Filters








47,622 Hits in 7.6 sec

Building high assurance secure applications using security patterns for capability-based platforms

Paul Rimba
2013 2013 35th International Conference on Software Engineering (ICSE)  
The aim of this research is to improve our understanding of the design of high assurance secure applications.  ...  The main contributions of this thesis are a pattern-based composition approach to incrementally build and verify application designs.  ...  Chapter 9 Conclusion and future work In this thesis, I have presented a pattern-based composition approach to build high assurance secure application design using capability-based design fragments which  ... 
doi:10.1109/icse.2013.6606727 dblp:conf/icse/Rimba04 fatcat:siskbwuma5bb7naos6ip3nszfy

Composing Patterns to Construct Secure Systems

Paul Rimba, Liming Zhu, Len Bass, Ihor Kuz, Steve Reeves
2015 2015 11th European Dependable Computing Conference (EDCC)  
Building secure applications requires significant expertise. Secure platforms and security patterns have been proposed to alleviate this problem.  ...  However, correctly applying patterns to use platform features is still highly expertisedependent. Patterns are informal and there is a gap between them and platform features.  ...  Design Fragments for Security Patterns Design fragments are specializations of security patterns for capability-based platforms.  ... 
doi:10.1109/edcc.2015.12 dblp:conf/edcc/RimbaZBKR15 fatcat:76kvksgi6ja2daejvdzqtgtqum

Towards a Security Domain Model for Embedded Systems

Simin Nadjm-Tehrani, Maria Vasilevskaya
2011 2011 IEEE 13th International Symposium on High-Assurance Systems Engineering  
We use UML (Unified Modeling Language), since it is widely used as a base for building domain-specific languages. Another motivation is that there already exists an extension of UML, i.e.  ...  Two other approaches for incorporating security concerns at the design level are aspect-oriented modelling [3] and security patterns [4] .  ... 
doi:10.1109/hase.2011.19 dblp:conf/hase/Nadjm-TehraniV11 fatcat:3l4kw4u56nd4zgjcdi6y3i6jf4

Integrating Security Services in Cloud Service Stores [chapter]

Joshua Daniel, Fadi El-Moussa, Géry Ducatel, Pramod Pawar, Ali Sajjad, Robert Rowlingson, Theo Dimitrakos
2015 IFIP Advances in Information and Communication Technology  
This is achieved by enhancing the security policy management of commercial technologies, and via their integration with multiple Cloud-based hosts and applications.  ...  Protecting systems, applications and data hosted on a Cloud environment against cyber-threats, and accounting for security incidents across the Cloud estate are prerequisites to Cloud adoption by business  ...  , data and business applications in the Cloud and to enforce the controls required for operating high-assurance applications in the Cloud.  ... 
doi:10.1007/978-3-319-18491-3_19 fatcat:5upp7lt5pjbgxes5ya5hf5esjm

Compositional security certification methodology

José Emilio Rico, Miguel Bañón, Alvaro Ortega, Reinhard Hametner, Holger Blasum, Michal Hager
2018 Zenodo  
The compositional security certification methodology as presented in this document is the certification approach to be used in the scope of MILS security evaluations and certifications.  ...  Concrete requirements for developers and methodology for evaluators is given so that the evaluation and certification process is supported through the use of this document, in addition to the requirements  ...  called applications, using security functions and properties provided by the base component.  ... 
doi:10.5281/zenodo.2586493 fatcat:6jnmjxnyufcdtbzpfor2izspnu

A Model-Based Approach To Certification Of Adaptive Mils

Dorien Koelemeijer, Rasma Araby, Ayoub Nouri, Marius Bozga, Rance DeLong
2018 International Conference on High Performance Embedded Architectures and Compilers  
The need for certification approaches for these systems is thus becoming urgent, especially due to their prevalent use in safety- and mission critical settings.  ...  Among the challenges for certification are a way of generating an adequate assurance case for initial state of the adaptive system and for each step in its incremental adaptation, and generation and management  ...  Figure 3 provides a depiction of the hierarchy of the argument patterns that may be used to build the Adaptive MILS assurance case.  ... 
doi:10.5281/zenodo.1306089 dblp:conf/hipeac/KoelemeijerANBD18 fatcat:cm4u5xpqvrgkjikjjgtw6bpdve

Simplify and Rationalize IT and Security [chapter]

Dan Blum
2020 Rational Cybersecurity for Business  
Where good practices are lacking, security leaders can advocate for them and implement those that they can as part of ongoing security projects or changes.  ...  They must rationalize application portfolios.  ...  Security controls must be implemented in the infrastructure using a combination of native platform capabilities and multiplatform (or hybrid cloud) integration patterns.  ... 
doi:10.1007/978-1-4842-5952-8_7 fatcat:kxyg5r4zyzbdpiwbx5xm4tenci

A Survey of Security Concepts for Common Operating Environments

Joseph Loyall, Kurt Rohloff, Partha Pal, Michael Atighetchi
2011 2011 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops  
This paper highlights security concepts relevant to using SOA as a foundation for a Common Operating Environment (COE), i.e., a set of infrastructure and common services for developing and executing applications  ...  We then explore security standards and requirements for missioncritical systems developed on top of a SOA-based COE and security technologies that are candidates for satisfying the requirements.  ...  A COE is a set of infrastructure and common services for building and executing applications on multiple platforms [29] .  ... 
doi:10.1109/isorcw.2011.31 dblp:conf/isorc/LoyallRPA11 fatcat:oe4kughiu5g2bjhq7uyoqblply

