Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14365/1960
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKondakçı, Süleyman-
dc.date.accessioned2023-06-16T14:25:29Z-
dc.date.available2023-06-16T14:25:29Z-
dc.date.issued2006-
dc.identifier.isbn0-7695-2564-4-
dc.identifier.urihttps://doi.org/10.1109/IWIA.2006.1-
dc.identifier.urihttps://hdl.handle.net/20.500.14365/1960-
dc.description4th IEEE International Workshop on Information Assurance -- APR 13-14, 2006 -- Royal Holloway, Univ London, Egham, ENGLANDen_US
dc.description.abstractWe present a new model to conduct security evaluation of remote assets with dedicated profiles. An alternative approach to risk management in information assurance (IA) and a related protocol for remote evaluation of information assets is presented here. Application of this protocol ensures long-term risk management, hence efficient proactive lifecycle protection of critical information systems. Due to its generic and interoperable structure based on the modem web technologies, the protocol can be applied to risk assessment and evaluation of a multitude type of systems. The protocol consists of a secure communication architecture associated with each asset a security profile, and software services and agents that communicate over the Internet and other open networks. The secure communication architecture uses a secure exchange protocol incorporating the fast elliptic curve cryptography. Interoperable, continuous, inexpensive, time- and location-neutral, and minimum resource usage are some of its advantages. With this new notion, we also aim at inspiring developers and researchers to develop value-added security evaluation tools, techniques and procedures.en_US
dc.description.sponsorshipIEEE Task Force Informat Assurance,ACM SIGSACen_US
dc.language.isoenen_US
dc.publisherIEEE Computer Socen_US
dc.relation.ispartofFourth Ieee Internatıonal Workshop on Informatıon Assurance, Proceedıngsen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectproactive IAen_US
dc.subjectremote assessmenten_US
dc.subjectsecurity evaluationen_US
dc.subjectrisk analysis and security managementen_US
dc.subjectVerification and validation of securityen_US
dc.subjectsecurity protocolen_US
dc.subjectAuthenticationen_US
dc.titleA remote IT security evaluation scheme: A proactive approach to risk managementen_US
dc.typeConference Objecten_US
dc.identifier.doi10.1109/IWIA.2006.1-
dc.identifier.scopus2-s2.0-33750940021en_US
dc.departmentİzmir Ekonomi Üniversitesien_US
dc.authoridKondakçı, Süleyman/0000-0001-5150-3220-
dc.authorwosidKondakçı, Süleyman/AAU-8212-2021-
dc.authorscopusid15061511300-
dc.identifier.startpage93en_US
dc.identifier.endpage100en_US
dc.identifier.wosWOS:000237250400007en_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.scopusqualityN/A-
dc.identifier.wosqualityN/A-
item.grantfulltextreserved-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.openairetypeConference Object-
item.fulltextWith Fulltext-
item.languageiso639-1en-
crisitem.author.dept05.05. Computer Engineering-
Appears in Collections:Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Files in This Item:
File SizeFormat 
1960.pdf
  Restricted Access
266.33 kBAdobe PDFView/Open    Request a copy
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

5
checked on Oct 2, 2024

WEB OF SCIENCETM
Citations

1
checked on Oct 2, 2024

Page view(s)

78
checked on Sep 30, 2024

Download(s)

6
checked on Sep 30, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.