DSCI - Best Practices Meet 2013最新文献

筛选
英文 中文
Information security challenges in social media interactions: strategies to normalize practices across physical and virtual worlds 社交媒体互动中的信息安全挑战:跨物理和虚拟世界规范实践的策略
DSCI - Best Practices Meet 2013 Pub Date : 2013-07-12 DOI: 10.1109/BPM.2013.6615012
Santosh Putchala, K. Bhat, R. Anitha
{"title":"Information security challenges in social media interactions: strategies to normalize practices across physical and virtual worlds","authors":"Santosh Putchala, K. Bhat, R. Anitha","doi":"10.1109/BPM.2013.6615012","DOIUrl":"https://doi.org/10.1109/BPM.2013.6615012","url":null,"abstract":"With the onset of new communication models, social communication took a new shape and these interactions embraced the World Wide Web. These social media interactions are quite analogous to the real world communications, and have numerous derived benefits. Humongous amount of information is generated and exchanged through social media interactions. In most instances, this information exchange does not pass through authorizations, approvals and is thus uncontrolled. This poses major concerns regarding information security & privacy. For the organization, even though there are perceived business benefits from engaging in social media, un-controlled information exchange stands as a major concern. This paper details the strategies that can be employed so as to mitigate risks of social media to the organization. It discusses the information security & privacy risks and issues underlying the social media interactions. Further, the paper suggests strategies that can minimize the risks from these interactions. The paper concludes with a discussion on the nuances and suggests future work in this arena.","PeriodicalId":186910,"journal":{"name":"DSCI - Best Practices Meet 2013","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127337316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic malware detection and recording using virtual machine introspection 动态恶意软件检测和记录使用虚拟机自省
DSCI - Best Practices Meet 2013 Pub Date : 2013-07-12 DOI: 10.1109/BPM.2013.6615011
A. More, S. Tapaswi
{"title":"Dynamic malware detection and recording using virtual machine introspection","authors":"A. More, S. Tapaswi","doi":"10.1109/BPM.2013.6615011","DOIUrl":"https://doi.org/10.1109/BPM.2013.6615011","url":null,"abstract":"Detecting and collecting malware samples is considered to be a milestone in computer security. Recording entire Virtual Machine (VM) activities requires considerable resources and it is not the wiser choice too. Our approach is combination of Virtual machine introspection (VMI), file system clustering, malware activity recording. The proposed framework consists of four steps. In initial step possible executable codes are detected using clustering algorithm. Next step monitors process and information flow for these executables using VMI. The data and information flow graph is generated for such processes. Malicious graphs among all are detected in next step. Final step comprises of recording malicious graphs and commitment of VM. We have implemented the prototype of this framework on leading hypervisor for Windows OS. Experimental results shows that it is better way to detect and store malicious processes than storing entire VM. We believe it as a cost effective intelligent solution for malware recording.","PeriodicalId":186910,"journal":{"name":"DSCI - Best Practices Meet 2013","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129029444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Modernize the network: Device identity networks meet enterprise needs 网络现代化:设备身份网络满足企业需求
DSCI - Best Practices Meet 2013 Pub Date : 2013-07-01 DOI: 10.1109/BPM.2013.6615010
S. Sprague
{"title":"Modernize the network: Device identity networks meet enterprise needs","authors":"S. Sprague","doi":"10.1109/BPM.2013.6615010","DOIUrl":"https://doi.org/10.1109/BPM.2013.6615010","url":null,"abstract":"The enterprise network is being modernized because users expect consistent availability of services regardless of the device they are using and the network they are on. They balk when their laptops or tablets supply email or voice services different from the services on their smart phones, where their email or voice “just works.” They no longer want to use tablets if they are barred from the services available through their enterprise networks.","PeriodicalId":186910,"journal":{"name":"DSCI - Best Practices Meet 2013","volume":"51 35","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113957731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信