367 resources related to Enterprise Security
- Topics related to Enterprise Security
- IEEE Organizations related to Enterprise Security
- Conferences related to Enterprise Security
- Periodicals related to Enterprise Security
- Most published Xplore authors for Enterprise Security
ICC 2021 - IEEE International Conference on Communications
IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.
All topics related to engineering and technology management, including applicable analytical methods and economical/social/human issues to be considered in making engineering decisions.
The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.
To promote awareness, understanding, advancement and application of ocean engineering and marine technology. This includes all aspects of science, engineering, and technology that address research, development, and operations pertaining to all bodies of water. This includes the creation of new capabilities and technologies from concept design through prototypes, testing, and operational systems to sense, explore, understand, develop, use, and responsibly manage natural resources.
11th International Conference on Computational Intelligence and Communication Networks (CICN 2017) is organized to address various issues to support intelligentsolutions for society. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication networks with the goal of exchanging knowledge that encompasses a broad range of disciplines among various distinct communities. It is expected that researchers will enhance collaboration across disciplines in order to support novel breakthroughs in the field.
Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...
Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.
IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...
Web 2.0 is among the most talked-about, highest-buzz IT constructs of late, the subject of numerous articles and blogs and, since 2004, multiple conferences. While in many respects an Internet phenomenon, Web 2.0 is quickly gaining a beachhead against the legacy "stovepiped" way in which users manage and disseminate information of all kinds within the enterprise. It's also an outside-in ...
2011 Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011
Enterprises security is a complex problem. Pure technology-driven development methods are not sufficient to solve a broad range of enterprise security issues. This paper analyzes the complexity of enterprise security and proposes an organization-driven approach for the problem. The approach combines a set of Unified Modeling Language-based approaches to bridge the gap between enterprise security architecture models and security application ...
2012 International Conference on Information Science and Applications, 2012
Most of organizations operate an Enterprise Security Management system (ESM) for managing and analyzing security events. However, it is difficult to instantly analyze and respond for each event by a security manager because the amount of security events collected, stored, analyzed, and displayed by the Enterprise Security Management system is significantly increased according to time and expansions in systems and ...
2010 2nd IEEE International Conference on Information Management and Engineering, 2010
With the development of internet and the build of enterprise information, enterprise information resources are integrated and enterprise search engines are built. They have been become a hot topic of enterprise information. LogicSQL is a high-level security database system, and it is independently developed. The development of enterprise internal search system is based on LogicSQL security database. We must utilize ...
2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 2009
Generally speaking, there is no single solution for security architecture in each enterprise; however, there are common elements of security architecture that enterprises should consider when developing their security plan. Security services provide confidentiality, integrity, and availability services for the platform. This paper describes a way to map these security services into overall enterprise security architecture. We demonstrate a framework ...
Abstraction and Modeling of Cyber Security tutorial, Part 2
NIKSUN World Wide Security & Mobility Conference 2011-B Lyons
Regular Expression Matching with Memristor TCAMs - Cat Graves - ICRC 2018
Divya Neelagiri from Samsung Research America at WIE ILC 2016
Security Issues, Approaches and Practices in the IoT-Fog Era - Fog World Congress 2017
Security in SDN/NFV and 5G Network: Opportunities and Challenges - IEEE Future Networks Initiative
EDOC 2010 - Prof. David Luckham Keynote
Edge Computing for 5G, Use Cases and Evolution - Srinivasan Ramanujam - India Mobile Congress, 2018
Protecting Internet Traffic: Security Challenges and Solutions – IEEE Internet Initiative Webinar
Panel: Edge Cloud Computing, Private Networks & Slicing - B5GS 2019
Industry Use Cases Where Fog Is Essential - Fog World Congress 2017
EDOC 2010 - Sylvain Halle - Best Paper Presentation
IEEE Smart Village - Empowering Off-Grid Communities
NIKSUN World Wide Security & Mobility Conference 2011-Rajagopalan
Why Adversity Can Be Your Motivator - Kathy Kountze-Tatum at IEEE WIE Forum USA East 2017
NIKSUN World Wide Security & Mobility Conference 2011 - V Solanki Lecture
Eric Vyncke: Internet of Things and Security: Different than Network Security? - WF-IoT 2015
What's New in Storage Devices - Jim Gathman from IBM
Web 2.0 is among the most talked-about, highest-buzz IT constructs of late, the subject of numerous articles and blogs and, since 2004, multiple conferences. While in many respects an Internet phenomenon, Web 2.0 is quickly gaining a beachhead against the legacy "stovepiped" way in which users manage and disseminate information of all kinds within the enterprise. It's also an outside-in revolution: Technologies developed and explored outside the enterprise are migrating inside it. People who've gotten hooked on Web 2.0 demand the same user experience, tools, and networking in their work that they've experienced at play. The good news for enterprise security practitioners is that the impact of Web 2.0 has thus far been evolutionary. However, Web 2.0 growth is accelerating, and it's doing so for reasons as varied as compliance, privacy, and protection of corporate assets. Organizations considering deployment of Web 2.0 capabilities must exercise caution and control, just as they do with non-Web 2.0 technologies. What's needed, in short, is Security 2.0.
Enterprises security is a complex problem. Pure technology-driven development methods are not sufficient to solve a broad range of enterprise security issues. This paper analyzes the complexity of enterprise security and proposes an organization-driven approach for the problem. The approach combines a set of Unified Modeling Language-based approaches to bridge the gap between enterprise security architecture models and security application development models. It allows an enterprise to coordinate security resources from an enterprise point of view, and develop security applications systematically and efficiently. A comprehensive case study is conducted to illustrate the approach. The study shows through the refinement of enterprise security goals, both software goals and software requirements for a security application can be obtained. In particular, a security application is built to support the specification and automated verification of separation of duty access policies using the Object Constraint Language and formal method Alloy.
Most of organizations operate an Enterprise Security Management system (ESM) for managing and analyzing security events. However, it is difficult to instantly analyze and respond for each event by a security manager because the amount of security events collected, stored, analyzed, and displayed by the Enterprise Security Management system is significantly increased according to time and expansions in systems and networks. In addition, as the trends of threats have been changed as a type of Advanced Persistent Threat (APT) that attacks specific individuals and organizations for a long term period, an integrated analysis is required for all security events. Thus, in this study, an Enterprise Security Management system based on Threshold Classification (ESMTC) is proposed to detect and intercept cyber threats occurred for a long term period. It shows an advantage that it does not failure to notice even a single attack through structuralizing and listing detailed attack detection packets and performs related analyses to other attacks.
With the development of internet and the build of enterprise information, enterprise information resources are integrated and enterprise search engines are built. They have been become a hot topic of enterprise information. LogicSQL is a high-level security database system, and it is independently developed. The development of enterprise internal search system is based on LogicSQL security database. We must utilize the information such as employees, customers and partners' knowledge and experience, but the security of the information should be controlled. Multilevel sharing-group access control is a good way to build a security system, and a complex problem will be divided into a number of small problems. Multilevel relationships between sharing- group have the function of the BLP model's "write-up and read-down" security policy. Information integrity control function such as the BIBA model is achieved by zoning sharing-group. When the users search the same content, they can have different search results in the enterprise security system. Enterprise information is made use of, and the security of the information is completed in the enterprise security search system.
Generally speaking, there is no single solution for security architecture in each enterprise; however, there are common elements of security architecture that enterprises should consider when developing their security plan. Security services provide confidentiality, integrity, and availability services for the platform. This paper describes a way to map these security services into overall enterprise security architecture. We demonstrate a framework for understanding disparate design and process considerations; to organize architecture and actions toward improving enterprise security. The security architecture roadmap depicts an approach to map the enterprise's goals to a logical view for security, which is set of security policy and standards, security architecture, and risk management domains. The decisions in the logical layer drive the security processes through design time to run time.
Every enterprise needs to monitor its computing system for possible unauthorized intrusion and other attacks and these activities should be part of its daily routine to safeguard enterprise information system. The ISO 17799 best practices for information security management specifically addresses these issues and provides detailed guidelines on how a secure management framework should be implemented. To capture the security requirements of an organization properly, a customized information security specification language is needed. This paper presents an XML based structured language ESRML (enterprise security requirement markup language) for specifying enterprise information security requirement conforming the ISO 17799 standard.
This presentation on a utility program for enterprise security response is part of a panel session titled 'Critical Infrastructure Protection Initiatives for Electric Power'. This presentation provides an example of how an electric utility can set up a program for security response, while still recognizing the change that the industry is going through.
The WETICE Enterprise Security (ES) workshop had a total of seventeen full papers and one poster paper presented. The workshop presentation fell into four major sections: Trust Management - five papers, Role based access control - five papers, Cryptography - three papers, and Software and Network Security - five papers. Based from the papers' discussions and the large amount of focus on Trust, Risk and RBAC, this problem should continue to be focused on and addressed at the next ES workshop.
This paper presents the development of Enterprise Security Framework (ESF) for an Indonesian government institution called SKK Migas (Special Task Force for Upstream Oil and Gas Business Activities). The framework developed based on two security standard namely ISO 27000 and SABSA. The development is started by evaluating available information security standard and best practice used in enterprise scale. The next step is analyzing existing security policy and implementation regarding the Information Security Management System (ISMS) in SKK Migas and then perform gap analysis. The main step is the synthesis of security framework which intended to improve information security management in SKK Migas. The resulted security framework covers 14 security domains which will be used to control information security management within the institution.
Achieving enterprise security is a huge challenge, which becomes much more challenging when cloud is added to the mix, due to the multi-tenancy nature of cloud ecosystems. Once we add the dimensions of the Internet of Things (IoT) and Big Data, this problem becomes exponentially more complex. We consider why this is so and highlight a number of key research questions which have yet to be resolved. We seek to address the problem by combining a number of emerging research techniques which we and our collaborators have developed, in such a way as to improve the chance of achieving a better level of security and privacy for enterprises.
This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...
Standard for a Protection Profile for Hardcopy Devices in a commercial information processing environment in which a moderate level of document security, network security, and security assurance, are required. Typically, the day-to-day proprietary and non-proprietary information needed to operate an enterprise will be handled by this environment. This environment will be known as Operational Environment B.""
This standard specifies the architecture of a systematic approach for managing the health/state of the security controls of information systems, including the cost-effective selection, documentation, implementation, and ongoing assessment of security controls, and for making and maintaining system security accreditation decisions. The general schema and description of related components are provided.
Security System Application Engineer
Systems Engineering Leader, US Education & Government