From “The Path to Assured Solutions” (2006)

"Security architects and practitioners need to develop an integrated data model that will enable end-to-end user management and access auditing. This article proposes a data model and reviews ideas that could constitute the basis for Security Management enhancement and progress. There is constant progress in the Security Management discipline. Now we see IT Security Management … Continue reading From “The Path to Assured Solutions” (2006)

Beyond Risk-Based Security

Donn Parker's approach to security : "The bottom line is that no matter how elaborate or “scientific” the risk assessment methodology is, whether it is Octave, FAIR, FRAP, or even Dr. Kevin Soo Hoo’s that is the most complete mathematical model of risk assessment methods ever developed, there are no sufficiently valid frequency and impact … Continue reading Beyond Risk-Based Security

Logic of Action II (2009)

The Aristotelian "square of oppositions" is at the centre of recent developments in the geometry of logic. The image below is a modified representation of the logical tetra-icosahedron defined by Regis Pellisier [2004, 2009]. I have moved the nodes and edges around to better show the standard logical square (depicted in red). The labels "Immediate", … Continue reading Logic of Action II (2009)

Security: The Circle of Trust

The philosophy behind the I&AM Reference Architecture is based on the idea of the “Circle of Trust”. In this context, “security” is interpreted as the definition, the establishment, the enforcement and the verification of trust. (Reference: John Arnold, Information Security Bulletin, 2006). The IAM domain is reflected in terms of “establishment of trust” under the … Continue reading Security: The Circle of Trust