A view of trust and information system security under the perspective of critical infrastructure protection

نویسنده

  • Bako Rajaonah
چکیده

Although trust is recognized as important in security issues of computer networking environments, few studies on information systems deal with both trust and security, and those existing tend to remain within the short perimeter of two-agent interactions. We propose to rethink trust research on information system security by considering the holistic approach of critical infrastructure protection (CIP). After introducing the problem, we give the definitions that are necessary for a common understanding of the concepts of critical infrastructures and trust. Some works on critical infrastructure protection involving information systems are then described briefly. Finally, we present our transdisciplinary view of trust research on information system security under the perspective of CIP. MOTS-CLÉS : confiance, protection des infrastructures critiques, sûreté, système d’information, transdisciplinarité

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Critical Information Infrastructure Protection (CIIP) Policies in Selected Countries: Findings of the CIIP Handbook

The International Critical Information Infrastructure Protection Handbook addresses the subject of critical information infrastructure protection (CIIP), a growingly important topic on the security policy agenda. The CIIP Handbook focuses on aspects of CIIP related to security policy and methodology. The security policy perspective evaluates policy efforts for the protection of critical informa...

متن کامل

بررسی فرآیند حمایت حقوقی از اطلاعات بالینی و آزمایشگاهی داروها در حقوق ایران، اتحادیه اروپا و ایالات متحده آمریکا

One of the most important new evidence of intellectual property that had always plenty of differences behind it regarding the protection or non-protection is the new medicine laboratory information that is presented to the competent state authority for consideration and registry. The original purpose of intellectual property is to protect all property that derives from human intellectual leakin...

متن کامل

Information Security Requirements for Implementing Electronic Health Records in Iran

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

متن کامل

Information Security Requirements for Implementing Electronic Health Records in Iran

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

متن کامل

Authorization models for secure information sharing: a survey and research agenda

This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Ingénierie des Systèmes d'Information

دوره 22  شماره 

صفحات  -

تاریخ انتشار 2017