2 research outputs found

    Definitions and Criteria of CIA Security Triangle in Electronic Voting System Authors

    No full text
    Confidentiality, Integrity, and Availability are three sides of the famous CIA security triangle. Since the e-voting systems are built from particular components, the CIA security triangle of these systems has particular definitions for each side. This paper presents these CIA security definitions and criteria which each state-of-the-art electronic voting system must meet based on the view point of National Institute of Standard and Technology (NIST) and also the criteria proposed by pioneer e-voting researchers. According to jurisdiction of different countries some of the given definitions and criteria might be excluded for developed e-voting system of their territory. Beside of the definitions and criteria, current threats and proposed solutions (in 2012) of each CIA triangle side and current unresolved security threats are concisely described

    Criminal Communities Mining on the Web Authors

    No full text
    Criminal web data always offer novel and useful knowledge and information for Law administration. The used digital data in legal assessments are involved parts of information about the accused ’ social networks. Thus, evaluation of these parts of information is challenging. Therefore, an investigator has to pull out the appropriate information from the text manually, these information are on the website. An investigator also makes the relationship between various parts of information and classify them in to a structured database so the category is ready to use in different criminal network evaluation tools for analysis. On the other hand, these manual processes are not adequate in the case that it has many errors. Moreover, as the quality of resulted evaluation depends on the investigator’s proficiency, the reliability is not stable. On another word, the more proficient operator, the better result achieved. The purpose of this paper is suggesting a framework by using concurrent crawler to show the process of exploring the criminal accused of legal data evaluation which insures the reliability gap
    corecore