Security Policy Management Process within Six Sigma Framework

نویسندگان

  • Vijay Anand
  • Jafar Saniie
  • Erdal Oruklu
چکیده

This paper presents a management process for creating adaptive, real-time security policies within the Six Sigma 6σ framework. A key challenge for the creation of a management process is the integration with models of known Industrial processes. One of the most used industrial process models is Six Sigma which is a business management model wherein customer centric needs are put in perspective with business data to create an efficient system. The security policy creation and management process proposed in this paper is based on the Six Sigma model and presents a method to adapt security goals and risk management of a computing service. By formalizing a security policy management process within an industrial process model, the adaptability of this model to existing industrial tools is seamless and offers a clear risk based policy decision framework. In particular, this paper presents the necessary tools and procedures to map Six Sigma DMAIC (Define-Measure-Analyze-Improve-Control) methodology to security policy management.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Applying Six Sigma Concepts, Techniques and Method for Service Management: Business and IT Service Management (BSM & ITSM)

Six Sigma methods and techniques are applied in business & IT projects for product (Goods and Services) & process design (Define, Measure, Analyze, Design and Verify or DMADV) and improvements (Define, Measure, Analyze, Improve and Control or DMAIC). Six sigma methodologies have been applied within the IT Service Management disciplines primarily for Service and Process Improvement and Optimizat...

متن کامل

An Open Reference Framework for Enterprise Information Security Risk Management Using the STOPE Scope and the Six-Sigma Process

With the wide-spreading use of e-transactions in enterprises, information security risk management (ISRM) is becoming essential for establishing a safe environment for their activities. This paper is concerned with introducing a new and comprehensive ISRM framework that enables the effective establishment of the target safe environment. The framework has two structural dimensions; and two proce...

متن کامل

Mapping SAP-Six Sigma Resources to Agile Management Processes

Enterprise Resource Planning (ERP) has become the most strategic tool for an organization to employ. A leading ERP solution is SAP®. It has been employed by organizations to enable them to collaborate on different projects and to integrate all aspects of operations. Just as organizations have adopted ERP solutions, they employed quality initiatives that are designed to help organizations ma...

متن کامل

Evaluation of the Client Patients Waiting Time in Referral Restorative Dentistry Department of Dental Clinic Using Six Sigma Model

Introduction: Waiting time is one of the factors affecting patients' satisfaction with the quality of services, therefore, reducing the waiting time has an essential role in the improvement of services and clients' satisfaction. The present study was performed to study the client patients waiting time in referral restorative dentistry department of dental clinic using Six Sigma model. Method: I...

متن کامل

Evaluation of the Client Patients Waiting Time in Referral Restorative Dentistry Department of Dental Clinic Using Six Sigma Model

Introduction: Waiting time is one of the factors affecting patients' satisfaction with the quality of services, therefore, reducing the waiting time has an essential role in the improvement of services and clients' satisfaction. The present study was performed to study the client patients waiting time in referral restorative dentistry department of dental clinic using Six Sigma model. Method: I...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Information Security

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2012