Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sheikhpour, Razieh
- A Best Practice Approach for Integration of ITIL and ISO/IEC 27001 Services for Information Security Management
Abstract Views :861 |
PDF Views:224
Authors
Affiliations
1 Department of Computer Engineering, North Tehran Branch, Islamic Azad University, Tehran, IR
2 Department of Computer Engineering, Zanjan Branch, Islamic Azad University, Zanjan, IR
1 Department of Computer Engineering, North Tehran Branch, Islamic Azad University, Tehran, IR
2 Department of Computer Engineering, Zanjan Branch, Islamic Azad University, Zanjan, IR
Source
Indian Journal of Science and Technology, Vol 5, No 2 (2012), Pagination: 2170-2176Abstract
This paper explores the role of information security management within ITIL service management and how ITIL and ISO/IEC 27001 are aligned and can work together to improve information security management.Keywords
Information security Management, Integration, Organization, ITIL, ISO/IEC 27001, Best PracticeReferences
- Boehmer W (2008) Appraisal of the effectiveness and efficiency of an Information Security Management System based on ISO 27001. Proc. Second Int. Conf. Emerging Security Information, Sys. & Technologies. pp: 224-231.
- Esmaili HB, Gardesh H and Shadrokh Sikari SH (2010) Strategic Alignment: ITIL Perspective. Proc. 2nd Intl. Conf. Comput. Technol. & Develop. (ICCTD). pp: 550-555.
- Humphreys E (2008) Information security management standards: Compliance, governance and risk management. J. Info. Secur. Tech. Rep. 13(4), 247-255.
- International Organization for Standardization (ISO) (2005a) ISO/IEC FDIS 17799 Information Technology — Security Techniques — Code of Practice for Information Security Management, ISO/IEC FDIS 17799:2005(E), Geneva.
- International Organization for Standardization (ISO) (2005b) ISO/IEC 27001 Information technology- Security techniques- Information security management systemsrequirements, ISO/IEC 27001:2005(E). ISO Copyright Office. Published in Switzerland.
- Jaschob A and Tsintsifa L (2006) IT-Grundschutz: Two-Tier risk assessment for a higher efficiency in IT security management. ISSE 2006- Secur Electro Bus Process. Inform. Secur. Solut. Eur. Conf. Rome, Italy. pp: 95-101.
- Larrocha ER, Minguet JM, Diaz G, Castro M and Vara A (2010) Filling the gap of Information Security Management nside ITIL®: proposals for postgraduate students. IEEE EDUCON Edu. Engg. pp: 907-912.
- Office of Government Commerce (OGC) (2007) ITIL V3- Service design book, The Stationery Office, UK.
- Pereira T and Santos H (2010) A security audit framework to manage Information system security. J. Comms. Comput. Inform. Sci. 92: 9:18.
- Rezakhani A, Hajebi A and Mohammadi N (2010) Standardization of all Information Security Management Systems. Int.J.Comput.Appl. 18(8), 4-8.
- Sahibudin Sh, Sharifi M and Ayat M (2008) Combining ITIL, COBIT and ISO/IEC 27002 in order to design a comprehensive IT framework in organizations. Proc. 2nd Asia Intl. Conf. Modelling & Simulation. pp:749-753.
- Solms B (2005) Information Security governance: COBIT or ISO 17799 or both? J. Comput. Secur. 24, 99-104.
- Taylor G (2008) ITIL V3 Improves Information Security Management. East Carolina Univ., Jul 11.
- Thomson KL and Solms R (2005) Information security obedience: a definition. J. Comput. Secur. 24(1),69-75.
- Tsohou A, Kokolakis S, Lambrinoudakis C, Gritzalis S (2010) Information Systems Security Management: A Review and a Classification of the ISO Standards. J. Next Generat. Soc. Technol. Leg Issues. 26: 220:35.
- Warre KV (2010) Security controls in service management. SANS Institute reading room. from http://www.sans.org/search/results.
- Wegmann A, Regev G, Garret G, Marechal F (2008) Specifying Services for ITIL Service Management. Proc. Int. Workshop Service-Oriented Computing Consequences for Engineering Requirements (SOCCER'08). pp:1-8.
- Zegers N (2006) A methodology for improving information security incident identification and response. Master Thesis Inform.& Econom, Erasmus Univ. Rotterdam.
- An Energy Efficient Cluster-chain Based Routing Protocol for Time Critical Applications in Wireless Sensor Networks
Abstract Views :557 |
PDF Views:128
Authors
Affiliations
1 Department of Computer Engineering, North Tehran Branch, Islamic Azad University, Tehran, IR
1 Department of Computer Engineering, North Tehran Branch, Islamic Azad University, Tehran, IR
Source
Indian Journal of Science and Technology, Vol 5, No 5 (2012), Pagination: 2741-2749Abstract
In this paper, we propose an Energy Efficient Cluster-Chain based Protocol for Time Critical applications (ECCPTC) in wireless sensor networks to maximize network lifetime and minimize energy consumption and transmission delay of time critical data. ECCPTC considers higher priority for time critical data than non-time critical data so that time critical data are immediately transmitted to the base station. ECCPTC uses a threshold value for reducing transmission delay of time critical data. ECCPTC organizes sensor nodes into clusters by using multiple metrics and constructs a chain among the sensor nodes within cluster so that each sensor node receives non-time critical data from a previous neighbor and transmits to a next neighbor. ECCPTC also adopts a chain based data transmission mechanism for sending non-time critical data packets from the cluster heads to the base station. Simulation results show that our proposed protocol significantly outperforms LEACH, CBRP and PEGASIS in terms of network lifetime, stability period, instability period, energy consumption, transmission delay of time critical data and the total number of data received at base station.Keywords
Wireless Sensor Network, Clustering Protocol, Chain Based Routing, Energy Efficient, Time Critical DataReferences
- Aslam N, Phillips W, Robertson W and Sivakumar Sh (2011) A multi-criterion optimization technique for energy efficient cluster formation in wireless sensor networks. Inform Fusion. 12(3), 202-212.
