Security in EAI
نویسنده
چکیده
منابع مشابه
A performance model of the Trusted Cloud Computing Platform VM Launch Protocol
The adoption of the cloud computing paradigm is associated with increasing security concerns. Cloud computing service models (SaaS, PaaS and IaaS) are exposed to different security threats in each level of services. The Trusted Cloud Computing Platform (TCCP) proposes a security model that protects customers VMs at the IaaS level. In this paper, we investigate methodologies for the specificatio...
متن کاملSecurity Issues in ProtoGENI
Network security consists of primary concerns in future Internet development due to the ever increasing threats to current Internet. ProtoGENI is a federated testbed facility supporting slice-based experiments to manage, utilize, and monitor the resources for innovative network research. Security research in ProtoGENI is crucial because experiments conducted in manipulated or corruptted test en...
متن کاملVulnerability Testing of Software System Using Fault Injection
We describe an approach for testing a software system for possible security flaws. Traditionally, security testing is done using penetration analysis and formal methods. Based on the observation that most security flaws are triggered due to a flawed interaction with the environment, we view the security testing problem as the problem of testing for the fault-tolerance properties of a software s...
متن کاملPreface to special issue on miscellaneous emerging security problems
An introduction to the key topics and challenges in Botnet, buffer overflow vulnerability, privacy-preserving and others.
متن کاملReviewing the book "Principles of Cyber-physical Systems" from a security perspective
This is a review of the book “Principles of Cyber-physical Systems” authored by Rajeev Alur and published by the MIT Press at 2015.
متن کاملLight-weight Key Management Scheme for Active RFID Applications
Due to low-cost and its practical solution, the integration of RFID tag to the sensor node called smart RFID has become prominent solution in various fields including industrial applications. Nevertheless, the constrained nature of smart RFID system introduces tremendous security and privacy problem. One of them is the problem in key management system. Indeed, it is not feasible to recall all R...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004