Development of Measurable Security for a Distributed Messaging System
نویسندگان
چکیده
Systematically developed security metrics make it possible to gather sufficient and credible security evidence for runtime adaptive security management and off-line security engineering and management. This study introduces and analyzes security metrics and parameter dependencies for one particular distributed messaging system. The focus is on the effectiveness and correctness of security-enforcing mechanisms. The security metrics development approach that the study utilizes is risk-driven, requirement-centric, and integrated with the development of Quality-of-Service metrics. In this approach, the security requirements are expressed in terms of lower-level measurable components by applying a decomposition approach. Security metrics are then developed based on the leaf components of the decomposition. The paper also analyzes the benefits and shortcomings of the metrics development approach and introduces a trust, confidence and trustworthiness calculation model for basic measurable components of the decomposition. Keywords-security metrics; security indicators; security strength; security requirements; messaging systems
منابع مشابه
Self-Healing and Secure Adaptive Messaging Middleware for Business-Critical Systems
Current business-critical systems have stringent requirements for the significant and measurable increase in the end-to-end intelligence, security, scalability, self-adaptation and resilience. Existing state-of-the-art messaging systems achieve arbitrary resilience by a brute-force approach. Selfhealing is either rudimentary or non-existent. In this study we present a self-healing and secure ad...
متن کاملSecurity of High-Performance Messaging Layers on Programmable Network Interface Architectures
This paper discusses security concerns introduced by high-performance messaging layers designed for distributed High Performance Computing (HPC) environments. In the recent past, computationally intensive scientific applications have begun to find high-speed Networks of Workstations (NOWs) as an economically attractive alternative to parallel computers. Conventional distributed systems have bee...
متن کاملP2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...
متن کاملDevelopment of Telemedicine System during the Outbreak of Epidemic Diseases using Virtual Social Networks
Introduction: The Covid-19 outbreak crisis in 2019 ushered in a new chapter in the development of virtual communication systems. Social networks can be considered one of the most successful tools in the field of information technology which always plays an important role in such situations. Availability, low cost, high reliability, popularity, and scalability are some of the key features of soc...
متن کاملDevelopment of Telemedicine System during the Outbreak of Epidemic Diseases using Virtual Social Networks
Introduction: The Covid-19 outbreak crisis in 2019 ushered in a new chapter in the development of virtual communication systems. Social networks can be considered one of the most successful tools in the field of information technology which always plays an important role in such situations. Availability, low cost, high reliability, popularity, and scalability are some of the key features of soc...
متن کامل