Dependable Computing for National Security: A Position Paper

نویسنده

  • Bhavani Thuraisingham
چکیده

This paper examines various security threats and then discusses the applications of dependable computing for national security. By a dependable computing system we mean a flexible system that enforces quality of service policies between security, real-time processing, integrity and fault tolerance. We also discuss infrastructures and business objects for counter-terrorism.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dependable objects for databases, middleware and methodologies: a position paper

This position paper describes work that needs to be done to integrate features of security, fault tolerance, and real-time computing into object-oriented technology to produce Òdependable objects.Ó This dependable technology can be applied in the areas of database; middleware, including object-request brokers; and object-based design and analysis methodologies. The accomplishments to date of va...

متن کامل

The Research of Component-based Dependable Encapsulation

According to the component-based design and developing pattern, we present a plug-in architecture for the dependable component-based software. After that, the dependable encapsulation is put forwards, which mainly focuses on the component security and availability attributes. Finally, the developing and implementing method of security interceptor, high available load balancing and fault toleran...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

Identity Providers-as-a-Service built as Cloud-of-Clouds: challenges and opportunities

In our previous work we designed and evaluated the feasibility of highly secure and dependable identity providers (IdPs) for the increasing requirements of future IT infrastructures. In this position paper we extend our previous work by analyzing and discussing the benefits of deploying highly secure and dependable identity providers-as-a-service (IdP-as-aService), without compromising the conf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001