Dependable Computing for National Security: A Position Paper
نویسنده
چکیده
This paper examines various security threats and then discusses the applications of dependable computing for national security. By a dependable computing system we mean a flexible system that enforces quality of service policies between security, real-time processing, integrity and fault tolerance. We also discuss infrastructures and business objects for counter-terrorism.
منابع مشابه
Dependable objects for databases, middleware and methodologies: a position paper
This position paper describes work that needs to be done to integrate features of security, fault tolerance, and real-time computing into object-oriented technology to produce Òdependable objects.Ó This dependable technology can be applied in the areas of database; middleware, including object-request brokers; and object-based design and analysis methodologies. The accomplishments to date of va...
متن کاملThe Research of Component-based Dependable Encapsulation
According to the component-based design and developing pattern, we present a plug-in architecture for the dependable component-based software. After that, the dependable encapsulation is put forwards, which mainly focuses on the component security and availability attributes. Finally, the developing and implementing method of security interceptor, high available load balancing and fault toleran...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملIdentity Providers-as-a-Service built as Cloud-of-Clouds: challenges and opportunities
In our previous work we designed and evaluated the feasibility of highly secure and dependable identity providers (IdPs) for the increasing requirements of future IT infrastructures. In this position paper we extend our previous work by analyzing and discussing the benefits of deploying highly secure and dependable identity providers-as-a-service (IdP-as-aService), without compromising the conf...
متن کامل