首页 > 最新文献

First International Conference on Availability, Reliability and Security (ARES'06)最新文献

英文 中文
Availability enforcement by obligations and aspects identification 通过义务和方面标识实现可用性
F. Cuppens, N. Cuppens-Boulahia, T. Ramard
Information systems are more and more victim of denial of service attacks. Thus, availability is a critical property which is more and more difficult to achieve. In this paper, we devise a new approach to design programs that enforce availability requirements. This approach is based on a formal security model called Nomad which combines deontic and temporal logics. We show how to use this model to specify availability requirements. Our proposal is then based on aspect programming. For this purpose, availability requirements expressed in the Nomad model are transformed into availability aspects. Using aspect programming languages such as AspectJ, we can then weave these availability aspects to transform an insecure program into a secure one.
信息系统越来越多地成为拒绝服务攻击的受害者。因此,可用性是一个越来越难以实现的关键属性。在本文中,我们设计了一种新的方法来设计执行可用性要求的程序。这种方法基于一种称为Nomad的正式安全模型,该模型结合了道义逻辑和时间逻辑。我们将展示如何使用该模型来指定可用性需求。我们的建议是基于方面编程的。为此,在Nomad模型中表达的可用性需求被转换为可用性方面。使用aspect编程语言(如AspectJ),我们可以编织这些可用性方面,将不安全的程序转换为安全的程序。
{"title":"Availability enforcement by obligations and aspects identification","authors":"F. Cuppens, N. Cuppens-Boulahia, T. Ramard","doi":"10.1109/ARES.2006.36","DOIUrl":"https://doi.org/10.1109/ARES.2006.36","url":null,"abstract":"Information systems are more and more victim of denial of service attacks. Thus, availability is a critical property which is more and more difficult to achieve. In this paper, we devise a new approach to design programs that enforce availability requirements. This approach is based on a formal security model called Nomad which combines deontic and temporal logics. We show how to use this model to specify availability requirements. Our proposal is then based on aspect programming. For this purpose, availability requirements expressed in the Nomad model are transformed into availability aspects. Using aspect programming languages such as AspectJ, we can then weave these availability aspects to transform an insecure program into a secure one.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115785010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
A study of security architectural patterns 安全体系结构模式的研究
D. Rosado, E. Fernández-Medina, M. Piattini, C. Gutiérrez
Security and reliability issues are rarely considered at the initial stages of software development and are not part of the standard procedures in development of software and services. Security patterns are a recent development as a way to encapsulate the accumulated knowledge about secure systems design, and security patterns are also intended to be used and understood by developers who are not security professionals. In this paper, we compare several security patterns to be used when dealing with application security, following an approach that we consider important for measuring the security degree of the patterns, and indicating a fulfilment or not of the properties and attributes common to all security systems.
在软件开发的初始阶段很少考虑安全性和可靠性问题,也不是软件和服务开发的标准程序的一部分。安全模式是最近发展起来的一种方法,用于封装有关安全系统设计的积累知识,并且安全模式也旨在供非安全专业人员的开发人员使用和理解。在本文中,我们比较了在处理应用程序安全性时要使用的几种安全模式,采用了一种我们认为对度量模式的安全程度很重要的方法,并指示是否实现了所有安全系统共有的属性和属性。
{"title":"A study of security architectural patterns","authors":"D. Rosado, E. Fernández-Medina, M. Piattini, C. Gutiérrez","doi":"10.1109/ARES.2006.18","DOIUrl":"https://doi.org/10.1109/ARES.2006.18","url":null,"abstract":"Security and reliability issues are rarely considered at the initial stages of software development and are not part of the standard procedures in development of software and services. Security patterns are a recent development as a way to encapsulate the accumulated knowledge about secure systems design, and security patterns are also intended to be used and understood by developers who are not security professionals. In this paper, we compare several security patterns to be used when dealing with application security, following an approach that we consider important for measuring the security degree of the patterns, and indicating a fulfilment or not of the properties and attributes common to all security systems.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132463864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Deriving ratings through social network structures 通过社会网络结构获得评级
Hameeda Alshabib, O. Rana, Ali Shaikh Ali
A review of existing approaches to recommendation in e-commerce systems is provided. A recommendation system is primarily used to identify services which may be of interest to a user based on a similarity in purchasing (or browsing) patterns with another user, or to filter services that have been returned as a result of a search. Existing systems primarily make use of collaborative filtering approaches or a semantic-annotation approach which tries to find similarity by matching on the definition of a service. However, such systems suffer from "sparseness" of ratings - as it is difficult to find enough ratings to help make a recommendation for a user. We therefore propose the use of a social network as the basis for defining how ratings can be aggregated, based on the structure of the network. We also suggest the use of product categories as the basis for aggregating ratings - and define this as a "context" in which a particular service is used. A model for a recommendation system that combines context-based rating with the structure of a social network has been suggested, along with an architecture for a system that implements the model.
