This paper identifies 10 essential aspects, which, if not taken into account in an information security governance plan, will surely cause the plan to fail, or at least, cause seri...
We propose a characterization of distributed denial of service (DDOS) defenses where reaction points are network-based and attack responses are active. The purpose is to provide a ...
Li-Chiou Chen, Thomas A. Longstaff, Kathleen M. Ca...
The idea of risk permeates the information security field. We use terms like ``risk management'', ``risk assessment'', ``risk model'' and ``risk analy...
Computer security has traditionally been assessed from a technical point of view. Another way to assess it is by investigating the role played by legitimate users of systems in imp...
In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among a group of n proxy signers delegated by the ...