182,281 Hits in 2.6 sec

Secure Deployment of Components [chapter]

Mark Grechanik, Dewayne E. Perry
2004 Lecture Notes in Computer Science  
The secure deployment of components is widely recognized as a crucial problem in component-based software engineering.  ...  We also present our solution to this problem, called Secure COmponent Deployment Protocol (S-CODEP), and prove its soundness using the authentication logic of Burrows, Abadi, and Needham (BAN authentication  ...  The deployment of generic third-party components opens their users to different security risks.  ... 
doi:10.1007/978-3-540-24848-4_12 fatcat:7lf2snvpbzbbdhrgucg72xogx4

Supporting Secure Deployment of Portal Components [chapter]

Martin Gaedke, Johannes Meinecke, Martin Nussbaumer
2004 Lecture Notes in Computer Science  
The capability of such systems rises with the number of available components. Hence it is advisable to facilitate their deployment and exchange with a supporting architecture.  ...  The achieved increased use of third party components also results in higher risks for the provider of the portal.  ...  This paper focuses on issues concerning the secure deployment, exchange and management of components for Web portals.  ... 
doi:10.1007/978-3-540-27834-4_62 fatcat:vnzr4ppfzvc5pclmvqvgzakzmu

Security analysis and exploitation of arduino devices in the internet of things

Carlos Alberca, Sergio Pastrana, Guillermo Suarez-Tangil, Paolo Palmieri
2016 Proceedings of the ACM International Conference on Computing Frontiers - CF '16  
In this work, we present a security analysis of Arduino Yun. We show that Arduino Yun is vulnerable to a number of attacks and we implement a proof of concept capable of exploiting some of them.  ...  This feature positions Arduino Yun as a popular platform for developers, but it also introduces unique infection vectors from the security viewpoint.  ...  Acknowledgment This work was partially supported by the MINECO Grant TIN2013-46469-R (SPINY: Security and Privacy in the Internet of You) and by the CAM Grant S2013/ICE-3095 (CIBERDINE).  ... 
doi:10.1145/2903150.2911708 dblp:conf/cd/AlbercaPSP16 fatcat:odtv5g7cwnbrhlqtkih2prlaye

Continuous Deployment of Trustworthy Smart IoT Systems

Nicolas Ferry, Phu H. Nguyen, Hui Song, Erkuden Rios, Eider Iturbe, Satur Martinez, Angel Rego
2020 Journal of Object Technology  
It enables to cope with security and privacy concerns of SIS as it offers necessary concepts to specify security and privacy requirements and to support the automatic deployment of the associated security  ...  reachable and if software component are still running, and the dynamic adaptation of a deploymenti.e  ...  General Support for Security Components GeneSIS supports the deployment of security components as any other software components.  ... 
doi:10.5381/jot.2020.19.2.a16 fatcat:2s43wrhgo5bpbf5rjnjpahaycu

Securing the Deployment of Cloud-Hosted Services for Guaranteeing Multitenancy Isolation [chapter]

Laud Charles Ochei
2020 Cloud Computing Security [Working Title]  
the security and access privilege of tenants (or components).  ...  This study presents CLAMP (Cloud-based architectural approach for securing services through Multitenancy deployment Patterns) to securing the deployment of cloud-hosted services in a way that guarantees  ...  To address this trade-off, an optimization model is recommended to be used to select optimal components for deployment to the cloud a part to play in securing the deployment of components of a cloud-hosted  ... 
doi:10.5772/intechopen.92142 fatcat:feu2vj57aje75di5vfc6vuxmc4

SASHA: A Distributed Protocol for Secure Application Deployment in Shared Ad-Hoc Wireless Sensor Networks

J. Maerien, S. Michiels, C. Huygens, W. Joosen
2011 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems  
environment that requires advanced and secure mechanisms to control the deployment and operation of sensor applications.  ...  This paper presents SASHA: a proof-of-concept protocol that enables lightweight and secure deployment of multiple applications on heterogeneously owned sensor nodes.  ...  This work was conducted in the context of the ITEA2 "Do-it-Yourself Smart Experiences" project, ITEA2 08005, and is supported by funding from the Flemish agency for Innovation by Science and Technology  ... 
doi:10.1109/mass.2011.16 dblp:conf/mass/MaerienMHJ11 fatcat:fmfzhxffffhlnemdsfo3r3hyxq

Deployment of Infrastructure and Services in the Open Grid Services Architecture (OGSA) [chapter]

Paul Brebner, Wolfgang Emmerich
2005 Lecture Notes in Computer Science  
We conclude that grid deployment must be treated as a first-order activity by integrating secure deployment capabilities into the middleware, to enable deployment of secured infrastructure and services  ...  The OGSI component model includes a set of con-  ...  and state; visibility of components installed and versions, and security infrastructure; and debugging of installations.  ... 
doi:10.1007/11590712_15 fatcat:h5kz2bjxnfgdrl7hl7sxyd6tlu

Self-healing Multi-Cloud Application Modelling

Erkuden Rios, Eider Iturbe, Maria Carmen Palacios
2017 Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17  
of state-of-the-art modelling languages towards easing: a) the automation of distributed deployment, b) the computation of composite Service Level Agreements (SLAs) that include security and privacy aspects  ...  , and c) the risk analysis and service match-making taking into account not only functionality and business aspects of the cloud services, but also security aspects.  ...  Specification of the deployment order of the application components.  ... 
doi:10.1145/3098954.3104059 dblp:conf/IEEEares/RiosIP17 fatcat:px6id5lsmjftffy25v2gxaxdxa

