Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14365/1960
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kondakçı, Süleyman | - |
dc.date.accessioned | 2023-06-16T14:25:29Z | - |
dc.date.available | 2023-06-16T14:25:29Z | - |
dc.date.issued | 2006 | - |
dc.identifier.isbn | 0-7695-2564-4 | - |
dc.identifier.uri | https://doi.org/10.1109/IWIA.2006.1 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14365/1960 | - |
dc.description | 4th IEEE International Workshop on Information Assurance -- APR 13-14, 2006 -- Royal Holloway, Univ London, Egham, ENGLAND | en_US |
dc.description.abstract | We present a new model to conduct security evaluation of remote assets with dedicated profiles. An alternative approach to risk management in information assurance (IA) and a related protocol for remote evaluation of information assets is presented here. Application of this protocol ensures long-term risk management, hence efficient proactive lifecycle protection of critical information systems. Due to its generic and interoperable structure based on the modem web technologies, the protocol can be applied to risk assessment and evaluation of a multitude type of systems. The protocol consists of a secure communication architecture associated with each asset a security profile, and software services and agents that communicate over the Internet and other open networks. The secure communication architecture uses a secure exchange protocol incorporating the fast elliptic curve cryptography. Interoperable, continuous, inexpensive, time- and location-neutral, and minimum resource usage are some of its advantages. With this new notion, we also aim at inspiring developers and researchers to develop value-added security evaluation tools, techniques and procedures. | en_US |
dc.description.sponsorship | IEEE Task Force Informat Assurance,ACM SIGSAC | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE Computer Soc | en_US |
dc.relation.ispartof | Fourth Ieee Internatıonal Workshop on Informatıon Assurance, Proceedıngs | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | proactive IA | en_US |
dc.subject | remote assessment | en_US |
dc.subject | security evaluation | en_US |
dc.subject | risk analysis and security management | en_US |
dc.subject | Verification and validation of security | en_US |
dc.subject | security protocol | en_US |
dc.subject | Authentication | en_US |
dc.title | A remote IT security evaluation scheme: A proactive approach to risk management | en_US |
dc.type | Conference Object | en_US |
dc.identifier.doi | 10.1109/IWIA.2006.1 | - |
dc.identifier.scopus | 2-s2.0-33750940021 | en_US |
dc.department | İzmir Ekonomi Üniversitesi | en_US |
dc.authorid | Kondakçı, Süleyman/0000-0001-5150-3220 | - |
dc.authorwosid | Kondakçı, Süleyman/AAU-8212-2021 | - |
dc.authorscopusid | 15061511300 | - |
dc.identifier.startpage | 93 | en_US |
dc.identifier.endpage | 100 | en_US |
dc.identifier.wos | WOS:000237250400007 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.scopusquality | N/A | - |
dc.identifier.wosquality | N/A | - |
item.grantfulltext | reserved | - |
item.openairetype | Conference Object | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.fulltext | With Fulltext | - |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 05.05. Computer Engineering | - |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
Files in This Item:
File | Size | Format | |
---|---|---|---|
1960.pdf Restricted Access | 266.33 kB | Adobe PDF | View/Open Request a copy |
CORE Recommender
SCOPUSTM
Citations
5
checked on Nov 20, 2024
WEB OF SCIENCETM
Citations
1
checked on Nov 20, 2024
Page view(s)
82
checked on Nov 18, 2024
Download(s)
6
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.