<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Matthew N.O. Sadiku</style></author><author><style face="normal" font="default" size="100%">Shumon Alam</style></author><author><style face="normal" font="default" size="100%">Sarhan M. Musa</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Information Assurance Benefits and Challenges: An Introduction</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">computer security</style></keyword><keyword><style  face="normal" font="default" size="100%">information assurance</style></keyword><keyword><style  face="normal" font="default" size="100%">information goods</style></keyword><keyword><style  face="normal" font="default" size="100%">Information Security</style></keyword><keyword><style  face="normal" font="default" size="100%">information services</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">36</style></volume><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Information assurance (IA) is the practice of protecting and defending information systems by ensuring their availability, confidentiality, integrity, authentication, and nonrepudiation. As a discipline, IA grew from the practice of information security. It plays a crucial role in a networked infrastructure of e-commerce, e-business, and e-Government. For this reason, IA is a serious worldwide concern of organizations, industry, governments, and academia. This paper provides a brief introduction on information assurance, the benefits it brings, and the challenges in the implementation of the concept.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stoyan Avramov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integrating COTS Technologies into a Scalable Mobile  Emergency Command Post</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">C4ISR</style></keyword><keyword><style  face="normal" font="default" size="100%">drill</style></keyword><keyword><style  face="normal" font="default" size="100%">emergency management</style></keyword><keyword><style  face="normal" font="default" size="100%">exercise</style></keyword><keyword><style  face="normal" font="default" size="100%">field command and control</style></keyword><keyword><style  face="normal" font="default" size="100%">information assurance</style></keyword><keyword><style  face="normal" font="default" size="100%">Information Security</style></keyword><keyword><style  face="normal" font="default" size="100%">operational</style></keyword><keyword><style  face="normal" font="default" size="100%">system</style></keyword><keyword><style  face="normal" font="default" size="100%">technical architecture</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2003</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2003</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">10</style></volume><pages><style face="normal" font="default" size="100%">87-96</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The article describes an ongoing effort in developing and demonstrating the capabilities of commercial-off-the-shelf technologies, integrated to provide cost-effective on-site command and control of various emergencies. The author briefly presents major operational, system, and technical architecture issues, as well as the approach chosen to deal with the problem of information assurance. The proposed C2 architecture may be easily scaled to better fit requirements of a particular customer. It has been tested in laboratory environment and highly acclaimed at technical exhibitions. The concept will be further tested during an international disaster relief exercise, to be conducted in the summer of 2003 in Bulgaria under the coordination of the State Agency for Civil Protection of the Republic of Bulgaria.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Daniel Wiener II</style></author><author><style face="normal" font="default" size="100%">John Courtien</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Bulgarian Information Network:  Command Information Infrastructure for the Future</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">C4ISR</style></keyword><keyword><style  face="normal" font="default" size="100%">crisis management.</style></keyword><keyword><style  face="normal" font="default" size="100%">Defense Information infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">information assurance</style></keyword><keyword><style  face="normal" font="default" size="100%">mobile combat radio network</style></keyword><keyword><style  face="normal" font="default" size="100%">mobile IP network</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2001</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2001</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">6</style></volume><pages><style face="normal" font="default" size="100%">55-68</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The authors present a vision for the Bulgarian Information Network (BIN) that is globally interconnected, end-to-end set of information capabilities, associated processes, and personnel for collecting, processing, storing, disseminating and managing information on demand to Government, warfighters, law enforcement, policy makers, and support personnel. The BIN includes all owned and leased communications and computing systems and services, software (including applications), data, security services and other associated services necessary to support mobile, Government information operations. The BIN connects the Government personnel to capabilities from all operating locations (bases, posts, camps, stations, facilities, mobile platforms, and deployed sites) and provides interfaces to coalition, allied and coalition users and systems. BIN serves as backbone of the C4ISR defensive, crisis management and law enforcement operations.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Atanas Nachev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Electromagnetic Radiation and the Computer Systems Data Security Problem</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">electromagnetic emission.</style></keyword><keyword><style  face="normal" font="default" size="100%">information assurance</style></keyword><keyword><style  face="normal" font="default" size="100%">Information Security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2000</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2000</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">4</style></volume><pages><style face="normal" font="default" size="100%">105-109</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">One set of problems in the area of information security is caused by electromagnetic emissions. This paper covers related risks and threats and describes a basis for solutions for information assurance. Presented are also original methods for solving the problem of electromagnetic emission.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Veselin Tselkov</style></author><author><style face="normal" font="default" size="100%">Dragomir Pargov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Information Assurance in C4I Systems</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">C4I systems</style></keyword><keyword><style  face="normal" font="default" size="100%">common criteria.</style></keyword><keyword><style  face="normal" font="default" size="100%">cryptography</style></keyword><keyword><style  face="normal" font="default" size="100%">evaluation criteria</style></keyword><keyword><style  face="normal" font="default" size="100%">information assurance</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">security policy</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2000</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2000</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">4</style></volume><pages><style face="normal" font="default" size="100%">43-59</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article presents a broader definition of security and examines the components of information assurance, as well as the main features of the information security policy, a set of requirements, and a system for information security. It reflects the authors' experience in development and implementation of information security systems in the Automated Information System of the Bulgarian armed forces, as well as their participation in the creation of the Strategy for Development of Information Society in Bulgaria. Some conclusions and recommendations from the 1999 U.S.-Bulgarian study of the C4 systems in the Bulgarian armed forces were also taken into account</style></abstract></record></records></xml>