Mary-Jane Sule’s research while affiliated with Abdus Salam International Centre for Theoretical Physics and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (6)


A service lens on cybersecurity continuity and management for organizations’ subsistence and growth
  • Article
  • Full-text available

November 2022

·

198 Reads

·

19 Citations

Organizational Cybersecurity Journal Practice Process and People

·

Mary-Jane Sule

Purpose This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and vulnerability landscape that often overshadow existing cybersecurity approaches. Design/methodology/approach Through an extensive literature review of relevant concepts and analysis of existing cybersecurity frameworks, standards and best practices, a logical argument is made to produce a dynamic end-to-end cybersecurity service system model. Findings Cyberspace has provided great value for businesses and individuals. The COVID-19 pandemic has significantly motivated the move to cyberspace by organizations. However, the extension to cyberspace comes with additional risks as traditional protection techniques are insufficient and isolated, generally focused on an organization's perimeter with little attention to what is out there. More so, cyberattacks continue to grow in complexity creating overwhelming consequences. Existing cybersecurity approaches and best practices are limited in scope, and implementation strategies, differing in strength and focus, at different levels of granularity. Nevertheless, the need for a proactive, adaptive and responsive cybersecurity solution is recognized. Originality/value This paper presents a model that promises proactive, adaptive and responsive end-to-end cybersecurity. The proposed cybersecurity continuity and management model premised on a service system, leveraging on lessons learned from existing solutions, takes a holistic analytical view of service activities from source (service provider) to destination (Customer) to ensure end-to-end security, whether internally (within an organization) or externally.

Download

Cybersecurity through the lens of Digital Identity and Data Protection: Issues and Trends

November 2021

·

223 Reads

·

53 Citations

Technology in Society

The use of a secure and robust digital identification system that is capable of protecting privacy is an essential, reliable and user-friendly element for a strong cyber resilience strategy and is a source of new business opportunities and applications for banks, private sector with a return on their investment. The march towards Digital Identity is well underway therefore, focus should be on both adoption and adaption of the new structures and regulations. These are needed to govern the associated services and transactions as well as establishing laws that enforce penalties for violations. There is no doubt then that more and more entities and institutions would move to the cloud. Security challenges affecting the cloud may not be new but the mode of addressing them would be different. The authors develop a Data Colouring technique for securing data processed or stored on both cloud and non-cloud platforms. The technique combines Public Key Infrastructure (PKI), concatenated fingerprints and digital watermarking. Using this technique, data can be secured at creation or during storage and remains secure during processing.



Fuzzy logic approach to modelling trust in cloud computing

June 2017

·

336 Reads

·

20 Citations

Despite the growing deployment of mission critical applications on computing systems, trust and security continues to hinder its full adoption and deployment on cloud computing platforms. In addition to accountability and non-repudiation on the cloud deployment, end-users want to be confident of availability and reliability of services. For any cloud platform to be secure and trusted, the individual layers of the platform must be secure as there is no ‘one fits all solution’ for securing all the layers. This work presents a multi-layer trust security model (MLTSM) based on unified cloud platform trust that employs a fuzzy logic combination of on-demand states of several different security mechanisms, such as identification, direct and in-direct trust, across all cloud layers. In addition, results from a MATLAB-based simulation of the model are also presented. A MLTSM can improve the secure deployment of cloud infrastructure in mission critical sectors such as electrical power system operation, as it provides empirical evidence that allows direct (on-demand) determination and verification of the trust state of any given cloud computing platform or service. Such a modelling approach is useful for comparison, classification and improving end-user confidence in selecting or consuming cloud computing resources.



Citations (5)


... E-commerce must protect IT systems through cybersecurity strategies, processes, and methods to mitigate risks and vulnerabilities in their information systems. Business network design for cybersecurity services should adhere to internal and external security standards, involving human activities that use information and technology to create security products and services (Thomas and Sule, 2023). Moreover, Salimath and Philip (2020) point out that efficient cybersecurity management provides a competitive advantage to ensure uninterrupted operations and fosters innovation. ...

Reference:

Integrating Artificial Intelligence and Cybersecurity Frameworks: Challenges and Opportunities in E-commerce Cybersecurity Management
A service lens on cybersecurity continuity and management for organizations’ subsistence and growth

Organizational Cybersecurity Journal Practice Process and People

... One of them is the need for efficient system integration between various government agencies, the private sector, and digital service providers. This system must be able to ensure that personal data recorded in digital identities is only used for legitimate purposes and is not misused by irresponsible parties (Sule et al., 2021). ...

Cybersecurity through the lens of Digital Identity and Data Protection: Issues and Trends
  • Citing Article
  • November 2021

Technology in Society

... Platforms and services used for cloud computing must be secured using a comprehensive strategy that spans all tiers. Sule et al. (2017) have designed a multi-layer trust security model (MLTSM) based on unified cloud platform trust. It uses fuzzy logic to combine the on-demand states of several security mechanisms, such as identity, direct trust, and indirect trust, across all cloud tiers. ...

Fuzzy logic approach to modelling trust in cloud computing

... 36 Merkezileşmiş bulutlar (son kullanıcılardan uzak olan) popülerlik kazanmış olsa da iletişim gecikmelerini azaltmak için bir kullanıcının bazı isteklerinin bulut dışında işlenip işlenemeyeceği araştırılmış ve "Kutudaki bulut" kavramı ortaya çıkmıştır. [37][38] Yönlendiriciler ve baz istasyonları gibi ağ elemanlarında hesaplama imkânı, "sınır bilişim (edge computing)" olarak adlandırıldı. 39 Sınır bilişim (edge computing) teknolojisi "büyük bir bulut bilişim mimarisinin bir parçasına bağlı donanım aygıtlarının potansiyelini, veri merkezi haline getirmek için merkezden uzaklaştırarak açığa çıkarılmasını" kapsamaktadır. ...

Deploying trusted cloud computing for data intensive power system applications
  • Citing Conference Paper
  • September 2015

... There-fore, the aforementioned trustworthiness scores are usually assessed from different perspectives. Sule et al. [138], for instance, propose fuzzy logic algorithms to assess trustworthiness levels based on characteristics from physical, infrastructure, platform, and software layers (e.g., Secure Shell (SSH), Secure Sockets Layer (SSL), Intrusion Detection System (IDS), Virtual Machines (VMs), and other characteristics). A downside of this approach is the computational cost associated with computing, collecting, and storing scores across nodes. ...

Trust Modeling in Cloud Computing
  • Citing Conference Paper
  • March 2016