Search
Now showing items 1-6 of 6
The Integration of Trusted Platform Modules into a Tactical Identity Management System
(2013)
The use of integrity protection mechanisms from a tactical Identity Management (IdM) system is the focus of this paper. While traditional identity management systems supports authentication, and some also access control, ...
High assurance information exchange based on publish-subscribe and ABAC methods
(2014)
The presented effort employs a combination of publish-subscribe distribution and ABAC (Attribute Based Access Control) methods to control the information exchange between security domains. It follows strictly the "separation ...
Data loss prevention based on text classification in controlled environments
(2016)
Loss of sensitive data is a common problem with potentially severe consequences. By categorizing documents according to their sensitivity, security controls can be performed based on this classification. However, errors ...
A Novel IoBT Security Assessment Framework: LoRaWAN Case Study
(2020)
The Internet of Things (IoT) is interesting because this potentially disruptive technology can also be used as a
low-cost approach to augment information in military systems. This makes following IoT trends important ...
Challenges for Risk and Security Modelling in Enterprise Architecture
(2019-11-19)
From our experience cooperating with the Norwegian Armed Forces, we outline two interconnected challenges for modelling risk and security in an enterprise architecture: (1) modelling what is protected and why it is protected ...
Towards data-driven autonomous cyber defence for military unmanned vehicles - threats & attacks
(2022-11-28)
Unmanned vehicles with varying degrees of autonomy will likely change the way military operations can be conducted, but they also introduce risks that require new ways of thinking security. In particular, the safety ...