Filters








3,306 Hits in 8.9 sec

Modeling and performance analysis for security aspects

Lirong Dai, Kendra Cooper
2006 Science of Computer Programming  
This paper uses the Domain Name System (DNS) [21] and a security aspect, data origin authentication aspect, to illustrate the FDAF approach.  ...  The aspect definition of the data origin authentication, weaving the aspect into the DNS architecture design, and the aspect analysis in Rapide are presented.  ...  Inputs are entities used by the stakeholders, including a system design documented in the UML and a requirement specification that includes the system's functional and non-functional requirements, and  ... 
doi:10.1016/j.scico.2005.11.006 fatcat:6aldynrc4jfntnsxnow7j7o2la

Decoupling Security Concerns in Web Services Using Aspects

G.K. Mostefaoui, Z. Maamar, N.C. Narendra, S. Sattanathan
2006 Third International Conference on Information Technology: New Generations (ITNG'06)  
Examples of this customization concern cryptographic protocol for a specific situation and timeout for user credentials. The AoF4WS uses aspect-oriented programming and frames.  ...  Flexible security schemes are needed in many Web services applications where authentication, authorization, etc., can no longer be used in their current form.  ...  ., non-IBM), product and service names may be trademarks or service marks of others.  ... 
doi:10.1109/itng.2006.47 dblp:conf/itng/MostefaouiMNS06 fatcat:j6e5lfoyu5fc5cnmwo7g7hi6ba

Using VCL as an Aspect-Oriented Approach to Requirements Modelling [chapter]

Nuno Amálio, Pierre Kelsen, Qin Ma, Christian Glodt
2010 Lecture Notes in Computer Science  
The case study's modelling solution has a clear and well-defined modular structure; the backbone of this structure is a collection of packages encapsulating local solutions to concerns.  ...  By tackling the modularisation of crosscutting concerns, aspect orientation draws attention to modularity as a means to address the problems of scalability, complexity and evolution in software systems  ...  Build use case models. Main functional units (features) coming from architectural model are refined into UML use cases. 3. Derive system operations.  ... 
doi:10.1007/978-3-642-16086-8_5 fatcat:f2d4ikhbybfp3kkcreyt3d4mma

Run-Time and Atomic Weaving of Distributed Aspects [chapter]

Eddy Truyen, Wouter Joosen
2006 Lecture Notes in Computer Science  
This paper presents a model and an architecture for middleware, named Lasagne, that supports run-time weaving of distributed aspects in an atomic way.  ...  Adding support for atomic weaving ensures that such system-wide adaptations are performed in a safe and coordinated way.  ...  This work has been supported by the Institute for the promotion of innovation by science and technology in Flanders.(IWT).  ... 
doi:10.1007/11922827_6 fatcat:palhhhz6uraphdpca5axjayynm

Aspect-Oriented Development Method for Non-Functional Characteristics of Cyber Physical Systems Based on MDA Approach

Lichen Zhang
2012 Journal of Software  
OCL formal language is used to restrict the model in every stages of MDA, and the real-time extension of OCL formal language is made to describe the timing constraints of cyber physical systems.  ...  Cyber physical systems have many non-functional requirements, which always crosscut the whole system modules.  ...  run-time failures in real-time, and authentication and authorization strategies are modeled at a higher level of abstraction.  ... 
doi:10.4304/jsw.7.3.608-619 fatcat:u7tsi5jpnfb37pn5xc5simd5mm

The RFId Technology for Monitoring the Supply Chain and for Fighting against Counterfeiting: A Fashion Company Case Study [chapter]

Erica Varese, Anna Claudia Pellicelli
2019 Fashion Industry [Working Title]  
The purpose of this chapter, after a brief literature review, is to analyse how the RFId technologies applied by an Italian fashion firm, Oscalito, contribute to monitoring the supply chain and are a useful  ...  According to Regulation (EU) No / on textile fibre names and related labelling and marking of the fibre composition of textile products, consumer protection requires transparent and consistent trade rules  ...  Acknowledgements The authors would like to thank the editor and the anonymous referees for their comments and helpful suggestions and Dr.  ... 
doi:10.5772/intechopen.86344 fatcat:gev5r6qb2jff7gh2t3fha7whm4

Secure OpenID Authentication Model by Using Trusted Computing

E. Ghazizadeh, Z. S. Shams Dolatabadi, R. Khaleghparast, M. Zamani, A. A. Manaf, M. S. Abdullah
2014 Abstract and Applied Analysis  
The growth of Internet online services has been very quick in recent years. Each online service requires Internet users to create a new account to use the service.  ...  Single sign-on (SSO) and OpenID have been used to decrease the complexity of managing numerous accounts required in the Internet identity environment.  ...  Our proposed model requires integrity of the trusted device for each authentication, regardless of cookies.  ... 
doi:10.1155/2014/561487 fatcat:nfjo732xdvfq5fe3lwb2drob2y

SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning [article]

Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha
2021 arXiv   pre-print
Cyber-physical systems (CPS) and Internet-of-Things (IoT) devices are increasingly being deployed across multiple functionalities, ranging from healthcare devices and wearables to critical infrastructures  ...  The ML methodology achieves an accuracy of 97.4% and enables us to predict these attacks efficiently with an 87.2% reduction in the search space.  ...  Each attack is now transformed into a CDFG with system-level operations as its basic blocks. The methodology of decomposing an attack into a CDFG is similar to the method used in [51] .  ... 
arXiv:2101.02780v1 fatcat:6mqftspb7nbijbaupom3ernoqa

Composing Non-functional Concerns in Web Services

Benjamin Schmeling, Anis Charfi, Rainer Thome, Mira Mezini
2011 2011 IEEE Ninth European Conference on Web Services  
The latter, however, requires a well-defined ordering of the consumption of the non-functional components.  ...  This allows the realization of systems consisting of loosely coupled and platform-independent services.  ...  This can be modeled as an interdependency of type requires from Authorize to Authenticate and an interdependency of type precedes from Authenticate to Authorize.  ... 
doi:10.1109/ecows.2011.25 dblp:conf/ecows/SchmelingCTM11 fatcat:bdme2x3d75c47gq6eqv2p5r4mu

A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices

Miao Yu, Jianwei Zhuge, Ming Cao, Zhiwei Shi, Lin Jiang
2020 Future Internet  
With the prosperity of the Internet of Things (IoT) industry environment, the variety and quantity of IoT devices have grown rapidly.  ...  Finally, we forecast and discuss the research directions on vulnerability analysis techniques of IoT devices.  ...  and IoT have emerged and integrated, promoting society into the era of AIoT (AI + IoT).  ... 
doi:10.3390/fi12020027 fatcat:rbg5eyfvj5h7lezzzyiyhjrpci

Towards Improving the Usability and Security of Web Single Sign-On Systems

San-Tsai Sun
2013 Zenodo  
Second, we performed a systematic analysis of the OpenID 2.0 protocol using both formal model checking and an empirical evaluation of 132 popular RP websites.  ...  However, the average users' perceptions of web SSO and the systems' security guarantees are still poorly understood.  ...  A user enters her existing user name/password on the web into a browser; and with the user's consent, that authenticated identity automatically flows into all websites that require an authenticated identity  ... 
doi:10.5281/zenodo.3264671 fatcat:iorqjr7rmnevfp2opa7uvv3qpq

An Integrated Study on the Fading Mechanism of Malachite Green Industrial Dye for the Marquisette Curtain in the Studio of Cleansing Fragrance, the Palace Museum (Beijing)

Le Wei, An Gu, Zhimou Guo, Junjie Ding, Gaowa Jin, Yong Lei
2022 Molecules  
The types of weave, fiber, and adhesive used to fix the curtain to the wooden frame were identified through microscopic observation and infrared spectroscopy.  ...  Historical marquisette curtains were composed of lightweight fabrics, woven in an open-mesh and leno-type weave, usually made of silk, and found in Qing imperial buildings.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/molecules27144411 pmid:35889285 pmcid:PMC9322362 fatcat:ipdctf6wrjgtjnavu4dhh6rgyu

Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies

Terence K.L. Hui, R. Simon Sherratt, Daniel Díaz Sánchez
2017 Future generations computer systems  
From the result of a recent research survey on SH and IoT technologies, this paper defines the major requirements for building SH.  ...  Seven unique requirement recommendations are defined and classified according to the specific quality of the SH building blocks.  ...  A list of requirements for a secured systems was revealed: Confidentiality, Integrity, Freshness, Availability and Authenticity.  ... 
doi:10.1016/j.future.2016.10.026 fatcat:pyoiacst75hsxj7te3h2ucrq2q

Mutable Form and Materiality: Toward a Critical History of New Tapestry Networks

Jessica Gerschultz
2016 ARTMargins  
Here, a comparison of three artists, A R T I C L E g e r s c h u lt z | m u t a b l e f o r m a n d m a t e r i a l i t y  ...  Because much fi ber art production emerged from countries with authoritarian regimes and state-run cultural institutions, a critical history should examine the mutability of the medium as fundamental to  ...  Each artist used the high-warp loom to construct three-dimensional textiles and manipulate perceptions that weaving was an authentic art of the people.  ... 
doi:10.1162/artm_a_00130 fatcat:elos3p6geveddnas5pryyydlgi

Middleware-based distributed systems software process

Liu Jingyong, Zhong Yong, Chen Yong, Zhang Lichen
2009 Proceedings of the 2009 International Conference on Hybrid Information Technology - ICHIT '09  
It also extracts three essential non-functional requirements of middleware and proposes a middleware-based distributed systems software process.  ...  DRE systems intuitively, and model transformations, to automate the mapping of domain-specific QoS requirements to middleware-specific QoS configuration options.  ...  various runtime failures in real-time, and authentication and authorization strategies are modeled at a higher level of abstraction.  ... 
doi:10.1145/1644993.1645058 dblp:conf/ichit/JingyongYYL09 fatcat:s5mjh6rotfdq3gdunitkwnf2ge
« Previous Showing results 1 — 15 out of 3,306 results