Toggle Main Menu Toggle Search

Open Access padlockePrints

Performance Modelling and Evaluation of Enterprise Information Security Technologies

Lookup NU author(s): Wen Zeng, Professor Maciej KoutnyORCiD, Professor Aad van Moorsel

Downloads

Full text for this publication is not currently held within this repository. Alternative links are provided below where available.


Abstract

New technologies influence and change social attitudes by making electronic data easy to use and easy to carry, and this capability impacts data security in business organizations. Therefore, organizations have to define appropriate controls aimed at preventing the loss or leaking of data. Having said that, the effectiveness of security controlsin complex dynamic environments has not yet been systematically analyzed.In this paper, we propose a formal system model for data resources in a dynamicenvironment, which can represent the location of different classes of dataresources as well as their users. Using such a model,the concurrent and probabilistic behaviour of thesystem can be analyzed. This study provides a systematic way of exploringthe efficiency of a given security policy, or access control technology,in the business process context.The proposed approach can help a technical expert to develop a deeperanalysis of the specific security measures required by a business organization.


Publication metadata

Author(s): Zeng W, Koutny M, van Moorsel A

Publication type: Conference Proceedings (inc. Abstract)

Publication status: Published

Conference Name: 14th IEEE International Conference on Computer and Information Technology (CIT 2014)

Year of Conference: 2014

Pages: 504-511

Online publication date: 15/12/2014

Acceptance date: 23/06/2014

Publisher: IEEE

URL: http://dx.doi.org/10.1109/CIT.2014.18

DOI: 10.1109/CIT.2014.18

Library holdings: Search Newcastle University Library for this item

ISBN: 9781479962396


Share