{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T18:39:05Z","timestamp":1740163145758,"version":"3.37.3"},"reference-count":5,"publisher":"Wiley","license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002956","name":"Defence Research and Development Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002956","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ericsson Software"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Networks and Communications"],"published-print":{"date-parts":[[2012]]},"abstract":"Iterative and incremental mechanisms are not usually considered in existing approaches for information security management System (ISMS). In this paper, we propose SUP (security unified process) as a unified process to implement a successful and high-quality ISMS. A disciplined approach can be provided by SUP to assign tasks and responsibilities within an organization. The SUP architecture comprises static and dynamic dimensions; the static dimension, or disciplines, includes business modeling, assets, security policy, implementation, configuration and change management, and project management. The dynamic dimension, or phases, contains inception, analysis and design, construction, and monitoring. Risk assessment is a major part of the ISMS process. In SUP, we present a risk assessment model, which uses a fuzzy expert system to assess risks in organization. Since, the classification of assets is an important aspect of risk management and ensures that effective protection occurs, a Security Cube is proposed to identify organization assets as an asset classification model. The proposed model leads us to have an offline system health monitoring tool that is really a critical need in any organization.<\/jats:p>","DOI":"10.1155\/2012\/151205","type":"journal-article","created":{"date-parts":[[2012,6,14]],"date-time":"2012-06-14T17:29:54Z","timestamp":1339694994000},"page":"1-20","source":"Crossref","is-referenced-by-count":3,"title":["System Health Monitoring Using a Novel Method: Security Unified Process"],"prefix":"10.1155","volume":"2012","author":[{"given":"Alireza","family":"Shameli-Sendi","sequence":"first","affiliation":[{"name":"D\u00e9partment de Genie Informatique et G\u00e9nie Logiciel, \u00c9cole Polytechnique de Montr\u00e9al, P.O. Box 6079, Succ. Downtown, Montreal, QC, Canada H3C 3A7"}]},{"given":"Masoume","family":"Jabbarifar","sequence":"additional","affiliation":[{"name":"D\u00e9partment de Genie Informatique et G\u00e9nie Logiciel, \u00c9cole Polytechnique de Montr\u00e9al, P.O. Box 6079, Succ. Downtown, Montreal, QC, Canada H3C 3A7"}]},{"given":"Michel","family":"Dagenais","sequence":"additional","affiliation":[{"name":"D\u00e9partment de Genie Informatique et G\u00e9nie Logiciel, \u00c9cole Polytechnique de Montr\u00e9al, P.O. Box 6079, Succ. Downtown, Montreal, QC, Canada H3C 3A7"}]},{"given":"Mehdi","family":"Shajari","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering & Information Technology, Amirkabir University of Technology, 424 Hafez Avenue, Tehran, Iran"}]}],"member":"311","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2005.12.001"},{"issue":"3","key":"16","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1504\/IJICS.2007.013959","volume":"1","year":"2007","journal-title":"International Journal of Information and Computer Security"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.09.040"},{"year":"2003","key":"9"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1204375"}],"container-title":["Journal of Computer Networks and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/jcnc\/2012\/151205.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jcnc\/2012\/151205.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jcnc\/2012\/151205.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T16:04:09Z","timestamp":1497974649000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/jcnc\/2012\/151205\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"references-count":5,"alternative-id":["151205","151205"],"URL":"https:\/\/doi.org\/10.1155\/2012\/151205","relation":{},"ISSN":["2090-7141","2090-715X"],"issn-type":[{"type":"print","value":"2090-7141"},{"type":"electronic","value":"2090-715X"}],"subject":[],"published":{"date-parts":[[2012]]}}}