261,005 Hits in 5.1 sec

Security architecture for component-based operating systems

Trent Jaeger, Jochen Liedtke, Vsevolod Panteleenko, Yoonho Park, Nayeem Islam
1998 Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications - EW 8  
There are two major issues in the development of a security architecture for a component-based system: (1) that the architecture can enable the enforcement of effective security policies and (2) that the  ...  The OSKit is a component-based operating system environment [5] .  ... 
doi:10.1145/319195.319229 dblp:conf/sigopsE/JaegerLPPI98 fatcat:niuhkexppzbfnhubperedtugzq

Intrusion-Avoidance via System Diversity

Anatoliy Gorbenko, Vyacheslav Kharchenko, Olga Tarasyuk, Alexander Romanovsky
2012 Information & Security An International Journal  
The paper discusses a generic intrusion-avoidance architecture allowing the system architects to decrease the risk of intrusions.  ...  The architecture employs software diversity at various system levels and dynamically reconfigures the deployment environment to avoid intrusions.  ...  Typical examples of system software components for web services are operating system (OS), web and application servers (AS and WS), and data base management systems (DBMS).  ... 
doi:10.11610/isij.2813 fatcat:7hfranobmndx7ftujurpfugli4

Analysis and Evaluating Security of Component-Based Software Development: A Security Metrics Framework

Irshad Ahmad Mir, S.M.K Quadri
2012 International Journal of Computer Network and Information Security  
Evaluating the security of software systems is a complex problem for the research communities due to the multifaceted and complex operational environment of the system involved.  ...  Our emphasis is on CBD and we have proposed a framework for the security evaluation of Component based software design and derived the security metrics for the main three pillars of security, confidentiality  ...  Finally we have proposed a framework for the security evaluation of component based software based on component dependencies and information flow and derived the security metrics for the fundamental three  ... 
doi:10.5815/ijcnis.2012.11.03 fatcat:j4jahhm6vvchld4q22wb5q2dhy

Extended Software Architecture Based on Security Patterns

Dušan Savić, Dejan Simić, Siniša Vlajić
2010 Informatica  
In this paper we have proposed three-tiered software architecture. This software architecture extends application logic tier with security.  ...  We have implemented two important security issues: authentication and authorization processes. These processes are implemented through software patterns.  ...  Class SOperation presents a system operation and corresponds to a ProtectionDomain class of the ROLE-BASED ACCESS Fig. 9 . The sructure of a changed ROLE-BASED ACCESS CONTROL pattern.  ... 
doi:10.15388/informatica.2010.285 fatcat:dtawclhk5fgx7jkwfzqluj55oq

Models and Techniques for Ensuring Reliability, Safety, Availability and Security of Large Scale Distributed Systems [article]

Valentin Cristea, Ciprian Dobre, Florin Pop, Corina Stratan, Alexandru Costan, Catalin Leordeanu
2011 arXiv   pre-print
17th International Conference on Control Systems and Computer Science (CSCS 17), Bucharest, Romania, May 26-29, 2009. Vol. 1, pp. 401-406, ISSN: 2066-4451.  ...  the weak resilience of the operating systems, known for offering various security vulnerabilities.  ...  This component validates all attempts to access the system resources based on the input provided by the second component, the Security Policy.  ... 
arXiv:1106.5576v1 fatcat:mkxsi4ecqzgxzpodyj6ms24jom

Taming "Trusted Platforms" by Operating System Design [chapter]

Ahmad-Reza Sadeghi, Christian Stüble
2004 Lecture Notes in Computer Science  
We propose a new architecture for a trustworthy security platform that uses TCPA/Pd hardware features in conjunction with an open-source security kernel we have developed.  ...  Our security kernel provides backward-compatibility to the Linux operating system.  ...  for which the nexus acts as the operating system) against the conventional operating system.  ... 
doi:10.1007/978-3-540-24591-9_22 fatcat:h54dl5m5mbgnzik5w5kzvdeyze

On Using Blockchains for Beyond Visual Line of Sight (BVLOS) Drones Operation: An Architectural Study [article]

Tahina Ralitera, Agnes Lanusse, Önder Gürcan
2022 arXiv   pre-print
Based on this observation, the contribution of this paper is twofold: (1) a generic blockchain-based service architecture for on-chip compute platforms of drones, and (2) a concrete example realization  ...  However, most of the blockchain-based approaches focus on the network and the protocol aspects of drone systems. Few studies focus on the architectural level of on-chip compute platforms of drones.  ...  Block Diagram within the Overall System Architecture related data structures and operations.  ... 
arXiv:2201.07793v1 fatcat:p65wv7l3hna5hbgzqql7q6ibwi

An approach for modeling and analysis of security system architectures

Yi Deng, Jiacun Wang, J.J.P. Tsai, K. Beznosov
2003 IEEE Transactions on Knowledge and Data Engineering  
We present a methodology for modeling security system architecture and for verifying whether required security constraints are assured by the composition of the components.  ...  Security system architecture governs the composition of components in security systems and interactions between them.  ...  In this section, we introduce such a concrete method for security system architecture modeling and analysis based on the SAM model.  ... 
doi:10.1109/tkde.2003.1232267 fatcat:odpsugeiznhohbmcuifhpovtwq