Application of Bayesian network in risk assessment for website deployment scenarios

Vu Thi Huong Giang, Nguyen Manh Tuan
2022 Journal of Science and Technology on Information security  
We use the Bayesian network to analyze and quantify the cyber security risks posed by threats to the deployment components of a website.  ...  Next, the vulnerabilities or threats of each deployment component will be assessed according to the considered risk criteria in specific steps of a deployment process.  ...  University of Science and Technology.  ... 
doi:10.54654/isj.v14i2.209 fatcat:qbg6tj4dx5fzbfv4hc355xyl6y

Towards Secure Cloud Orchestration for Multi-Cloud Deployments

Nicolae Paladi, Antonis Michalas, Hai-Van Dang
2018 Proceedings of the 5th Workshop on CrossCloud Infrastructures & Platforms - CrossCloud'18  
We identify a set of attack scenarios, define security enforcement enablers and propose an architecture for a security-enabled cloud orchestration framework for multi-cloud application deployments.  ...  In this work, we analyze the security landscape of cloud orchestration frameworks for multicloud infrastructure.  ...  During infrastructure deployment, the PKI manager publishes the public keys of architecture components.  ... 
doi:10.1145/3195870.3195874 dblp:conf/eurosys/PaladiMD18 fatcat:qul32bkf4rfdnghqmnxyfzl5ga

Applying Unsupervised Machine Learning in Continuous Integration, Security and Deployment Pipeline Automation for Application Software System

2019 International journal of recent technology and engineering  
Deploying the components of the application in Production using Continuous Deployment, using this way, the new release of the application reaches the client faster.  ...  The goal of this study is to identify the benefits of adapting the Continuous Integration - Continuous Deployment in Application Software.  ...  Versioning System of Components Versioning System is a component as part of the deployment process.  ... 
doi:10.35940/ijrte.d7387.118419 fatcat:ryoqxj3pqnfixjb5ehcnwwkxji

Intrusion-Avoidance via System Diversity

Anatoliy Gorbenko, Vyacheslav Kharchenko, Olga Tarasyuk, Alexander Romanovsky
2012 Information & Security An International Journal  
This solution reduces the so-called system's days-of-risk which is a period of an increased security risk between the time when a vulnerability is publicly disclosed to the time when a patch is available  ...  To select the less vulnerable system configuration we propose metrics estimating security risks by accounting a number of not-fixed vulnerabilities and their severity.  ...  A typical computer system consists of hardware, operating system (OS) and the set of system software components playing the role of a deployment environment for the specific applications.  ... 
doi:10.11610/isij.2813 fatcat:7hfranobmndx7ftujurpfugli4

MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies [chapter]

Joaquin Garcia-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Stere Preda
2011 Lecture Notes in Computer Science  
We present the core functionality of MIRAGE, a management tool for the analysis and deployment of configuration policies over network security components, such as firewalls, intrusion detection systems  ...  network security component configurations.  ...  Acknowledgments -This work has been supported by a grant from the Brittany region of France and by the following projects: POLUX ANR-06-SETIN-012, SEC6 Project, TSI2007-65406-C03-03 E-AEGIS, and CONSOLIDER  ... 
doi:10.1007/978-3-642-19348-4_15 fatcat:kyaejlqjenfzjn6k4qy2dquxt4

Two Ways to Grid: The Contribution of Open Grid Services Architecture (OGSA) Mechanisms to Service-Centric and Resource-Centric Lifecycles

Paul Brebner, Wolfgang Emmerich
2006 Journal of Grid Computing  
The other supports end-user development, deployment, and resourcing of applications across organizations via the use of execution and resource management services: a Resource-centric (or "2 nd order")  ...  Service Oriented Architectures (SOAs) support service lifecycle tasks, including Development, Deployment, Discovery and Use.  ...  Acknowledgements Thanks to Len Bass for discussions which helped to refine our architectural analysis methodology, and to Ian Foster for feedback on the draft version of the technical  ... 
doi:10.1007/s10723-005-9008-2 fatcat:dd55drhryfemzdqtbwzklgcjiu

Cyclone: A Platform For Data Intensive Scientific Applications In Heterogeneous Multi-Cloud/Multi-Provider Environment

Yuri Demchenko, Miroslav Zikovich, Cess de Laat, Christophe Blanchet, Mohamed Bedri, Jean-François Gibrat, Oleg Lodygensky, Mathias Slawik, Ilke Zilci, Rob Branchat, Charles Loomis
2016 Zenodo  
to the CYCLONE infrastructure components.  ...  Special attention is given to the federated access control and security infrastructure that must provide consistent security and data protection for distributed bioinformatics data processing infrastructure  ...  Deployment of the use cases The deployment of the bioinformatics use cases was done in a progressive manner, starting with one VM integrating security features (UC1 Securing human biomedical data).  ... 
doi:10.5281/zenodo.59160 fatcat:dxjh7l6ih5cvbhe5aweq3b5wfu
« Previous Showing results 1 — 15 out of 182,281 results