Results 101 to 110 of about 2,352,522 (144)
Some of the next articles are maybe not open access.

Security of Infrastructure Systems

2020
The security of infrastructure systems is increasingly associated and ties to ensuring a company's basic functional continuity. Increasing security and ultimately the resilience of infrastructure systems is significantly linked to the process of infrastructure security assessment.
Ladislav Mariš   +2 more
openaire   +1 more source

System-of-systems security engineering

Tenth Annual Computer Security Applications Conference, 2002
There is an increasing trend to treat a collection of individual systems that support a common mission as a single entity and to perform systems engineering activities for that entity. A security engineering process is proposed for systems-of-systems. This process addresses such issues as how to identify and mitigate risks resulting from connectivity ...
openaire   +1 more source

Securability for system of systems

International Journal of System of Systems Engineering, 2012
As the Department of Defense (DoD) pursues methods within the systems engineering process to combat potential information assurance (IA) vulnerabilities, a new paradigm is required. This paper introduces the concept of securability as a new ility to be considered within the systems life cycle. Alongside the traditional system ilities (i.e., reliability,
openaire   +1 more source

Secure composition of systems

[1992] Proceedings Eighth Annual Computer Security Application Conference, 2003
Composability properties of component systems are addressed. By means of analysis of external relations among components, security problems associated with composition of the components are investigated. To solve these problems, two security models are presented.
J.A. McDermid, Q. Shi
openaire   +1 more source

Systems of Systems with Security

Technical Report Electronics and Computer Engineering, 2013
In this report we present two case studies with Systems of Systems modelling. One model illustrates how Cryptographic parameter consistency can be checked using VDMPP for a System of Systems uses encryption to enforce Digital Right Management. The other model shows how a new formalism (CML) tailored specifically to Systems of Systems can express Multi ...
openaire   +1 more source

Protection Profile of Personal Information Security System: Designing a Secure Personal Information Security System

2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, 2011
As cyber-crimes using personal information such as ID theft are increasing, there is a need for appropriate technology or law to protect privacy. To this end, the Korean Government established the Privacy Act on March 29th 2011. The Privacy Act prescribes a specification for dealing with privacy with the intention to protect personal information from ...
Hyun-Jung Lee, Kwangwoo Lee, Dongho Won
openaire   +1 more source

Security of open systems

Computers & Security, 1989
As an enhancement to ISO's Open Systems Interconnection Reference Model, ECMA defines a security framework for distributed systems which is based on the concepts of security domains and security facilities. This paper describes a functional decomposition of the security of distributed systems, thus providing building blocks which can be specified and ...
openaire   +1 more source

SECURITY CONTROL OF SMALL LONGITUDINAL SYSTEMS

IFAC Proceedings Volumes, 1989
Abstract Small longitudinal power systems have particular difficulties to maintain sufficient level of security. The common problems are inadequate active power, transient stability and voltage instability. Due to economic incentives these problems are often solved by special control measures instead of adequate transmission systems.
K. Karnasuta   +2 more
openaire   +1 more source

Networking of secure systems

IEEE Journal on Selected Areas in Communications, 1989
The design and implementation aspects of network security facilities for interconnecting Unix-based secure systems such as Secure Xenix, and CMW, using the TCP/IP protocols for communication, are described. Session-based and non-session-based security facilities are proposed for achieving secure connectivity between secure systems.
openaire   +1 more source

Security metrics and synthesis of secure control systems

Automatica, 2020
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Murguia, C   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy