Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14365/3955
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kondakçı, Süleyman | - |
dc.date.accessioned | 2023-06-16T15:06:29Z | - |
dc.date.available | 2023-06-16T15:06:29Z | - |
dc.date.issued | 2008 | - |
dc.identifier.isbn | 9.78143E+12 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14365/3955 | - |
dc.description | Gazimagusa Teknopark, TRNC;Ministry of Education and Culture, TRNC;North Cyprus Turkcell, TRNC | en_US |
dc.description | 1st International Conference on Security of Information and Networks, SIN 2007 -- 7 May 2007 through 10 May 2007 -- Gazimagusa -- 103950 | en_US |
dc.description.abstract | We present a simple and efficient method called Validate Improve Recur (VIR) to assess and improve information security solutions. We consider validation and improvement of new security designs and evaluation of existing security implementations. The presented work will enable security administrators and evaluation facilities to improve security solutions, identify, monitor, and manage risks that may propagate to final security implementations. As a self-assessment method inexperienced users can also apply VIR to design and evaluation tasks. © 2008 Atilla Elçi. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Tafford Publishing | en_US |
dc.relation.ispartof | Security of Information and Networks - Proceedings of the 1st International Conference on Security of Information and Networks, SIN 2007 | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Security design validation | en_US |
dc.subject | Security evaluation | en_US |
dc.subject | Design and evaluations | en_US |
dc.subject | Design validation | en_US |
dc.subject | Network security solutions | en_US |
dc.subject | Recursive methods | en_US |
dc.subject | Security design | en_US |
dc.subject | Security design validation | en_US |
dc.subject | Security evaluation | en_US |
dc.subject | Security implementations | en_US |
dc.subject | Security solutions | en_US |
dc.subject | Simple++ | en_US |
dc.subject | Network security | en_US |
dc.title | A recursive method for validating and improving network security solutions | en_US |
dc.type | Conference Object | en_US |
dc.identifier.scopus | 2-s2.0-84893204852 | en_US |
dc.authorscopusid | 15061511300 | - |
dc.identifier.startpage | 74 | en_US |
dc.identifier.endpage | 83 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.scopusquality | N/A | - |
dc.identifier.wosquality | N/A | - |
item.grantfulltext | reserved | - |
item.openairetype | Conference Object | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.fulltext | With Fulltext | - |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 05.05. Computer Engineering | - |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
Files in This Item:
File | Size | Format | |
---|---|---|---|
2982.pdf Restricted Access | 5.14 MB | Adobe PDF | View/Open Request a copy |
CORE Recommender
SCOPUSTM
Citations
1
checked on Nov 20, 2024
Page view(s)
74
checked on Nov 18, 2024
Download(s)
6
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.