A Group-Enhanced ISSI Model for Secure Interconnection of Information Systems
نویسندگان
چکیده
Ethics has typically been considered an essential facet of secure interconnection of information systems. In closed networks common ethics among users is a valid assumption, and various models for the management of information security have been proposed where ethics governs various operational and managerial information security related tasks. Emergence of open, public networks, such as the Internet, makes the ethics-based models problematic. These problems shall be analysed and an enhancement shall be proposed for the ISSI (Information Systems Secure Interconnection) model. Proposed enhancements improve the feasibility of ISSI model in open, public networks and make it more feasible by aligning it with human group behaviour and security enforcement technology.
منابع مشابه
A Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملAn Analysis of Ethics as Foundation of Information Security in Distributed Systems
Security of distributed systems requires both technical and administrative foundations. Technical foundation is based on cryptographic measures and access control models, and is considerable well understood. Administrative foundation is based on several nontechnical layers added on top of technical communication protocols. Several models for secure interconnection of information systems suggest...
متن کاملSecure Communication in Shotgun Cellular Systems
In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998