A cohesive framework to quantify computer systems assurance

نویسندگان

  • Dominique A. Heger
  • Phil A. Carinhas
چکیده

This study introduces a systems-engineering and evaluation methodology that focuses on the stability of an entire computing infrastructure. More specifically, the conducted research elaborates on the cohesive systems assurance (CSA) methodology, which encapsulates the concepts and methods of product assurance (reliability, availability, and maintainability), performance & scalability, and dependability (security and safety), respectively. The argument made in this study is that systems stability represents the quality of service provided by an entire computing infrastructure, and therefore quantifies the usefulness, trustworthiness, and effectiveness of the environment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key Factors for Defining the Conceptual Framework for Quality Assurance in E-Learning

E-learning has evolved for more than a decade, and universities are gradually embracing e-learning to provide more learning experience for their learners. E-learning is the use of electronic means through which training is received and obtained. E-learning offers a wide range of advantages (time and room mobility, cost-effectiveness, etc.) and also overcomes the limitations of digital learning ...

متن کامل

Design of a Novel Framework to Control Nonlinear Affine Systems Based on Fast Terminal Sliding-Mode Controller

In this paper, a novel approach for finite-time stabilization of uncertain affine systems is proposed. In the proposed approach, a fast terminal sliding mode (FTSM) controller is designed, based on the input-output feedback linearization of the nonlinear system with considering its internal dynamics. One of the main advantages of the proposed approach is that only the outputs and external state...

متن کامل

Public Participation: More than a Method?; Comment on “Harnessing the Potential to Quantify Public Preferences for Healthcare Priorities through Citizens’ Juries”

While it is important to support the development of methods for public participation, we argue that this should not be at the expense of a broader consideration of the role of public participation. We suggest that a rights based approach provides a framework for developing more meaningful approaches that move beyond public participation as synonymous with consultation to value the contribution ...

متن کامل

Users as the Biggest Threats to Security of Health Information Systems

There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...

متن کامل

Policy-Based Security for Wireless Components in High Assurance Computer Systems

To enable the growth of wireless networks in high assurance computer systems, it is essential to establish a security engineering methodology that provides system security managers with a procedural engineering process to develop computer security policies. Our research demonstrates how wireless communication technology is deployed using the Multiple Independent Levels of Security (MILS) archit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006