2020
DOI: 10.14569/ijacsa.2020.0110312
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Network Security: Case Study of Email System

Abstract: We study operational security in computer network security, including infrastructure, internal processes, resources, information, and physical environment. Current works on developing a security framework focus on a security ontology that contributes to applying common vocabulary, but such an approach does not assist in constructing a foundation for a holistic security methodology. We focus on defining the bounds and creating a representation of a security system by developing a diagrammatic representation (i.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…-the current location of the qualified driver (20). The current locations of drivers ( 21) are updated continuously via satellite (22).…”
Section: Tm Modeling Examplementioning
confidence: 99%
See 3 more Smart Citations
“…-the current location of the qualified driver (20). The current locations of drivers ( 21) are updated continuously via satellite (22).…”
Section: Tm Modeling Examplementioning
confidence: 99%
“…The temporal data of such activities will be handled in the events model. b) Transactions ( 18): A customer requests a transaction (19); hence, the request moves to the system (20 and 21), where it is processed (22). Additionally, the customer provides the transaction request (22), which flows to the system (23).…”
Section: A Static Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…This section will briefly review the TM model to establish TM as a foundation to study behavior. A more elaborate discussion of TM's philosophical foundation can be found in [14][15][16][17][18][19][20].…”
Section: Thinging Machinementioning
confidence: 99%