A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Adapting a Formal Model Theory to Applications in Augmented Personalized Medicine
[article]
2017
arXiv
pre-print
This is presented to the modeller via a formal augmented reality language as a first step towards practical modelling and simulation of multi-level living systems. ...
Our first step is to provide foundations for modelling of emergent and evolving dynamic multi-level organic complexes and their sustentative processes in artificial and natural life systems. ...
They contain (in part) content from the postdoctoral thesis of Plamen L. Simeonov related to his qualification exam as a university lecturer (venia legendi). ...
arXiv:1710.03571v4
fatcat:5v4dymci4rgsfo3k4qcyqq3vae
Towards A Novel Unified Framework for Developing Formal, Network and Validated Agent-Based Simulation Models of Complex Adaptive Systems
[article]
2017
arXiv
pre-print
Literature on the modeling and simulation of complex adaptive systems (cas) has primarily advanced vertically in different scientific domains with scientists developing a variety of domain-specific approaches ...
In this thesis, we propose first steps towards such a unified framework using a combination of agent-based and complex network-based modeling approaches and guidelines formulated in the form of a set of ...
Agents and multi-agent systems in AI The search was performed in all four databases of Web of Science namely SCI-EXPANDED, SSCI, A&HCI, CPCI-S for all years. ...
arXiv:1708.02357v1
fatcat:s7j3edr2erbgplzitfcjb6xmz4
Fluid information systems
2009
Proceedings of the 2009 workshop on New security paradigms workshop - NSPW '09
In this work we propose a new security paradigm, that aims at using the network's flexibility to move data and applications away from potential attackers. ...
We also present a possible realization of the proposed paradigm, based on recent advances in language-based security and static analysis, where data and applications are partitioned ahead-of-time and can ...
Acknowledgement We would like to thank the anonymous reviewers for their invaluable feedback on earlier drafts of this article, and the participants of the New Security Paradigms Workshop 2009 in Oxford ...
doi:10.1145/1719030.1719048
dblp:conf/nspw/ProbstH09
fatcat:jbklxx4gj5axrmu2u5omhifjg4
Distributed Systems Security Knowledge Area
[article]
2019
Zenodo
Expanding on the above, the distributed resources are typically dispersed (for example, in an Azure or Amazon Cloud, in Peer-to-Peer Systems such as Gnutella or BitTorrent, or in a Blockchain implementation ...
such as transactions, databases, storage, control, and computing. ...
Authentication services commonly act as trusted third party for interacting entities in a distributed system. ...
doi:10.5281/zenodo.3941852
fatcat:ag6uugbkybg65iacezz6yjmemq
Security issues for federated database systems
1994
Computers & security
Acknowledgments The work reported in this paper was sponsored by Much of our work on MLS/FDS has been influenced by their paper. ...
The schema can be updated by a process at system-low or by a trusted process. In the second method, the schema is stored at system-high. A trusted process is needed to manage the schema. ...
In Section 4, we discuss architectural issues. In particular, issues on a schema architecture and a system architecture are given. The paper is summarized in Section 5.
What is an MLS/FDS? ...
doi:10.1016/0167-4048(91)90139-5
fatcat:a2fvn6coyvdtvf4wuh4fbbmbzq
Challenges in Formal Methods for Testing and Verification of Cloud Computing Systems
2015
Scalable Computing : Practice and Experience
In this paper, we discuss the state of the art on using formal methods for the verification of cloud computing systems. ...
Even though formal methods have been used successfully in the design and verification of several aspects of these systems, there are still many design issues in cloud computing that can be enhanced using ...
The work addresses the problem of data consistency in replicated data stores by formally modeling write-ahead logging in replicated data stores in the cloud. ...
doi:10.12694/scpe.v16i3.1104
fatcat:3paeyn7khzfh5jtadfnxdfiyla
Multilevel security issues in distributed database management systems
1988
Computers & security
This paper describes the security needs in a distributed processing environment common to many enterprises and discusses the applicability of multilevel secure database management systems in such an environment ...
In order to prove that the TCB is complete and correct, a mathematical model of the system and its security policy is developed and formal verification methods are used to show that the system design satisfies ...
Although the creation and manipulation of increasingly larger database systems offer many advantages, it also produces breaches in security when the output of confidential and sensitive information is ...
doi:10.1016/0167-4048(88)90579-2
fatcat:v7oueqowofgqdd3rp4455qpyhy
Towards a Novel Cooperative Logistics Information System Framework
[article]
2019
arXiv
pre-print
Supply Chains and Logistics have a growing importance in global economy. ...
