8 Questions 4 Answers 0 Followers
Questions related from Yudi Prayudi
I am building a system, as an evaluation of the system it is necessary to test the CIA aspects of the system.To measure the Confidentiality - Integrity - Availability that has been applied to a...
31 December 2018 1,532 2 View
I am studying ABAC (Attribute Based Access Control), specifically for application in the context of access to digital evidence. Is there a document that gives an overview of step by step how to...
15 January 2018 4,715 2 View
Can anyone help me to share what is the current issue of xml excryption, is there any reference I can read?
01 May 2017 1,566 1 View
If I have a framework as a solution for such a real problem, What is the current method to evaluate the user satisfaction of these solution. Do EUCS (end user computing satisfaction) can be used...
01 June 2016 4,288 5 View
I have an evidence file in the form of digital files generated from the imaging process using dd and EnCase applications, in addition to using standard tools for analysis of imaging files such as...
14 May 2016 6,628 2 View
In the case of file digital evidence resulting from the acquisition and imaging of electronic device, is there any metadata standard used to be applied to digital evidence. Are there any similar...
08 March 2016 2,236 2 View
Currently, I'm developing the concept of attribute-based access control (ABAC) model for a digital chain of custody system in law enforcement. How to perform testing of attribute-based access...
28 January 2016 6,324 3 View
I 'm doing research on security policy models ( BIBA , Clark Wilson etc ) . How do I implement the security models ? is there any tools or applications that are appropriate to implement the...
29 March 2015 562 2 View