159 research outputs found

    Crafting an Undergraduate Information Security Emphasis Within Information Technology

    Get PDF
    Universities have only recently created an undergraduate course in information security (or related topics) but few have implemented an emphasis or comprehensive program at the undergraduate level. This article explores the creation of an undergraduate emphasis in information security at Weber State University (WSU) within the John B. Goddard School of Business and Economics (JGSBE) that is designed to train students in the skills necessary to implement and manage security. Specifically, the article discusses the skill sets for security management, the lab requirements for the courses in this emphasis and the incorporation of legal elements in the curriculum

    Applying pi-Calculus to Practice: An Example of a Unified Security Mechanism

    Get PDF
    The Pi-calculus has been developed to reason about behavioural equivalence. Different notions of equivalence are defined in terms of process interactions, as well as the context of processes. There are various extensions of the Pi-calculus, such as the SPI calculus, which has primitives to facilitate security protocol design. Another area of computer security is access control research, which includes problems of access control models, policies and access control mechanism. The design of a unified framework for access control requires that all policies are supported and different access control models are instantiated correctly. In this paper we will utilise the Pi calculus to reason about access control policies and mechanism. An equivalence of different policy implementations, as well as access control mechanism will be shown. Finally some experiences regarding the use of Pi-calculus are presented

    Security Loop Agents for the Enterprise Applications based on Resource Description Framework

    Full text link

    Application access control at network level

    Full text link
    • …
    corecore