Filters








5,336 Hits in 5.8 sec

Adapting a Formal Model Theory to Applications in Augmented Personalized Medicine [article]

Plamen L. Simeonov, Andrée C. Ehresmann
2017 arXiv   pre-print
This is presented to the modeller via a formal augmented reality language as a first step towards practical modelling and simulation of multi-level living systems.  ...  Our first step is to provide foundations for modelling of emergent and evolving dynamic multi-level organic complexes and their sustentative processes in artificial and natural life systems.  ...  They contain (in part) content from the postdoctoral thesis of Plamen L. Simeonov related to his qualification exam as a university lecturer (venia legendi).  ... 
arXiv:1710.03571v4 fatcat:5v4dymci4rgsfo3k4qcyqq3vae

Towards A Novel Unified Framework for Developing Formal, Network and Validated Agent-Based Simulation Models of Complex Adaptive Systems [article]

Muaz A. Niazi
2017 arXiv   pre-print
Literature on the modeling and simulation of complex adaptive systems (cas) has primarily advanced vertically in different scientific domains with scientists developing a variety of domain-specific approaches  ...  In this thesis, we propose first steps towards such a unified framework using a combination of agent-based and complex network-based modeling approaches and guidelines formulated in the form of a set of  ...  Agents and multi-agent systems in AI The search was performed in all four databases of Web of Science namely SCI-EXPANDED, SSCI, A&HCI, CPCI-S for all years.  ... 
arXiv:1708.02357v1 fatcat:s7j3edr2erbgplzitfcjb6xmz4

Fluid information systems

Christian W. Probst, René Rydhof Hansen
2009 Proceedings of the 2009 workshop on New security paradigms workshop - NSPW '09  
In this work we propose a new security paradigm, that aims at using the network's flexibility to move data and applications away from potential attackers.  ...  We also present a possible realization of the proposed paradigm, based on recent advances in language-based security and static analysis, where data and applications are partitioned ahead-of-time and can  ...  Acknowledgement We would like to thank the anonymous reviewers for their invaluable feedback on earlier drafts of this article, and the participants of the New Security Paradigms Workshop 2009 in Oxford  ... 
doi:10.1145/1719030.1719048 dblp:conf/nspw/ProbstH09 fatcat:jbklxx4gj5axrmu2u5omhifjg4

Distributed Systems Security Knowledge Area [article]

Neeraj Suri
2019 Zenodo  
Expanding on the above, the distributed resources are typically dispersed (for example, in an Azure or Amazon Cloud, in Peer-to-Peer Systems such as Gnutella or BitTorrent, or in a Blockchain implementation  ...  such as transactions, databases, storage, control, and computing.  ...  Authentication services commonly act as trusted third party for interacting entities in a distributed system.  ... 
doi:10.5281/zenodo.3941852 fatcat:ag6uugbkybg65iacezz6yjmemq

Security issues for federated database systems

Bhavani Thuraisingham
1994 Computers & security  
Acknowledgments The work reported in this paper was sponsored by Much of our work on MLS/FDS has been influenced by their paper.  ...  The schema can be updated by a process at system-low or by a trusted process. In the second method, the schema is stored at system-high. A trusted process is needed to manage the schema.  ...  In Section 4, we discuss architectural issues. In particular, issues on a schema architecture and a system architecture are given. The paper is summarized in Section 5. What is an MLS/FDS?  ... 
doi:10.1016/0167-4048(91)90139-5 fatcat:a2fvn6coyvdtvf4wuh4fbbmbzq

Challenges in Formal Methods for Testing and Verification of Cloud Computing Systems

Amjad Gawanme, Ahmad Alomari
2015 Scalable Computing : Practice and Experience  
In this paper, we discuss the state of the art on using formal methods for the verification of cloud computing systems.  ...  Even though formal methods have been used successfully in the design and verification of several aspects of these systems, there are still many design issues in cloud computing that can be enhanced using  ...  The work addresses the problem of data consistency in replicated data stores by formally modeling write-ahead logging in replicated data stores in the cloud.  ... 
doi:10.12694/scpe.v16i3.1104 fatcat:3paeyn7khzfh5jtadfnxdfiyla

Multilevel security issues in distributed database management systems

John McHugh, Bhavani M. Thuraisingham
1988 Computers & security  
This paper describes the security needs in a distributed processing environment common to many enterprises and discusses the applicability of multilevel secure database management systems in such an environment  ...  In order to prove that the TCB is complete and correct, a mathematical model of the system and its security policy is developed and formal verification methods are used to show that the system design satisfies  ...  Although the creation and manipulation of increasingly larger database systems offer many advantages, it also produces breaches in security when the output of confidential and sensitive information is  ... 
doi:10.1016/0167-4048(88)90579-2 fatcat:v7oueqowofgqdd3rp4455qpyhy

Towards a Novel Cooperative Logistics Information System Framework [article]

