Logo do repositório
 
Publicação

Selecting Optimal Subset of Security Controls

datacite.subject.fosEngenharia e Tecnologia::Engenharia Eletrotécnica, Eletrónica e Informática
datacite.subject.sdg09:Indústria, Inovação e Infraestruturas
datacite.subject.sdg08:Trabalho Digno e Crescimento Económico
datacite.subject.sdg10:Reduzir as Desigualdades
dc.contributor.authorYevseyeva, Iryna
dc.contributor.authorBasto-Fernandes, Vitor
dc.contributor.authorEmmerich, Michael
dc.contributor.authorVan Moorsel, Aad
dc.date.accessioned2026-01-26T11:54:17Z
dc.date.available2026-01-26T11:54:17Z
dc.date.issued2015-10
dc.descriptionConference name Conference on ENTERprise Information Systems/International Conference on Project MANagement/Conference on Health and Social Care Information Systems and Technologies, CENTERIS 2015, Vilamoura, 7 October 2015 - 9 October 2015.
dc.descriptionConference code: 123098
dc.description.abstractChoosing an optimal investment in information security is an issue most companies face these days. Which security controls to buy to protect the IT system of a company in the best way? Selecting a subset of security controls among many available ones can be seen as a resource allocation problem that should take into account conflicting objectives and constraints of the problem. In particular, the security of the system should be improved without hindering productivity, under a limited budget for buying controls. In this work, we provide several possible formulations of security controls subset selection problem as a portfolio optimization, which is well known in financial management. We propose approaches to solve them using existing single and multiobjective optimization algorithms.eng
dc.description.sponsorshipAcknowledgements Iryna Yevseyeva acknowledges Engineering and Physical Sciences Research Council (EPSRC), UK, and Government Communications Headquarters (GCHQ), UK, for funding Choice Architecture for Information Security (ChAISe) project EP/K006568/1 as a part of Cyber Research Institute.
dc.identifier.citationYevseyeva, I. & Basto Fernandes, Vitor & Emmerich, Michael & van Moorsel, Aad. (2015). Selecting Optimal Subset of Security Controls. Procedia Computer Science. 64. 1035 - 1042. 10.1016/j.procs.2015.08.625.
dc.identifier.doi10.1016/j.procs.2015.08.625
dc.identifier.issn1877-0509
dc.identifier.urihttp://hdl.handle.net/10400.8/15488
dc.language.isoeng
dc.peerreviewedyes
dc.publisherElsevier
dc.relation.hasversionhttps://www.sciencedirect.com/science/article/pii/S187705091502760X
dc.relation.ispartofProcedia Computer Science
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subjectmulticriteria optimisation
dc.subjectportfolio optimization
dc.subjectsecurity
dc.subjectsubset selection
dc.titleSelecting Optimal Subset of Security Controlseng
dc.title.alternativeConference on ENTERprise Information Systems / International Conference on Project MANagement / Conference on Health and Social Care Information Systems and Technologies, CENTERIS / ProjMAN / HCist 2015 October 7-9, 2015eng
dc.typejournal article
dspace.entity.typePublication
oaire.citation.endPage1042
oaire.citation.startPage1035
oaire.citation.titleProcedia Computer Science
oaire.citation.volume64
oaire.versionhttp://purl.org/coar/version/c_970fb48d4fbd8a85
person.familyNameBasto-Fernandes
person.givenNameVitor
person.identifier.ciencia-id581C-52BB-AC4E
person.identifier.orcid0000-0003-4269-5114
person.identifier.ridN-1891-2016
person.identifier.scopus-author-id53363129900
relation.isAuthorOfPublicationfb2d3703-9d6a-4c22-bbc4-9ff14c162feb
relation.isAuthorOfPublication.latestForDiscoveryfb2d3703-9d6a-4c22-bbc4-9ff14c162feb

Ficheiros

Principais
A mostrar 1 - 1 de 1
A carregar...
Miniatura
Nome:
Selecting Optimal Subset of Security Controls.pdf
Tamanho:
231.07 KB
Formato:
Adobe Portable Document Format
Licença
A mostrar 1 - 1 de 1
Miniatura indisponível
Nome:
license.txt
Tamanho:
1.32 KB
Formato:
Item-specific license agreed upon to submission
Descrição: