Show simple item record

dc.contributor.authorOlifer, Dmitrij
dc.contributor.authorGoranin, Nikolaj
dc.contributor.authorČenys, Antanas
dc.contributor.authorKačeniauskas, Arnas
dc.contributor.authorJanulevičius, Justinas
dc.date.accessioned2023-09-18T17:32:10Z
dc.date.available2023-09-18T17:32:10Z
dc.date.issued2019
dc.identifier.urihttps://etalpykla.vilniustech.lt/handle/123456789/124135
dc.description.abstractOne of the best ways to protect an organization’s assets is to implement security requirements defined by different standards or best practices. However, such an approach is complicated and requires specific skills and knowledge. In case an organization applies multiple security standards, several problems can arise related to overlapping or conflicting security requirements, increased expenses on security requirement implementation, and convenience of security requirement monitoring. To solve these issues, we propose using graph theory techniques. Graphs allow the presentation of security requirements of a standard as graph vertexes and edges between vertexes, and would show the relations between different requirements. A vertex cover algorithm is proposed for minimum security requirement identification, while graph isomorphism is proposed for comparing existing organization controls against a set of minimum requirements identified in the previous step.eng
dc.formatPDF
dc.format.extentp. 1-16
dc.format.mediumtekstas / txt
dc.language.isoeng
dc.relation.isreferencedbyINSPEC
dc.relation.isreferencedbyDOAJ
dc.relation.isreferencedbyAGORA
dc.relation.isreferencedbyScopus
dc.relation.isreferencedbyScience Citation Index Expanded (Web of Science)
dc.rightsLaisvai prieinamas internete
dc.source.urihttp://www.mdpi.com/2076-3417/9/4/681/pdf
dc.source.urihttps://doi.org/10.3390/app9040681
dc.source.urihttps://talpykla.elaba.lt/elaba-fedora/objects/elaba:34486885/datastreams/MAIN/content
dc.titleDefining the minimum security baseline in a multiple security standards environment by graph theory techniques
dc.typeStraipsnis Web of Science DB / Article in Web of Science DB
dcterms.accessRightsThis article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/)
dcterms.licenseCreative Commons – Attribution – 4.0 International
dcterms.references64
dc.type.pubtypeS1 - Straipsnis Web of Science DB / Web of Science DB article
dc.contributor.institutionVilniaus Gedimino technikos universitetas
dc.contributor.facultyFundamentinių mokslų fakultetas / Faculty of Fundamental Sciences
dc.subject.researchfieldT 007 - Informatikos inžinerija / Informatics engineering
dc.subject.researchfieldN 009 - Informatika / Computer science
dc.subject.vgtuprioritizedfieldsIK0101 - Informacijos ir informacinių technologijų sauga / Information and Information Technologies Security
dc.subject.ltspecializationsL106 - Transportas, logistika ir informacinės ir ryšių technologijos (IRT) / Transport, logistic and information and communication technologies
dc.subject.eninformation security standard
dc.subject.engraph theory
dc.subject.envertex cover algorithm
dc.subject.engraph isomorphism
dc.subject.enminimums security baseline
dc.subject.enstandard mapping
dcterms.sourcetitleApplied sciences
dc.description.issueiss. 4
dc.description.volumevol. 9
dc.publisher.nameMDPI
dc.publisher.cityBasel
dc.identifier.doi2-s2.0-85061657469
dc.identifier.doi000460696500067
dc.identifier.doi10.3390/app9040681
dc.identifier.elaba34486885


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record