Fares Zaidi, Eric Sanlaville
2019 arXiv   pre-print
Supply Chains and Logistics have a growing importance in global economy.  ...  In this paper we identify some current challenges and integration issues between separately designed Logistics Information Systems (LIS), and we propose a Distributed Cooperative Logistics Platform (DCLP  ...  The Logistics Information System architecture that we propose relies on MongoDB NoSQL database, as shown in Figure 6 .  ... 
arXiv:1905.00687v1 fatcat:dpchzjxmyvhstlyy2ffk4smvka

Research issues and overview of economic models in Mobile-P2P networks

Anirban Mondal, Sanjay Kumar Madria, Masaru Kitsuregawa
2007 Database and Expert Systems Applications  
This paper presents an executive summary of the existing solutions and an overview of some of the important issues for handling problems in mobile-P2P networks using economic models.  ...  We also present our perspectives on building 'real' mobile-P2P applications using economic models.  ...  The work in [6] uses a formal game-theoretic model to analyze equilibria of user strategies in P2P file-sharing systems under different kinds of payment mechanisms.  ... 
doi:10.1109/dexa.2007.4313006 fatcat:v2zt44q6wjgzhlppekdp23zgi4

TRADECARD: Building A Global Trading Electronic Payment System

Ali Farhoomand, Marissa McCauley
2001 Communications of the Association for Information Systems  
B2B e-commerce; and TradeCard's business plan and marketing strategy in building a global ecommerce trading system.  ...  Is its platform capable of synchronizing all the databases involved in international transactions yet allowing all companies to use their own tools, operating systems and hardware platforms?  ...  APPENDIX II DESCRIPTION OF TECHNICAL ARCHITECTURE The technical architecture is shown in Figure 2 in the text.  ... 
doi:10.17705/1cais.00718 fatcat:sdymabsaxnf5ldte6fcyomdrha

Information Sharing Models for Early Warning Systems of Cybersecurity Intelligence

Jyri Rajamäki, Vasilis Katos
2020 Information & Security An International Journal  
The development of EWSs will be rooted in a comprehensive review of information sharing and trust models from within the cyber domain as well as models from other domains.  ...  The study consists of a comprehensive review of information sharing and trust models from within the cyber domain (n > 50), as well as models from other domains, such as healthcare, maritime and critical  ...  A trust model with cyber information sharing in CIP is a part of the preventive early warning solution.  ... 
doi:10.11610/isij.4614 fatcat:ryqhp6a7gbdhpmxb4cgnpqsx3a

Security Architecture for Sensitive Information Systems [chapter]

Xianping Wu, Phu Dung, Balasubramaniam Srinivas
2010 Convergence and Hybrid Information Technologies  
However, in the proposed security architecture, dynamic keys are adopted to in DKM. DKM has the advantage over others due to the nature of dynamic keys.  ...  Session keys can be distributed by using a shared long-term key or a public key starting at every communication session. A one-time pad is normally exchanged via physical devices.  ...  formal architecture (Chapter 3): a new security architecture for sensitive information systems (SecureSIS) was formally proposed as the first step in protecting the three major components (communication  ... 
doi:10.5772/9641 fatcat:cdq2t26wcfc3vc5czgqog3h5pu

Establishment of Requirements and Methodology for the Development and Implementation of GreyMatters, a Memory Clinic Information System

Archana Tapuria, Matt Evans, Vasa Curcin, Tony Austin, Nathan Lea, Dipak Kalra
2017 Studies in Health Technology and Informatics  
The evaluation supports that the system is an acceptable tool for clinical, administrative, and research use and forms a useful part of the wider information architecture.  ...  and audit trails, led to a robust and useful system.  ...  to replicate the entire requirements for such systems.  ... 
pmid:28423747 fatcat:dw2lm6o7q5fufkgmgthxos6ofq

Towards a Secure Data Stream Management System [chapter]

Wolfgang Lindner, Jörg Meier
2006 Lecture Notes in Computer Science  
Todays data stream management systems (DSMSs) lack security functionality. Based on adversary scenarios we show how a DSMS architecture can be protected.  ...  We sketch a general DSMS architecture and introduce security issues that need to be considered.  ...  The Catalog is consulted when a user wants to access objects in the system. In the future the described architecture can be extended with a database attached to the DSMS.  ... 
doi:10.1007/11681885_10 fatcat:kjme7z3lkjbvfeeplgesvysii4

Defining architecture components of the Big Data Ecosystem

Yuri Demchenko, Cees de Laat, Peter Membrey
2014 2014 International Conference on Collaboration Technologies and Systems (CTS)  
Big Data are becoming a new technology focus both in science and in industry and motivate technology shift to data centric architecture and operational models.  ...  There is a vital need to define the basic information/semantic models, architecture components and operational models that together comprise a socalled Big Data Ecosystem.  ...  Another target research direction is defining a Common Body of Knowledge (CBK) in Big Data to provide a basis for a consistent curriculum development.  ... 
doi:10.1109/cts.2014.6867550 dblp:conf/cts/DemchenkoLM14 fatcat:c4dcnflvyvhc5do3xvkqxapney
« Previous Showing results 1 — 15 out of 5,336 results