Results 101 to 110 of about 2,352,522 (144)
Some of the next articles are maybe not open access.
Security of Infrastructure Systems
2020The security of infrastructure systems is increasingly associated and ties to ensuring a company's basic functional continuity. Increasing security and ultimately the resilience of infrastructure systems is significantly linked to the process of infrastructure security assessment.
Ladislav Mariš +2 more
openaire +1 more source
System-of-systems security engineering
Tenth Annual Computer Security Applications Conference, 2002There is an increasing trend to treat a collection of individual systems that support a common mission as a single entity and to perform systems engineering activities for that entity. A security engineering process is proposed for systems-of-systems. This process addresses such issues as how to identify and mitigate risks resulting from connectivity ...
openaire +1 more source
Securability for system of systems
International Journal of System of Systems Engineering, 2012As the Department of Defense (DoD) pursues methods within the systems engineering process to combat potential information assurance (IA) vulnerabilities, a new paradigm is required. This paper introduces the concept of securability as a new ility to be considered within the systems life cycle. Alongside the traditional system ilities (i.e., reliability,
openaire +1 more source
[1992] Proceedings Eighth Annual Computer Security Application Conference, 2003
Composability properties of component systems are addressed. By means of analysis of external relations among components, security problems associated with composition of the components are investigated. To solve these problems, two security models are presented.
J.A. McDermid, Q. Shi
openaire +1 more source
Composability properties of component systems are addressed. By means of analysis of external relations among components, security problems associated with composition of the components are investigated. To solve these problems, two security models are presented.
J.A. McDermid, Q. Shi
openaire +1 more source
Systems of Systems with Security
Technical Report Electronics and Computer Engineering, 2013In this report we present two case studies with Systems of Systems modelling. One model illustrates how Cryptographic parameter consistency can be checked using VDMPP for a System of Systems uses encryption to enforce Digital Right Management. The other model shows how a new formalism (CML) tailored specifically to Systems of Systems can express Multi ...
openaire +1 more source
2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, 2011
As cyber-crimes using personal information such as ID theft are increasing, there is a need for appropriate technology or law to protect privacy. To this end, the Korean Government established the Privacy Act on March 29th 2011. The Privacy Act prescribes a specification for dealing with privacy with the intention to protect personal information from ...
Hyun-Jung Lee, Kwangwoo Lee, Dongho Won
openaire +1 more source
As cyber-crimes using personal information such as ID theft are increasing, there is a need for appropriate technology or law to protect privacy. To this end, the Korean Government established the Privacy Act on March 29th 2011. The Privacy Act prescribes a specification for dealing with privacy with the intention to protect personal information from ...
Hyun-Jung Lee, Kwangwoo Lee, Dongho Won
openaire +1 more source
Computers & Security, 1989
As an enhancement to ISO's Open Systems Interconnection Reference Model, ECMA defines a security framework for distributed systems which is based on the concepts of security domains and security facilities. This paper describes a functional decomposition of the security of distributed systems, thus providing building blocks which can be specified and ...
openaire +1 more source
As an enhancement to ISO's Open Systems Interconnection Reference Model, ECMA defines a security framework for distributed systems which is based on the concepts of security domains and security facilities. This paper describes a functional decomposition of the security of distributed systems, thus providing building blocks which can be specified and ...
openaire +1 more source
SECURITY CONTROL OF SMALL LONGITUDINAL SYSTEMS
IFAC Proceedings Volumes, 1989Abstract Small longitudinal power systems have particular difficulties to maintain sufficient level of security. The common problems are inadequate active power, transient stability and voltage instability. Due to economic incentives these problems are often solved by special control measures instead of adequate transmission systems.
K. Karnasuta +2 more
openaire +1 more source
IEEE Journal on Selected Areas in Communications, 1989
The design and implementation aspects of network security facilities for interconnecting Unix-based secure systems such as Secure Xenix, and CMW, using the TCP/IP protocols for communication, are described. Session-based and non-session-based security facilities are proposed for achieving secure connectivity between secure systems.
openaire +1 more source
The design and implementation aspects of network security facilities for interconnecting Unix-based secure systems such as Secure Xenix, and CMW, using the TCP/IP protocols for communication, are described. Session-based and non-session-based security facilities are proposed for achieving secure connectivity between secure systems.
openaire +1 more source
Security metrics and synthesis of secure control systems
Automatica, 2020zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Murguia, C +3 more
openaire +3 more sources