Agent Paradigm for Adaptable Architecture

Amar Ramdane-Cherif, Nicole Levy, Francisca Losavio
2004 Journal of Object Technology  
Refine Instantiate style for problem Chose architectural style activity product Requirements Agent Data base Figure 1.  ...  AGENT PARADIGM FOR ADAPTABLE ARCHITECTURE 170 J OURNAL OF OBJECT TECHNOLOGY V OL. 3, NO. 8 Chose modeling technique Model Modeling technique Apply to problem Style System model Architectural style Architecture  ...  The architectural model of a system provides a high level description that enables compositional design and analysis of components-based systems.  ... 
doi:10.5381/jot.2004.3.8.a4 fatcat:tj5fycn66fbh7lsq474c2t5n5u

A Case Study of a Formalized Security Architecture

Achim D. Brucker, Burkhart Wolff
2003 Electronical Notes in Theoretical Computer Science  
The boxes represent the components of the system, internal boxes parts of their state, and the connectors represent operations components may engage in.  ...  Second we will describe the key concepts of the implementation architecture based on the security mechanism of the Unix file system. Both layers will be connected via a refinement.  ... 
doi:10.1016/s1571-0661(04)80807-7 fatcat:yi4j5q3sw5eqxf4h2ci6booozy

A method for designing secure solutions

J. J. Whitmore
2001 IBM Systems Journal  
functions within the several underlying component architectures found in computing systems, the difficulty in developing a comprehensive set of baseline requirements for security, and a lack of widely  ...  With the formalization of security evaluation criteria into an international standard known as Common Criteria, one of the barriers to a common approach for developing extensible IT security architectures  ...  A systematic approach for creating security architectures based on the Common Criteria requirements taxonomy and the corresponding security system model System model for security Eberhardt Rechtin 12  ... 
doi:10.1147/sj.403.0747 fatcat:xhtry6g7incubcahk7usaz6vcu

An adaptation framework enabling resource-efficient operation of software systems

André van Hoorn, Matthias Rohr, Asad Gul, Wilhelm Hasselbring
2009 Proceedings of the Warm Up Workshop for ACM/IEEE ICSE 2010 on - WUP '09  
the SLAs Approach Architecture-based runtime adaptation for resource-efficient operation Application Service Provider (ASP) Service Enterprise SLAs SLAs SLAs Corporate Service Clients  ...  An Adaptation Framework Enabling Resource-Efficient Operation of Software Systems April 2, 2009 3/ 11 Component Technology Availability Privacy Security Safety Performance Reliability Correctness  ... 
doi:10.1145/1527033.1527047 fatcat:j7wgwhmysvbuhg3hnsq2wyoawa

Dynamic NoC-based architecture for MPSoC security implementation

Johanna Sepulveda, Guy Gogniat, Ricardo Pires, Wang J. Chau, Marius J. Strum
2011 Proceedings of the 24th symposium on Integrated circuits and systems design - SBCCI '11  
As security requirements vary dramatically for different applications, the challenge is to provide MPSoC security that allows a trustworthy system that meets all the security requirements of such applications  ...  We integrate agile and dynamic security firewalls into the NoC in order to detect attacks based on different security rules.  ...  SECURITY ARCHITECTURE The goal of our work is to design a dynamic NoC-based architecture for the MPSoC protection. Our architecture is shown in Fig. 1 .  ... 
doi:10.1145/2020876.2020921 dblp:conf/sbcci/SepulvedaGPCS11 fatcat:oa2cmb6h25fehfg4ivd5yzvgoy

Using Diversity in Cloud-Based Deployment Environment to Avoid Intrusions [chapter]

Anatoliy Gorbenko, Vyacheslav Kharchenko, Olga Tarasyuk, Alexander Romanovsky
2011 Lecture Notes in Computer Science  
This paper puts forward a generic intrusion-avoidance architecture to be used for deploying web services on the cloud.  ...  The architecture, targeting the IaaS cloud providers, avoids intrusions by employing software diversity at various system levels and dynamically reconfiguring the cloud deployment environment.  ...  Typical examples of system components for web services are operating system (OS), web and application servers (AS and WS), and data base management systems (DBMS).  ... 
doi:10.1007/978-3-642-24124-6_14 fatcat:bwdje27icjgwffsiffpece22xe

Dynamic Reconfigurable Software Architecture [chapter]

Amar Ramdane-Cherif, Nicole Levy, Francisca Losavio
2002 IFIP Advances in Information and Communication Technology  
In addition, we adopt the B formal method to support design specifications for agent software architecture.  ...  architecture formally.  ...  The architectural model of a system provides a high level description that enables compositional design and analysis of components-based systems.  ... 
doi:10.1007/978-0-387-35607-5_5 fatcat:jpx2v6dsofcfxeflgqhvnby7kq
« Previous Showing results 1 — 15 out of 261,005 results