Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
In this paper we present a complete reference framework for the operation of Certification Service Provider as an organisation. The objective is to form an intermediate reference m...
Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. ...
Cyberinsurance is a powerful tool to align market incentives toward improving Internet security. We trace the evolution of cyberinsurance from traditional insurance policies to ear...
In healthcare domain, there is a gap between healthcare systems and government regulations such as the Health Insurance Portability and Accountability Act (HIPAA). The violations ...
Malicious codes and worms comprise the largest portion of the loss caused the security problem in the Internet. Small worms such as the “Blaster” spread quickly through the eno...
Jangha Kim, Kanghee Lee, Sangwook Kim, Jungtaek Se...