252 research outputs found

    Exploring Applications of Blockchain in Securing Electronic Medical Records

    Get PDF

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management

    A Survey of Interdependent Information Security Games

    Get PDF
    Risks faced by information system operators and users are not only determined by their own security posture, but are also heavily affected by the security-related decisions of others. This interdependence between information system operators and users is a fundamental property that shapes the efficiency of security defense solutions. Game theory is the most appropriate method to model the strategic interactions between these participants. In this survey, we summarize game-theoretic interdependence models, characterize the emerging security inefficiencies, and present mechanisms to improve the security decisions of the participants. We focus our attention on games with interdependent defenders and do not discuss two-player attackerdefender games. Our goal is to distill the main insights from the state-of-the-art and to identify the areas that need more attention from the research community

    A Survey of Interdependent Information Security Games

    Get PDF

    Broadband Korea

    Get PDF
    녾튾 : This report was prepared by Tim Kelly, Vanessa Gray and Michael Minges. It is based on research carried out from 23 to 30 May 2002 as well as articles and reports noted in the document. The assistance of the Ministry of Information and Communication, particularly Sang-Hak Lee, was indispensable and highly appreciated. The assistance of colleagues within ITU is also noted particularly Nathalie Delmas, who formatted the report and created the cover. Both Jin-Kyu Jeong and Chinyong Chong provided detailed comments. The report would not have been possible without the cooperation of the many Korean organizations who offered their time to the reportís authors. The report is one of a series examining the Internet in developing nations. Additional information is available on ITUís Internet Case Study web page at http://www.itu.int/ITU-D/ict/cs/. (The rest omitted

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF

    National Broadband Strategy (2018-2030)

    Get PDF
    • 

    corecore