منابع مشابه
Secure Software Architectures
The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which the various representations of the architecture of a software system are described formally and the desired security properties of the system are proven to hold at the architectural level. The main ideas are illustrat...
متن کاملDesigning Secure Integration Architectures
Security has become a paramount concern due to dramatic advances of network technologies and a wide variety of new business opportunities. These advances have also brought the need for integration of computers systems to the surface, mainly for real-time, information sharing. As these systems are network-based, COTS products are predominantly used in these types of integration efforts. Since se...
متن کاملSecure Software Architectures
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clients and servers). This code is often particular to the application and the context in which the application is used. Embedding protection definitions in the application code makes it difficult to reuse because differen...
متن کاملArchitectures and Formal Representations for Secure Systems Architectures and Formal Representations for Secure Systems Executive Summary
As used in this report, the term formal methods encompasses mathematical and logical techniques for representing and analyzing computer systems, with the intent of increasing (1) the rigor with which a system can be deened, (2) the security and reliability that can be attained by system design and implementation, and (3) the dependability with which the requirements can be met. This report cons...
متن کاملSecure Biometrics: Concepts, Authentication Architectures & Challenges
BIOMETRICS are an important and widely used class of methods for identity verification and access control. Biometrics are attractive because they are inherent properties of an individual. They need not be remembered like passwords, and are not easily lost or forged like identifying documents. At the same time, biometrics are fundamentally noisy and irreplaceable. There are always slight variati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Micro
سال: 2019
ISSN: 0272-1732,1937-4143
DOI: 10.1109/mm.2019.2924711