A Novel Model for Security Evaluation for Compliance

Sara Ligaard Hald, Jens Myrup Pedersen, Neeli R. Prasad, Ramjee Prasad

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

Abstract

With the increasing focus on security in information systems, it is becoming necessary to be able to describe and compare security attributes for different technologies. Existing are well-described and comprehensive, but expensive and resource demanding to apply. The Security Evaluation for Compliance (SEC) model offers a lightweight alternative for use by decision makers to get a quick overview of the security attributes of different technologies for easy comparison and requirement compliance evaluation. The scientific contribution is this new approach to security modelling as well as a comparison with existing methods.
Original languageEnglish
Title of host publicationProceedings of the 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE)
Number of pages4
PublisherIEEE
Publication date5 Jul 2011
ISBN (Print)978-1-4577-0786-5
DOIs
Publication statusPublished - 5 Jul 2011
EventWireless VITAE - Chennai, India
Duration: 28 Feb 20113 Apr 2011

Conference

ConferenceWireless VITAE
Country/TerritoryIndia
CityChennai
Period28/02/201103/04/2011

Fingerprint

Dive into the research topics of 'A Novel Model for Security Evaluation for Compliance'. Together they form a unique fingerprint.

Cite this