Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJune 2024
- research-articleMarch 2023
An Analysis of Adversary-Centric Security Testing within Information and Operational Technology Environments
Digital Threats: Research and Practice (DTRAP), Volume 4, Issue 1Article No.: 14, Pages 1–29https://doi.org/10.1145/3569958Assurance techniques such as adversary-centric security testing are an essential part of the risk assessment process for improving risk mitigation and response capabilities against cyber attacks. While the use of these techniques, including vulnerability ...
- posterNovember 2022
Poster: Multi-Layer Threat Analysis of the Cloud
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 3419–3421https://doi.org/10.1145/3548606.3563515A variety of Threat Analysis (TA) techniques exist that typically target exploring threats to discrete assets (e.g., services, data, etc.) and reveal potential attacks pertinent to these assets. Furthermore, these techniques assume that the ...
- posterNovember 2022
Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 3415–3417https://doi.org/10.1145/3548606.3563514Moving Target Defense (MTD) can eliminate the asymmetric advantage that attackers have in terms of time to explore a static system by changing a system's configuration dynamically to reduce the efficacy of reconnaissance and increase uncertainty and ...
- research-articleAugust 2022
Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks
- Arash Bozorgchenani,
- Charilaos C. Zarakovitis,
- Su Fong Chien,
- Heng Siong Lim,
- Qiang Ni,
- Antonios Gouglidis,
- Wissam Mallouli
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 67, Pages 1–6https://doi.org/10.1145/3538969.3544480The advent of 5G technology introduces new - and potentially undiscovered - cybersecurity challenges, with unforeseen impacts on our economy, society, and environment. Interestingly, Intrusion Detection Mechanisms (IDMs) can provide the necessary network ...
- research-articleJuly 2022
A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems
International Journal of Critical Infrastructure Protection (IJCIP), Volume 37, Issue Chttps://doi.org/10.1016/j.ijcip.2021.100505AbstractOver the last decade, we have seen a shift in the focus of cyber attacks, moving from traditional IT systems to include more specialised Industrial Control Systems (ICS), often found within Critical National Infrastructure (CNI). ...
Highlights- Analysis of guideline documents on industrial cyber incident response & recovery.
- research-articleApril 2022
A Security Cost Modelling Framework for Cyber-Physical Systems
ACM Transactions on Internet Technology (TOIT), Volume 22, Issue 2Article No.: 53, Pages 1–31https://doi.org/10.1145/3450752Cyber-Physical Systems (CPS) are formed through interconnected components capable of computation, communication, sensing and changing the physical world. The development of these systems poses a significant challenge, since they have to be designed in a ...
- research-articleDecember 2017
All That Glitters Is Not Gold: On the Effectiveness of Cybersecurity Qualifications
Do today’s certification qualifications effectively assess cybersecurity professionals’ core competencies? Five distinct techniques for identifying qualifications form the basis of a large-scale survey of industry stakeholders.
- research-articleMarch 2017
Verification of Resilience Policies that Assist Attribute Based Access Control
ABAC '17: Proceedings of the 2nd ACM Workshop on Attribute-Based Access ControlPages 43–52https://doi.org/10.1145/3041048.3041049Access control offers mechanisms to control and limit the actions or operations that are performed by a user on a set of resources in a system. Many access control models exist that are able to support this basic requirement. One of the properties ...
- research-articleOctober 2016
Modelling security risk in critical utilities: The system at risk as a three player game and agent society
2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC)Pages 001758–001763https://doi.org/10.1109/SMC.2016.7844492It becomes essential when reasoning about the security risks to critical utilities such electrical power and water distribution to recognize that the interests of producers and consumers do not fully coincide. They may have incentives to behave ...
- research-articleJuly 2016
Information assurance techniques
Computers and Security (CSEC), Volume 60, Issue CPages 117–133https://doi.org/10.1016/j.cose.2016.03.009The assurance technique is a fundamental component of the assurance ecosystem; it is the mechanism by which we assess security to derive a measure of assurance. Despite this importance, the characteristics of these assurance techniques have not been ...
- research-articleOctober 2015
Assurance Techniques for Industrial Control Systems (ICS)
CPS-SPC '15: Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCyPages 101–112https://doi.org/10.1145/2808705.2808710Assurance techniques generate evidence that allow us to make claims of assurance about security. For the purpose of certification to an assurance scheme, this evidence enables us to answer the question: are the implemented security controls consistent ...
- articleApril 2014
Security policy verification for multi-domains in cloud systems
International Journal of Information Security (IJOIS), Volume 13, Issue 2Pages 97–111https://doi.org/10.1007/s10207-013-0205-xThe cloud is a modern computing paradigm with the ability to support a business model by providing multi-tenancy, scalability, elasticity, pay as you go and self-provisioning of resources by using broad network access. Yet, cloud systems are mostly ...
- ArticleJune 2013
Verification of Secure Inter-operation Properties in Multi-domain RBAC Systems
SERE-C '13: Proceedings of the 2013 IEEE Seventh International Conference on Software Security and Reliability CompanionPages 35–44https://doi.org/10.1109/SERE-C.2013.25The increased complexity of modern access control (AC) systems stems partly from the need to support diverse and multiple administrative domains. Systems engineering is a key technology to manage this complexity since it is capable of assuring that an ...
- articleJune 2012
domRBAC: An access control model for modern collaborative systems
Computers and Security (CSEC), Volume 31, Issue 4Pages 540–556https://doi.org/10.1016/j.cose.2012.01.010Modern collaborative systems such as the Grid computing paradigm are capable of providing resource sharing between users and platforms. These collaborations need to be done in a transparent way among the participants of a virtual organization (VO). A VO ...
- ArticleJune 2011
Role-based secure inter-operation and resource usage management in mobile grid systems
Dynamic inter-domain collaborations and resource sharing comprise two key characteristics of mobile Grid systems. However, interdomain collaborations have proven to be vulnerable to conflicts that can lead to privilege escalation. These conflicts are ...
- ArticleSeptember 2009
A Foundation for Defining Security Requirements in Grid Computing
PCI '09: Proceedings of the 2009 13th Panhellenic Conference on InformaticsPages 180–184https://doi.org/10.1109/PCI.2009.29Despite the wide adoption by the scientific community, grid technologies have not been given the appropriate attention by enterprises. This is merely due to the lack of enough studying and defining security requirements of grid computing systems. More ...