The difference between cyber security vs information security

LA Alexei, A Alexei - Journal of Engineering Sciences, 2022 - ibn.idsi.md
The terms cyber security and information security are often used interchangeably, both in the
academic literature and by organizations. This article aimed to identify whether these terms …

Leaving the Business Security Burden to LiSEA: A Low-Intervention Security Embedding Architecture for Business APIs

H Li, J Li, Y Wang, C Zhou, M Yin - Applied Sciences, 2023 - mdpi.com
In the evolving landscape of complex business ecosystems and their digital platforms, an
increasing number of business Application Programming Interfaces (APIs) are encountering …

[图书][B] Securing Distributed Business Process Model Execution

MF Madsen - 2023 - pure.itu.dk
This PhD thesis investigates the secure execution of distributed business process models.
When collaborating actors use distributed process model execution to coordinate and …

Hybrid Security Approach for Behavioural Privacy of Business Processes in a Cloud Environment

F Abdmeziem, S Boukhedouma… - … on Computational Science …, 2023 - Springer
Business processes are surely at the heart of companies but they are also the target of
numerous security attacks, especially when using nowadays technologies like Cloud …

Systematic Selection Of Threat Modeling Approaches

L Marck - 2024 - studenttheses.uu.nl
Threat modeling is a method for identifying and analyzing security problems early on in the
development life cycle. The infancy of the discipline, the absence of a shared scope, and …