In this paper we identify some current challenges and integration issues between separately designed Logistics Information Systems (LIS), and we propose a Distributed Cooperative Logistics Platform (DCLP ...
The Logistics Information System architecture that we propose relies on MongoDB NoSQL database, as shown in Figure 6 . ...
arXiv:1905.00687v1
fatcat:dpchzjxmyvhstlyy2ffk4smvka
Research issues and overview of economic models in Mobile-P2P networks
2007
Database and Expert Systems Applications
This paper presents an executive summary of the existing solutions and an overview of some of the important issues for handling problems in mobile-P2P networks using economic models. ...
We also present our perspectives on building 'real' mobile-P2P applications using economic models. ...
The work in [6] uses a formal game-theoretic model to analyze equilibria of user strategies in P2P file-sharing systems under different kinds of payment mechanisms. ...
doi:10.1109/dexa.2007.4313006
fatcat:v2zt44q6wjgzhlppekdp23zgi4
TRADECARD: Building A Global Trading Electronic Payment System
2001
Communications of the Association for Information Systems
B2B e-commerce; and TradeCard's business plan and marketing strategy in building a global ecommerce trading system. ...
Is its platform capable of synchronizing all the databases involved in international transactions yet allowing all companies to use their own tools, operating systems and hardware platforms? ...
APPENDIX II
DESCRIPTION OF TECHNICAL ARCHITECTURE The technical architecture is shown in Figure 2 in the text. ...
doi:10.17705/1cais.00718
fatcat:sdymabsaxnf5ldte6fcyomdrha
Information Sharing Models for Early Warning Systems of Cybersecurity Intelligence
2020
Information & Security An International Journal
The development of EWSs will be rooted in a comprehensive review of information sharing and trust models from within the cyber domain as well as models from other domains. ...
The study consists of a comprehensive review of information sharing and trust models from within the cyber domain (n > 50), as well as models from other domains, such as healthcare, maritime and critical ...
A trust model with cyber information sharing in CIP is a part of the preventive early warning solution. ...
doi:10.11610/isij.4614
fatcat:ryqhp6a7gbdhpmxb4cgnpqsx3a
Security Architecture for Sensitive Information Systems
[chapter]
2010
Convergence and Hybrid Information Technologies
However, in the proposed security architecture, dynamic keys are adopted to in DKM. DKM has the advantage over others due to the nature of dynamic keys. ...
Session keys can be distributed by using a shared long-term key or a public key starting at every communication session. A one-time pad is normally exchanged via physical devices. ...
formal architecture (Chapter 3): a new security architecture for sensitive information systems (SecureSIS) was formally proposed as the first step in protecting the three major components (communication ...
doi:10.5772/9641
fatcat:cdq2t26wcfc3vc5czgqog3h5pu
Establishment of Requirements and Methodology for the Development and Implementation of GreyMatters, a Memory Clinic Information System
2017
Studies in Health Technology and Informatics
The evaluation supports that the system is an acceptable tool for clinical, administrative, and research use and forms a useful part of the wider information architecture. ...
and audit trails, led to a robust and useful system. ...
to replicate the entire requirements for such systems. ...
pmid:28423747
fatcat:dw2lm6o7q5fufkgmgthxos6ofq
Towards a Secure Data Stream Management System
[chapter]
2006
Lecture Notes in Computer Science
Todays data stream management systems (DSMSs) lack security functionality. Based on adversary scenarios we show how a DSMS architecture can be protected. ...
We sketch a general DSMS architecture and introduce security issues that need to be considered. ...
The Catalog is consulted when a user wants to access objects in the system. In the future the described architecture can be extended with a database attached to the DSMS. ...
doi:10.1007/11681885_10
fatcat:kjme7z3lkjbvfeeplgesvysii4
Defining architecture components of the Big Data Ecosystem
2014
2014 International Conference on Collaboration Technologies and Systems (CTS)
Big Data are becoming a new technology focus both in science and in industry and motivate technology shift to data centric architecture and operational models. ...
There is a vital need to define the basic information/semantic models, architecture components and operational models that together comprise a socalled Big Data Ecosystem. ...
Another target research direction is defining a Common Body of Knowledge (CBK) in Big Data to provide a basis for a consistent curriculum development. ...
doi:10.1109/cts.2014.6867550
dblp:conf/cts/DemchenkoLM14
fatcat:c4dcnflvyvhc5do3xvkqxapney
« Previous
Showing results 1 — 15 out of 5,336 results