Information Security Journal: A Global Perspective最新文献

筛选
英文 中文
Privacy and biometrics for smart healthcare systems: attacks, and techniques 智能医疗保健系统的隐私和生物识别技术:攻击和技术
Information Security Journal: A Global Perspective Pub Date : 2023-10-03 DOI: 10.1080/19393555.2023.2260818
Alec Wells, Aminu Bello Usman
{"title":"Privacy and biometrics for smart healthcare systems: attacks, and techniques","authors":"Alec Wells, Aminu Bello Usman","doi":"10.1080/19393555.2023.2260818","DOIUrl":"https://doi.org/10.1080/19393555.2023.2260818","url":null,"abstract":"Biometric technology has various applications in smart healthcare systems, including patient authentication, health monitoring, telemedicine, clinical decision support, and personalized care. In addition, medical records contain sensitive and personal information, making them vulnerable to unauthorized access and theft. Because biometric data is distinct and unchangeable, unlike passwords or PINs, using biometric technologies in smart healthcare systems creates privacy problems. This creates privacy concerns as this information is highly sensitive and can be used to identify an individual, making it a valuable target for malicious actors. Subsequently, the storage and use of biometric data in smart healthcare systems must be handled with care to ensure that individuals’ privacy rights are protected. Privacy by design is a concept that emphasizes the importance of incorporating privacy considerations into the design and development of products, services, and systems. In this paper, we presented different forms of biometric factors and technologies and their applications in the smart healthcare system to enhance security and privacy in relation to principles of privacy by design. In addition, the study analyzed a variety of attacks and techniques that can be utilized to compromise biometric technology in a smart healthcare system and presented some open research questions.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135743606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using software metrics for predicting vulnerable classes in java and python based systems 使用软件度量来预测基于java和python的系统中的易受攻击类
Information Security Journal: A Global Perspective Pub Date : 2023-07-28 DOI: 10.1080/19393555.2023.2240343
Kazi Zakia Sultana, Vaibhav Anu, Tai-Yin Chong
{"title":"Using software metrics for predicting vulnerable classes in java and python based systems","authors":"Kazi Zakia Sultana, Vaibhav Anu, Tai-Yin Chong","doi":"10.1080/19393555.2023.2240343","DOIUrl":"https://doi.org/10.1080/19393555.2023.2240343","url":null,"abstract":"","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133780123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bio-Metric Based Colour-Image-Encryption using Multi-Chaotic Dynamical Systems and SHA-256 Hash Algorithm 基于多混沌动态系统和SHA-256哈希算法的生物识别彩色图像加密
Information Security Journal: A Global Perspective Pub Date : 2023-06-29 DOI: 10.1080/19393555.2023.2230205
B. Rahul, K. Kuppusamy, A. Senthilrajan
{"title":"Bio-Metric Based Colour-Image-Encryption using Multi-Chaotic Dynamical Systems and SHA-256 Hash Algorithm","authors":"B. Rahul, K. Kuppusamy, A. Senthilrajan","doi":"10.1080/19393555.2023.2230205","DOIUrl":"https://doi.org/10.1080/19393555.2023.2230205","url":null,"abstract":"","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124373724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User perception of Context-Based Micro-Training – a method for cybersecurity training 基于情境的微训练的用户感知——一种网络安全培训方法
Information Security Journal: A Global Perspective Pub Date : 2023-06-09 DOI: 10.1080/19393555.2023.2222713
Joakim Kävrestad, S. Furnell, Marcus Nohlberg
{"title":"User perception of Context-Based Micro-Training – a method for cybersecurity training","authors":"Joakim Kävrestad, S. Furnell, Marcus Nohlberg","doi":"10.1080/19393555.2023.2222713","DOIUrl":"https://doi.org/10.1080/19393555.2023.2222713","url":null,"abstract":"","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130459710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing AMI-IoT networks against multiple RPL attacks using ensemble learning IDS and light-chain based prediction detection and mitigation mechanisms 使用集成学习IDS和基于轻链的预测检测和缓解机制保护AMI-IoT网络免受多种RPL攻击
Information Security Journal: A Global Perspective Pub Date : 2023-06-01 DOI: 10.1080/19393555.2023.2218852
S. M M, Basarkod P I
{"title":"Securing AMI-IoT networks against multiple RPL attacks using ensemble learning IDS and light-chain based prediction detection and mitigation mechanisms","authors":"S. M M, Basarkod P I","doi":"10.1080/19393555.2023.2218852","DOIUrl":"https://doi.org/10.1080/19393555.2023.2218852","url":null,"abstract":"ABSTRACT Advanced Metering Infrastructure (AMI) is one of the Internet of Things (IoT) enabled smart applications of smart grids. The Routing Protocol for Low Power and Lossy network (RPL) has been accepted to facilitate effective routing services for the AMI. However, numerous RPL attacks appear in AMI due to resource scarcity and dubious wireless medium, which significantly impedes the successful deployment of AMI-RPL. To enable secure and reliable AMI-RPL, this work proposes a novel Intrusion Detection System (IDS) named AMI Attack-aware Intelligent Machine learning IDS (AIMS). The primary objectives of AIMS are to predict, detect, and mitigate different types of RPL security attacks in the AMI environment. To predict the RPL attacks using the Stacked Ensemble (SE) machine learning model, a novel AMI-RPL Attack Dataset (ARAD) is generated by the Cooja simulator with the suitable pre-processing and the Spider Monkey Optimization (SMO) based feature selection. The advanced prediction of attack nodes improves the performance and significantly diminishes the future damages of AMI. The attack detection is based on immutable blocks of a light-chain model, and the cryptocurrency-based mitigation model effectively isolates the attackers. AIMS mechanism amplifies RPL security with high reliability and maximizes the AMI network lifetime by delivering superior results.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131464592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A lightweight group key management scheme with constant rekeying cost and public bulletin size 一个轻量级的组密钥管理方案,具有恒定的密钥更新成本和公共公告大小
