Blockchain Technology and GDPR Compliance: A Comprehensive Applicability Model [PDF]
This study investigates the potential of blockchain technology to support compliance with the General Data Protection Regulation (GDPR). By integrating blockchain's core features, such as transparency, immutability, and data encryption, with GDPR ...
Abouzar Arabsorkhi , Elham Khazaei
doaj +1 more source
IT/IS security management with uncertain information [PDF]
Summary: The paper introduces a novel proposal of a security management system destined primarily for application in the field of IT. Its core is formed by a triplet of cooperating knowledge-based (expert) systems, the knowledge bases of which consist of vague If-Then rules. The knowledge bases were created by experts on the problem domain and multiple
Klimeš, Cyril, Bartoš, Jiří
openaire +1 more source
A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo +3 more
core +2 more sources
Guidelines for designing IT security management tools [PDF]
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of design guidelines for such tools. We gathered guidelines and recommendations related to IT security management tools from the literature as well as from our own prior studies ...
Jaferian, Pooya +4 more
openaire +1 more source
Information security management is very important to use, especially for educational instutions, because it is able to reduce the risk of threats to the use of information technology for educational organizations.
Titus Kristanto +3 more
doaj +1 more source
The Role of Implementation of Service Management and Security Frameworks in Information Technology Service Continuity [PDF]
Competitive business environment and high dependency to the services has caused organizations to be evaluated based on the level of their ability in providing continuous services.
Soheila Jafarnezhad +1 more
doaj +1 more source
Shinren : Non-monotonic trust management for distributed systems [PDF]
The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust management which utilises the notion of trust in order to specify and interpret security
Dong, Changyu, Dulay, Naranker
core +4 more sources
Enterprise data security compliance strategy: A study based on typical cases [PDF]
Data security compliance management is the fundamental premise that data application does not infringe on the interests of countries, enterprises and individuals. It is an important foundation for realizing the driving role of data elements. Based on the
Xu Yinghui +5 more
doaj +1 more source
The Effect of the Implementation of Information Security Management System (ISMS) and Information Technology Infrastructure Library (ITIL) on the Promotion of Information Systems and Information Technology Services Continues [PDF]
The purpose of this study was to investigate and analyze the factors affecting the upgrading of information systems and the continues of information technology services.
Ahmad Salehi, Zahra Vazife
doaj +1 more source
Analytic Hierarchy Process Framework for Water Security Management in Egypt [PDF]
Water security is one of the main serious constraints for development in Egypt. Furthermore, it is essential to develop strategies for the water sector in an integrated way.
Mohamed Hamed
doaj +1 more source

