5 Questions 3 Answers 0 Followers
Questions related from Yudi Prayudi
I am building a system, as an evaluation of the system it is necessary to test the CIA aspects of the system.To measure the Confidentiality - Integrity - Availability that has been applied to a...
31 December 2018 1,472 2 View
I am studying ABAC (Attribute Based Access Control), specifically for application in the context of access to digital evidence. Is there a document that gives an overview of step by step how to...
15 January 2018 4,656 2 View
If I have a framework as a solution for such a real problem, What is the current method to evaluate the user satisfaction of these solution. Do EUCS (end user computing satisfaction) can be used...
01 June 2016 4,225 5 View
In the case of file digital evidence resulting from the acquisition and imaging of electronic device, is there any metadata standard used to be applied to digital evidence. Are there any similar...
08 March 2016 2,177 2 View
Currently, I'm developing the concept of attribute-based access control (ABAC) model for a digital chain of custody system in law enforcement. How to perform testing of attribute-based access...
28 January 2016 6,261 3 View