Information Security Journal: A Global Perspective Pub Date : 2023-04-21 DOI: 10.1080/19393555.2023.2198737
Payal Sharma, Purushothama B R
{"title":"A lightweight group key management scheme with constant rekeying cost and public bulletin size","authors":"Payal Sharma, Purushothama B R","doi":"10.1080/19393555.2023.2198737","DOIUrl":"https://doi.org/10.1080/19393555.2023.2198737","url":null,"abstract":"","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"747 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121077167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The evolution of global cybersecurity norms in the digital age: A longitudinal study of the cybersecurity norm development process 数字时代全球网络安全规范的演变:网络安全规范发展过程的纵向研究
Information Security Journal: A Global Perspective Pub Date : 2023-04-21 DOI: 10.1080/19393555.2023.2201482
Benjamin F. Madnick, Keman Huang, S. Madnick
{"title":"The evolution of global cybersecurity norms in the digital age: A longitudinal study of the cybersecurity norm development process","authors":"Benjamin F. Madnick, Keman Huang, S. Madnick","doi":"10.1080/19393555.2023.2201482","DOIUrl":"https://doi.org/10.1080/19393555.2023.2201482","url":null,"abstract":"Developing cybersecurity norms and global normative cybersecurity behaviors play an increasingly critical role in global cybersecurity governance. This paper takes a longitudinal approach to analyze cybersecurity norms development activities during the period 1997–2020. A total of 206 individual cases were collected, and 233 individual cybersecurity norms were identified and compiled into 25 subject categories. Categorizing the norm subjects alongside the frequency of cases and norms identified each year allowed for a longitudinal view of cyber norm activities and the evolution in developments over these years. This examination enables us to categorize cybersecurity norms, including their dynamic focus and evolution patterns. By studying those viewed as “successful,” we gain guidance regarding the construction of global cybersecurity governance in the digital age. KEYWORDS","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128440438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards a Comprehensive Framework for the Multidisciplinary Evaluation of Organizational Maturity on Business Continuity Program Management: A Systematic Literature Review 面向业务连续性计划管理组织成熟度多学科评价的综合框架:系统文献综述
Information Security Journal: A Global Perspective Pub Date : 2023-03-28 DOI: 10.1080/19393555.2023.2195577
Nelson Russo, Leonilde Reis, Clara Silveira, H. Mamede
{"title":"Towards a Comprehensive Framework for the Multidisciplinary Evaluation of Organizational Maturity on Business Continuity Program Management: A Systematic Literature Review","authors":"Nelson Russo, Leonilde Reis, Clara Silveira, H. Mamede","doi":"10.1080/19393555.2023.2195577","DOIUrl":"https://doi.org/10.1080/19393555.2023.2195577","url":null,"abstract":"ABSTRACT Organizational dependency on Information and Communication Technology (ICT) drives the preparedness challenge to cope with business process disruptions. Business Continuity Management (BCM) encompasses effective planning to enable business functions to resume to an acceptable state of operation within a defined timeframe. This paper presents a systematic literature review that communicates the strategic guidelines to streamline the organizational processes in the BCM program, culminating in the Business Continuity Plan design, according to the organization’s maturity. The systematic literature review methodology follows the Evidence-Based Software Engineering protocol assisted by the Parsifal tool, using the EbscoHost, ScienceDirect, and Scopus databases, ranging from 2000 to February 2021. International Standards and Frameworks guide the BCM program implementation, however, there is a gap in communicating metrics and what needs to be measured in the BCM program. The major paper result is the confirmation of the identified gap, through the analysis of the studies that, according to the BCM components, report strategic guidelines to streamline the BCM program. The analysis quantifies and discusses the contribution of the studies on each BCM component to design a framework supported by metrics, that allows assessing the organization’s preparedness in each BCM component, focusing on Information Systems and ICT strategies.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121769542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
URL filtering using machine learning algorithms 使用机器学习算法的URL过滤
Information Security Journal: A Global Perspective Pub Date : 2023-03-28 DOI: 10.1080/19393555.2023.2193350
Asia Othman Aljahdalic, Shoroq Banafee, Thana A Aljohani
{"title":"URL filtering using machine learning algorithms","authors":"Asia Othman Aljahdalic, Shoroq Banafee, Thana A Aljohani","doi":"10.1080/19393555.2023.2193350","DOIUrl":"https://doi.org/10.1080/19393555.2023.2193350","url":null,"abstract":"","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115609565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game-based security proofs for verifiable secret sharing schemes in the standard model 标准模型下可验证秘密共享方案的基于游戏的安全证明
Information Security Journal: A Global Perspective Pub Date : 2022-12-29 DOI: 10.1080/19393555.2022.2160390
S. Mashhadi
{"title":"Game-based security proofs for verifiable secret sharing schemes in the standard model","authors":"S. Mashhadi","doi":"10.1080/19393555.2022.2160390","DOIUrl":"https://doi.org/10.1080/19393555.2022.2160390","url":null,"abstract":"ABSTRACT In a verifiable secret sharing (VSS) scheme, each participant can check cheating by the dealer or the other participants. In this work, we construct a VSS scheme with the strongest level of computational security and prove its security in the standard model. This scheme is secure against active attack and does not use bilinear pairing and hash function.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124707000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信