A view of trust and information system security under the perspective of critical infrastructure protection
نویسنده
چکیده
Although trust is recognized as important in security issues of computer networking environments, few studies on information systems deal with both trust and security, and those existing tend to remain within the short perimeter of two-agent interactions. We propose to rethink trust research on information system security by considering the holistic approach of critical infrastructure protection (CIP). After introducing the problem, we give the definitions that are necessary for a common understanding of the concepts of critical infrastructures and trust. Some works on critical infrastructure protection involving information systems are then described briefly. Finally, we present our transdisciplinary view of trust research on information system security under the perspective of CIP. MOTS-CLÉS : confiance, protection des infrastructures critiques, sûreté, système d’information, transdisciplinarité
منابع مشابه
Critical Information Infrastructure Protection (CIIP) Policies in Selected Countries: Findings of the CIIP Handbook
The International Critical Information Infrastructure Protection Handbook addresses the subject of critical information infrastructure protection (CIIP), a growingly important topic on the security policy agenda. The CIIP Handbook focuses on aspects of CIIP related to security policy and methodology. The security policy perspective evaluates policy efforts for the protection of critical informa...
متن کاملبررسی فرآیند حمایت حقوقی از اطلاعات بالینی و آزمایشگاهی داروها در حقوق ایران، اتحادیه اروپا و ایالات متحده آمریکا
One of the most important new evidence of intellectual property that had always plenty of differences behind it regarding the protection or non-protection is the new medicine laboratory information that is presented to the competent state authority for consideration and registry. The original purpose of intellectual property is to protect all property that derives from human intellectual leakin...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Ingénierie des Systèmes d'Information
دوره 22 شماره
صفحات -
تاریخ انتشار 2017