionality and performance.

  • Knowledge system new tool of the security experts education

    The current security situation is different from the past. Clash of the enemy parties was transferred also into the information war. Therefore, to be successful in this fight, it is important to have a security strategy. The aim of the strategy in the field of information security is to prevent or minimize chances of harm and minimize the harm size. To achieve the highest possible level of security, each organization must have professionally prepared security management, which will manage and participate in a training of employees of the company. Training should be targeted and extremely interactive, must make a comprehensive education with the use of e-learning and knowledge systems. The human factor is the most risk and, therefore, it is very important to pursue education and training. Knowledge-based systems are the most complex tool, which help to understand things in context.

  • The design of teaching management information system based on oracle security audit technology

    The information system audit is to record information system user activity in the behavior of a mechanism, it is not only able to identify who access to the system, and can be how to use the recording system, so as to provide the basis for the after process of security incidents. Of oracle security audit technology is applied to the teaching management information system, on the system of information security is an important safeguard, provides an important guarantee for multi-level management, made clear the role of their duties, and especially for all kinds of personnel database administrators and academic staff's liabilities accordingly to monitor and record, it will effectively prevent illegal data change and use, to implement the responsibility of the data from problems has a key role, for the safety of the teaching management information system is very practical.

  • Integrated security system management and incident management from the perspective of organizational structure

    This contribution presents different approach to security management in companies. Current approach focuses on separately managed individual security fields compared to the proposed new approach. This approach is based on integrated security system management. The main objective of this paper, which is based on project “Possibilities of ITIL1 implementation in Commercial Security Industry”, is to propose the model of integrated security system management and incident management from the perspective of organizational structure.

  • Information system integrated security

    Security is an important part of information system design and development. The security of information system (IS) cannot be solved only by management of information technologies security because information technologies constitute only a part of IS. A comprehensive and integrated view of the security of IS considering all its parts (hardware, software, human factor, data, and the impact of real world), is presented in the paper. The design of well- implemented information security management system is the reliable way towards the safety of information in a company or in an institution.



Standards related to Security Management

Back to Top

No standards are currently tagged "Security Management"