Deterrence and prevention-based model to mitigate information security insider threats in organisations
Previous studies show that information security breaches and privacy violations are
important issues for organisations and people. It is acknowledged that decreasing the risk in …
important issues for organisations and people. It is acknowledged that decreasing the risk in …
Trust Factors and Insider Threats in Permissioned Distributed Ledgers: An Analytical Study and Evaluation of Popular DLT Frameworks
Permissioned distributed ledgers have recently captured the attention of organizations
looking to improve efficiency, transparency and auditability in value network operations …
looking to improve efficiency, transparency and auditability in value network operations …
Insider attacks: Human-factors attacks and mitigation
J Abulencia - Computer Fraud & Security, 2021 - magonlinelibrary.com
For many organisations, the human element is generally the weakest link and often the
reason why many security incidents occur. As an organisation grows, the chance of a human …
reason why many security incidents occur. As an organisation grows, the chance of a human …
Adaptive identity and access management—contextual data based policies
Due to compliance and IT security requirements, company-wide identity and access
management within organizations has gained significant importance in research and …
management within organizations has gained significant importance in research and …
Mitigating insider threat in cloud relational databases
Cloud security has become one of the emergent issues because of the immense growth of
cloud services. A major concern in cloud security is the insider threat because of the harm …
cloud services. A major concern in cloud security is the insider threat because of the harm …
Insiders Dissected: New Foundations and a Systematisation of the Research on Insiders
E Zimmer, C Burkert, H Federrath - Digital Threats: Research and …, 2021 - dl.acm.org
The insider threat is often cited as one of the most challenging threats for security
practitioners. Even though this topic is receiving considerable attention, two main problems …
practitioners. Even though this topic is receiving considerable attention, two main problems …
Advanced identity and access policy management using contextual data
Due to compliance and IT security requirements, company-wide Identity and Access
Management within organizations has gained significant importance in research and …
Management within organizations has gained significant importance in research and …
Towards federated service discovery and identity management in collaborative data and compute cloud infrastructures
S Memon, J Jens, E Willem, H Neukirchen… - Journal of Grid …, 2018 - Springer
This paper compares three multi-national research infrastructures, one that provides data
services, one that provides compute services, and one that supports linguistics research …
services, one that provides compute services, and one that supports linguistics research …
Augmenting authentication with context-specific behavioral biometrics
Behavioral biometrics, being non-intrusive and cost-efficient, have the potential to assist
user identification and authentication. However, user behaviors can vary significantly for …
user identification and authentication. However, user behaviors can vary significantly for …
Conceptual framework for adaptive access and identity management
S Extros, TN Nisha - AIP Conference Proceedings, 2023 - pubs.aip.org
Access and Identity management have always been the key enablers in connecting the
users with the enterprises, system or networks. As a result of enhancing security culture …
users with the enterprises, system or networks. As a result of enhancing security culture …