Browsing by Author "Jones, Kevin"
Now showing 1 - 7 of 7
Results Per Page
Sort Options
Item Metadata only Analysis and run-time verification of dynamic security policies.(Springer, 2006) Janicke, Helge; Siewe, Francois; Jones, Kevin; Cau, A. (Antonio); Zedan, HusseinItem Metadata only A compositional event and time-based policy model(2006-06-01) Cau, A. (Antonio); Janicke, Helge; Siewe, Francois; Zedan, Hussein; Jones, KevinItem Open Access Developing Cyber Peacekeeping: Observation, Monitoring and Reporting(Elsevier, 2018-12-19) Robinson, Michael; Jones, Kevin; Janicke, Helge; Maglaras, LeandrosCyberphysical societies are becoming reliant upon the cyber domain for everyday life. With cyber warfare increasingly becoming part of future conflicts, new and novel solutions are needed to assist governments in securing their national infrastructure. Cyber peacekeeping is one such solution: an emerging and multi-disciplinary field of research, touching upon technical, political, governmental and societal domains of thought. In this article we build upon previous works by developing the cyber peacekeeping activity of observation, monitoring and reporting. We take a practical approach: describing a scenario in which two cyberphysical societies experience the negative effects of cyber warfare and require cyber expertise to restore services their citizens depend upon. We explore how a cyber peacekeeping operation could start up and discuss the challenges it will face. The article makes a number of proposals, including the use of a virtual collaborative environment to bring multiple benefits. We conclude by summarising our findings, and describing where further work lies.Item Metadata only Dynamic access control policies and web-service composition.(IEEE Computer Society, 2005) Siewe, Francois; Janicke, Helge; Jones, KevinService composition is a fundamental technique for develop- ing web-service applications. In general, a single service is not enough to achieve the user’s goal, rather several services, often from different providers, are composed dynamically to satisfy a request. Ensuring se- curity in such a system is challenging and not supported by most of the security frameworks proposed in current literature. This paper presents a formal model for composing security policies dynamically to cope with changes in requirements or occurrences of events. The model can be used to specify the security policies of web-services and to reason about their composition. We illustrate our approach with a simple example from healthcare services.Item Open Access Exploring the role of work identity and work locus of control in information security awareness(Elsevier, 2018-10-23) Janicke, Helge; Hadlington, L. J.; Yevseyeva, Iryna; Jones, Kevin; Popovac, MasaA growing body of research evidence has been focused on exploring aspects of individual differences in the context of human factors and adherence to organisational information security. The present study aimed to extend this research by exploring three individual variables related directly to the individual’s perceived control within the workplace, their commitment to current work identity, and the extent to which they are reconsidering commitment to work. A total 1003 participants aged between 18-65 (Mean = 40.29; SD = 12.28), who were in full or part-time employment took part in the study. The results demonstrated that work locus of control acted as a significant predictor for total scores on a measure of information security awareness. Those individuals who demonstrated more externality had weaker engagement in accepted information security within the workplace. The findings from the current study are discussed in the context of potential links to counterproductive work behaviours, as well as presenting possible practical routes for intervention strategies to help mitigate poor engagement in information security awareness.Item Open Access An introduction to Cyber Peacekeeping(Elsevier, 2018-04-26) Robinson, Michael; Jones, Kevin; Janicke, Helge; Maglaras, LeandrosCyber is the newest domain of war, and the topic of cyber warfare is one that is receiving increasing attention. Research efforts into cyber warfare are extensive, covering a range of issues such as legality, cyber weapons and deterrence. Despite all of the research activity around cyber warfare, one aspect has been largely overlooked: the restoration of peace and security in its aftermath. In this article, we present the argument that cyber warfare will threaten civilian peace and security long after a conflict has ended, and that existing peace operations will be required to evolve in order to address this threat. We explore how existing UN peacekeeping operations could be adapted, in ways that would be both feasible and valuable towards maintaining and restoring peace in a region. We conclude that the path to cyber peacekeeping will not be easy, but that it is an evolution that must begin today so that we can be prepared for the conflicts of the future.Item Metadata only A property based framework for trust and reputation in mobile computing.(IEEE, 2009) Jones, Kevin; Janicke, Helge; Cau, A. (Antonio)