Using Proven Reference Monitor Patterns for Security Evaluation

Mark Heckman, Roger Schell
2016 Information  
Just such an integrated set of security patterns was created decades ago based on the Reference Monitor abstraction.  ...  This paper explains how the TCSEC and its Trusted Network Interpretation (TNI) constitute a set of security patterns for large, complex and distributed systems and how those patterns have been repeatedly  ...  ., the GEMSOS security kernel) offered by a commercial high assurance computer vendor rather than trying to build new high assurance components from scratch.  ... 
doi:10.3390/info7020023 fatcat:frczzwdtvfbmvaf3gv4cu72quu

Next Generation Internet of Things [chapter]

Ovidiu Vermesan, Joël Bacquet
2018 Next Generation Internet of Things  
The chapter presents an overview of the eight that are part of the European IoT Security and Privacy Projects initiative (IoT-ESP) addressing advanced concepts for end-to-end security in highly distributed  ...  Platforms should provide connectivity and intelligence, actuation and control features, linkage to modular and ad-hoc cloud services, The IoT platforms used are compatible with existing international developments  ...  Furthermore, we will explore the synergies among these areas, building a foundation for cross-application-area use of existing IoT platforms and data.  ... 
doi:10.13052/rp-9788770220071 fatcat:bnyyfkhdzbghxetcwhisrqsapq

SELENE: Self-Monitored Dependable Platform for High-Performance Safety-Critical Systems

Carles Hernandez, Jose Flieh, Roberto Paredes, Charles-Alexis Lefebvre, Imanol Allende, Jaume Abella, David Trillin, Martin Matschnig, Bernhard Fischer, Konrad Schwarz, Jan Kiszka, Martin Ronnback (+7 others)
2020 2020 23rd Euromicro Conference on Digital System Design (DSD)  
Existing HW/SW platforms for safety-critical systems suffer from limited performance and/or from lack of flexibility due to building on specific proprietary components.  ...  ; (3) achieve flexible diverse redundancy by exploiting the inherent redundant capabilities of the multicore; and (4) efficiently execute compute-intensive applications by means of specific accelerators  ...  The focus of SELENE is the development of an open platform for high-performance safety-related applications using the RISC-V instruction set architecture.  ... 
doi:10.1109/dsd51259.2020.00066 dblp:conf/dsd/HernandezFPLAAT20 fatcat:ye4p7s3o75eu3ku6ahdvpqrntu

End-to-End Intent-Based Networking

Luis Velasco, Marco Signorelli, Oscar Gonzalez De Dios, Chrysa Papagianni, Roberto Bifulco, Juan Jose Vegas Olmos, Simon Pryor, Gino Carrozzo, Julius Schulz-Zander, Mehdi Bennis, Ricardo Martinez, Filippo Cugini (+4 others)
2021 IEEE Communications Magazine  
The IBN framework is aware of its state and context to autonomously take proactive actions for service assurance.  ...  The resulting framework supports application-level resilience and intelligence through replication and elasticity. An illustrative intelligent application use case is presented.  ...  As for the RAN, an intent-based API providing high-level abstraction is used. Several SDN controllers handle the actual programmability of a set of network devices within a defined area.  ... 
doi:10.1109/mcom.101.2100141 fatcat:aps7zt3xanea7aztuzkgnrl7ei

Engineering Secure Future Internet Services [chapter]

Wouter Joosen, Javier Lopez, Fabio Martinelli, Fabio Massacci
2011 Lecture Notes in Computer Science  
In this paper we analyze the need and the opportunity for establishing a discipline for engineering secure Future Internet Services, typically based on research in the areas of software engineering, of  ...  Such a life cycle support must deliver assurance to the stakeholders and enable risk and cost management for the business stakeholders in particular.  ...  We would like to thank the anonymous reviewers for the helpful comments.  ... 
doi:10.1007/978-3-642-20898-0_13 fatcat:dkmr6s3wyzbpnj5xuwdqi33tcm

Large Data Stream Processing - Embedded Systems Design Challenges

Adam Handzlik, Andrzej Jabłonski
2010 International Journal of Electronics and Telecommunications  
An approach to monitoring of real time multi-gigabit internet network has been described as a practical application of FPGA based board, designed for fast data processing.  ...  Large Data Stream Processing - Embedded Systems Design Challenges The following paper describes an application of reconfigurable hardware architectures for processing of huge data streams.  ...  for detection models based on the packet behavior and pattern recognition.  ... 
doi:10.2478/v10177-010-0013-4 fatcat:hua6op25cbgnxlsg6iyokyfvqm

The IBM Application Framework for e-business

G. Flurry, W. Vicknair
2001 IBM Systems Journal  
The IBM Application Framework for e-business (the Framework) is a means for achieving business transformation and a foundation framework for developing and extending e-business processes and applications  ...  It further describes how the system model and application programming model of the Framework and the IBM products that contribute to the platform of the Framework combine to enable a cohesive, prescriptive  ...  Acknowledgments We thank Jack Boyce for the inspiration for the paper.  ... 
doi:10.1147/sj.401.0008 fatcat:yurm2zae65ci5nkdu2q23l5gnq
« Previous Showing results 1 — 15 out of 47,622 results