Creating a Security Methods Taxonomy for Information Resource Management

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

People who are concerned with security are naturally interested in methods of achieving security. This paper proposes an approach to creating a security methods taxonomy which can be used for security management and the management of security-related information resources when security methods are the focus. The framework of the taxonomy is based on facet analysis and a tetra-facet model of security, which identifies four facets of security: subject/scope of security, object of protection, source of insecurity, and method of protection. A taxonomy of security methods can be created by combining two of the facets: source of insecurity and method of protection.

Cite

CITATION STYLE

APA

Wu, Y., & Meng, F. (2019). Creating a Security Methods Taxonomy for Information Resource Management. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11853 LNCS, pp. 293–297). Springer. https://doi.org/10.1007/978-3-030-34058-2_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free