J2-1136 — Final report
1.
Methods and solutions for security and dependability (S&D) provision in pervasive systems

The methods and solutions are based on security patterns that capture the security expertise in the form available for automated processing. By means of the patterns and their integration into a run-time environment it is possible to timely identify potential threats or attacks and adapt the under threat and attacked system or applications. Research results were successfully applied to the field of long-term trusted archiving. In the chapter we provide the relevant S&D properties, classes and patterns on, and describe how S&D patterns are integrated into a trusted long-term archiving service.

COBISS.SI-ID: 22684455
2.
Mathematical model for assessment of information security investments in advanced systems

Mathematical model for assessment of information security investments in advanced systems This article introduces a quantitative model for assessment of the threats in particular organizations regarding possible security breaches and other security incidents. The model uses as input parameters the assessment of the organization assets where different aspects are considered, from data, information and equipment to brand names and lost of trust on the marketed. The model is later used to calculate the optimal expenditures and investment in security solutions provision.

COBISS.SI-ID: 21486887
3.
Standard approach for security technology investment

In the paper, the assessment of the appropriate investment in security technology that is economically affordable and provides enough protection for the enterprise information system is analyzed. The paper discusses the identification of the assets, the threats, the vulnerabilities of the ICT systems and provides an approach for the quantification of the necessary security investment. A standard approach to security-information investment assessment is also recommended.

COBISS.SI-ID: 21277735
4.
Technical patterns for long term trusted archiving

An increasingly large number of digital documents, need to be preserved by organizations. Business documents such as various contracts may be of great business value, may only exit in digital form and may need to be preserved for longer periods of times. The preservation process should take care of both the integrity and authenticity of digital documents, providing proofs of document authenticity. In this paper we look into long term archiving best practices and capture them on a more abstract, generic level, providing a set of core long term archiving security patterns.

COBISS.SI-ID: 22451751
5.
Influence of pervasive computing on companies and their businesses

This book chapter explores the influence of pervasive computing on companies and their businesses. The main characteristics of today’s business models are discussed and a method for evaluating business models characteristics is proposed. We concentrate on characteristics of pervasive computing and their influence on companies’ business processes and business models. The present and future business characteristics and business models are briefly compared, and future research directions on pervasive computing and business models are presented.

COBISS.SI-ID: 22188583