- Bajaber F and Awan I (2010) Energy efficient clustering protocol to enhance lifetime of wireless sensor network. J. Ambient Intell. Human Comput.1(4), 239-248.
- Chang JH (2010) An energy-aware, cluster-based routing algorithm for wireless sensor networks. J. Inform. Sci. Eng. (26), 2159-2171.
- Chen G, Li Ch and Ye M (2009) An unequal clusterbased routing protocol in wireless sensor networks. Wireless Network. 15(2), 193-207.
- Chuang PJ, Yang Shh and Lin ChSh (2009) Energyefficient clustering in wireless sensor networks. proc. 9th intl. conf. algorithms and architectures for parallel. ICA3PP 2009, Taipei, Taiwan, Lecture Notes in Comput. Sci. 5574,http://www.springerlink.com/content/978-3- 642-03094-9/112-120.
- Denga J, Hanb YS, Heinzelman WB and Varshneya PK (2011) Balanced-energy sleep scheduling scheme for high-density cluster-based sensor networks. Elsevier J. Comput Comm, 28(14), 1631– 1642.
- Ezzati A, Benalla S, Beni Hssane A and Lahcen Hasnaoui M (2010) Advanced low energy adaptive clustering hierarchy. (IJCSE) Int. J. Comput. Sci. Eng. 2(7), 2491-2497.
- Heinzelman W, Chandrakasan A, Balakrishnan H (2000) Energy-efficient communication protocol for wireless microsensor networks. Proc. 33rd Hawaii Int. Conf. Sys. Sci. (HICSS’00), Maui, HI.
- Heinzelman W, Chandrakasan A and Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wireless Comm. 1(4), 660–670.
- Jabari Lotf J, Nozad Bonab M and Khorsandi S (2008) A novel cluster-based routing protocol with extending lifetime for wireless sensor networks. Proc. 5th IFIP Int. Conf. Wireless and Optical Communication Networks, WOCN .pp: 1-5.
- Jin Y, Wang L, Kim Y and Yang X (2008) EEMC: An energy-efficient multi-level clustering algorithm for large-scale wireless sensor networks. Elsevier J. Comput Network. 52(3), 542–562.
- Kang Y, Lim S, Yoo J and Kim Ch (2011) Design, analysis and implementation of energy-efficient broadcast mac protocols for wireless sensor networks. KSII Trans. Internet. Inform. Syst. 5(6), 1113-1132.
- Lee HY, Lee KO, Lee HL and Kusdaryono A (2010) CBERP: Cluster based energy efficient routing protocol for wireless sensor network. Proc. 12th Int. l. Conf. Networking, VLSI and Signal Processing. University of Cambridge UK, 24-28.
- Lindsey S and Raghavendra C (2002) PEGASIS: power-efficient gathering in sensor information systems. IEEE Aerospace Conf. Pro. 3, 1125–1130.
- Manjeshwar A and Agrawal DP (2001) TEEN: a protocol for enhanced efficiency in wireless sensor networks. Proc. 1st Int. workshop on parallel and distributed computing issues in wireless networks and mobile computing, San Francisco, CA.
- Manjeshwar A and Agrawal DP (2002) APTEEN: a hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks. Proc. 2nd Int. workshop on parallel and distributed computing issues in wireless networks and mobile computing. Ft. Lauderdale, FL.
- Qian Y, Zhou J, Qian L and Chen K (2006) Prolonging the lifetime of wireless sensor network via multihop clustering. Proc. 6th Intl Conf. next generation tele. traffic and wired/wireless advanced networking, NEW2AN 2006, St. Petersburg, Russia, Lecture Notes in Comput. Sci. 4003,118-129.
- Rashed G, Kabir H and Ullah E (2011) WEP: An energy efficient protocol for cluster based heterogeneous wireless sensor. Intl. J. Distr. Parallel Syst. (IJDPS). 2(2), 54-60.
- Xie Y, Xiao W, Tang D, Tang J and Tang G (2011) A prediction-based energy-conserving approximate storage and query processing schema in objecttracking sensor networks. KSII Trans. Internet Inform. Syst. 5(5), 909-937.
- Zarei B, Zeynali M and Majid Nezhad V (2010) Novel cluster based routing protocol in wireless sensor networks. IJCSI Intl. J. Comput. Sci. 7(4), 32-36.