The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Building high assurance secure applications requires the proper use of security mechanisms and assurances provided by the underlying secure platform. However, applications are often built using security patterns and best practices that are agnostic with respect to the intricate specifics of the different underlying platforms. This independence from the underlying platform leaves a gap between security...
The research on network security architecture is a indispensable part in network security research. Layered Network Security Architecture (LNSA) is proposed in this paper. Firstly, LNSA is described with the concept of component. Then Stochastic Petri net is used for formal modeling of LNSA. Subsequently, the Stochastic High Lever Petri Nets is used to predigest the formal modeling and its corresponding...
This paper is concerned with correct specification and validation of quality attribute requirements (QAR's) that cross-cut through a diverse set of complex system functions. These requirements act as modifiers of the systems level functional requirements thereby having substantial influence on the eventual architectural selection. Because system designers traditionally address these requirements one...
Consistency and Traceability are the highest priority of the system architect in the world of high-assurance processing. Developing such a system requires the use of high assurance software and hardware working in a cohesive, well defined manner. To achieve and sustain high-assurance, the system must have the ability to continuously check and verify the proper hardware and software operation and execution...
A widespread design approach in distributed applications based on the service-oriented paradigm, such as Web-services, consists of clearly separating the enforcement of authorization policies and the workflow of the applications, so that the interplay between the policy level and the workflow level is abstracted away. While such an approach is attractive because it is quite simple and permits one...
Monitors have been used for real-time systems to ensure proper behavior; however, most approaches do not allow for the addition of relevant fields required to identify and react to security vulnerabilities. Contracts can provide a useful mechanism for identifying and tracking vulnerabilities. Currently, contracts have been proposed for reliability and formal verification; yet, their use in security...
The following topics are dealt with: complex computer systems engineering real-time systems; modeling and verification; safety and security; context awareness and ubiquitous computing; formal languages; and software architecture.
The following topics are dealt with: adaptive computing; architectures; design evolution; distributed systems design; embedded and real-time software systems; formal methods; model-based system design; modeling and analysis of complex systems; product-family models and architectures; reliability, safety, dependability, and security; system on a chip; system assessment, testing, and metrics; verification...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.