...Information Assurance ...

Publications, Talks and Workshops ...


PUBLICATIONS

[1] Cherdantseva Y., Rana O., Hilton J., “Security Architecture in a Collaborative De-Perimeterised Environment: Factors of Success,” ISSE Securing Electronic Business Processes, Prague 22-23 November 2011. Highlights of the ISSE 2011 Conference, pp. 201-213


[2] Cherdantseva Y. “The Social Network: Be On The Safe Side!”. May 2011. FULL TEXT IN PDF AVAILABLE HERE.
Published by Gair Rhydd on 6th February 2012.


[3] Cherdantseva Y., Hilton J., Rana O.: "Towards SecureBPMN - Aligning BPMN with the Information Assurance & Security Domain," In: Mendling, J. and Weidlich, M. (eds.) Business Process Model and Notation 2012. LNBIP, vol.125, pp.107-115. Springer, Heidelberg (2012)


[4] Cherdantseva Y. and Hilton J. "Information Security and Information Assurance. The Discussion about the Meaning, Scope and Goals,” In: F. Almeida, and I. Portela (eds.), Organizational, Legal, and Technological Dimensions of IS Administrator. IGI Global Publishing. September, 2014.


[5] Cherdantseva Y. and Hilton J. "The 2011 Survey of Information Security and Information Assurance Professionals: Findings,” In: F. Almeida, and I. Portela (eds.), Organizational, Legal, and Technological Dimensions of IS Administrator. IGI Global Publishing. 2014.


[6] Cherdantseva, Y.; Hilton, J., "A Reference Model of Information Assurance & Security," Availability, Reliability and Security (ARES), 2013 Eighth International Conference on, pp.546-555, 2-6 Sept. 2013 doi: 10.1109/ARES.2013.72 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6657288&isnumber=6657192


[7] Cherdantseva, Y.: "Secure*BPMN - a graphical extension for BPMN 2.0 based on a Reference Model of Information Assurance & Security", PhD THESIS. CARDIFF UNIVERSITY. UK. 2014.

PhD Thesis Abstract.

The full text of the thesis is available at ORCA: http://orca.cf.ac.uk/74432.

NOTE: This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


[8] Eden, P., Blyth, A., Burnap, Cherdantseva, Y., P., Jones, K., Soulsby, H., Stoddart, K. A forensic taxonomy of SCADA systems and approach to incident response. Proceedings of the 3rd International Symposium for ICS and SCADA Cyber Security Research 2015 (ICS-CSR 2015).


[9] Eden, P., Blyth, A., Burnap, Cherdantseva, Y., P., Jones, K., Soulsby, H., Stoddart, K. A Cyber Forensic Taxonomy for SCADA systems in Critical Infrastructure. Critical Information Infrastructures Security. Volume 9578 of the series Lecture Notes in Computer Science, pp 27-39. 2016.


[10] Cherdantseva, Y., Burnap P., Blyth, A., Eden, P., Jones, K., Soulsby, H., Stoddart, K.: "A Review of cyber security risk assessment methods for SCADA systems" . Computers & Security. Volume 56, February 2016, pp. 1-27. OPEN ACCESS. Received 19 May 2015, Revised 18 September 2015, Accepted 29 September 2015 2015.

[11] Cherdantseva, Y., Hilton, J., Rana, O., Ivins, W.: "A Multifaceted Evaluation of the Reference Model of Information Assurance & Security" . Computers & Security. 2016. Received at Editorial Oce: 14 Jun 2016. Article revised: 14 Sep 2016. Accepted for publication on 20 Sep 2016. Authors' Post-Print Version is available here.





TALKS and WORKSHOPS

[1]. ISSE 2011 Securing Electronic Business Processes, Prague (22-23 November 2011)

“Security Architecture in a Collaborative De-Perimeterised Environment: Factors of Success”. Presentation is available in pdf.


[2]. FTS, COMSC, Cardiff University (4th May 2011)

Highlights of InfoSecurity Europe 2011. Presentation is available in pdf.


[3]. FTS, COMSC, Cardiff University (28th Feb 2012)

Privacy from the perspective of 2012


[4]. Invited Lecture, COMSC, Cardiff University (9th March 2012)
MSc course - Security and Privacy

The Evolution of Information Security Goals from the 1960s to today. Presentation is available in pdf.


[5]. Invited Lecture, COMSC, Cardiff University (30th March 2012)
Year 2, CM2206 Business Strategy and IS

Information Security as an integral part of corporate governance. The Business Model for Information Security Presentation is available in pdf.

Tutorial: The Business Model for Information Security


[6]. 4th International Workshop on the Business Process Model and Notation (BPMN) 2012 - WU Vienna, Austria (12-13 September 2012)
Towards SecureBPMN - Aligning BPMN with the Information Assurance & Security Domain
At www.springerlink.com


[7]. Invited Talk, COMSC, Cardiff University (12 November 2012)
Informatics seminar

A Four-Dimensional Refence Model of Information Assurance & Security


[8]. Invited Lecture and Workshop, COMSC, Cardiff University (13th December 2012)
MSc Security and Privacy

A Four-Dimensional Refence Model of Information Assurance & Security
Workshop: A Four-Dimensional Refence Model of Information Assurance & Security and its application to the Translate case-study


[9]. Invited Lecture and Workshop, Cranfield University (26 February 2013)
MSc Cyber Defence and Information Assurance

A Four-Dimensional Refence Model of Information Assurance & Security
Workshop: A Four-Dimensional Refence Model of Information Assurance & Security and its application to the Translate case-study


[10]. Software Engineering Research Group (SERG) Monthly Seminars, University of West of England (UWE), Bristol, UK (3 April 2013)
A Four-Dimensional Refence Model of Information Assurance & Security


[11]. Software Engineering Research Group (SERG) Monthly Seminars, University of West of England (UWE), Bristol, UK (6 November 2013)
Secure*BPMN - extending BPMN 2.0 with the Information Assurance and Security modelling capabilities


[12]. Invited Talk, COMSC, Cardiff University (21st December 2013)
MSc Security and Privacy BPMN 2.0 - Introduction


[13]. Invited Talk and Workshop, COMSC, Cardiff University (21st December 2013)
MSc Security and Privacy Secure*BPMN - extending BPMN 2.0 with the Information Assurance and Security modelling capabilities