对电子商务系统中现有的推荐方法进行了审查。推荐系统主要用于根据与另一个用户在购买(或浏览)模式上的相似性来识别用户可能感兴趣的服务,或者过滤作为搜索结果返回的服务。现有系统主要使用协同过滤方法或语义注释方法,通过匹配服务的定义来查找相似性。然而,这样的系统受制于评级的“稀疏性”——因为很难找到足够的评级来帮助用户进行推荐。因此,我们建议使用社交网络作为定义如何根据网络结构聚合评级的基础。我们还建议使用产品类别作为汇总评级的基础,并将其定义为使用特定服务的“上下文”。已经提出了一种将基于上下文的评级与社交网络结构相结合的推荐系统模型,以及实现该模型的系统体系结构。
{"title":"Deriving ratings through social network structures","authors":"Hameeda Alshabib, O. Rana, Ali Shaikh Ali","doi":"10.1109/ARES.2006.50","DOIUrl":"https://doi.org/10.1109/ARES.2006.50","url":null,"abstract":"A review of existing approaches to recommendation in e-commerce systems is provided. A recommendation system is primarily used to identify services which may be of interest to a user based on a similarity in purchasing (or browsing) patterns with another user, or to filter services that have been returned as a result of a search. Existing systems primarily make use of collaborative filtering approaches or a semantic-annotation approach which tries to find similarity by matching on the definition of a service. However, such systems suffer from \"sparseness\" of ratings - as it is difficult to find enough ratings to help make a recommendation for a user. We therefore propose the use of a social network as the basis for defining how ratings can be aggregated, based on the structure of the network. We also suggest the use of product categories as the basis for aggregating ratings - and define this as a \"context\" in which a particular service is used. A model for a recommendation system that combines context-based rating with the structure of a social network has been suggested, along with an architecture for a system that implements the model.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126713037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A comparison of the Common Criteria with proposals of information systems security requirements 通用准则与资讯系统保安要求建议的比较
D. Mellado, E. Fernández-Medina, M. Piattini
Nowadays, security solutions are focused mainly on providing security defences; instead of solving one of the main reasons for security problems that refers to appropriate information systems (IS) design. Fortunately there are several standards, like the Common Criteria, which help to deal with the security requirements along all the IS development cycle. In this paper a comparative analysis of eight different relevant technical proposals, which place great importance on the establishing of security requirements in the development of IS, is carried out. And they provide some significant contributions in aspects related to security. Nevertheless, they only satisfy partly the necessary criteria for the establishment of security requirements, with guarantees and integration in the development of IS. Thus we conclude that they are not specific enough for dealing with security requirements in the first stages of IS development in a systematic and intuitive way.
目前,安全解决方案主要集中在提供安全防御;而不是解决安全问题的主要原因之一是指适当的信息系统(IS)设计。幸运的是,有几个标准(如Common Criteria)可以帮助处理整个IS开发周期中的安全需求。本文对八种不同的相关技术方案进行了比较分析,这些方案在IS开发过程中非常重视安全需求的建立。它们在与安全相关的方面做出了重大贡献。然而,它们只是部分满足了建立安全需求的必要标准,在IS的发展中具有保障和集成。因此,我们得出的结论是,它们不足以以系统和直观的方式处理IS开发第一阶段的安全需求。
{"title":"A comparison of the Common Criteria with proposals of information systems security requirements","authors":"D. Mellado, E. Fernández-Medina, M. Piattini","doi":"10.1109/ARES.2006.2","DOIUrl":"https://doi.org/10.1109/ARES.2006.2","url":null,"abstract":"Nowadays, security solutions are focused mainly on providing security defences; instead of solving one of the main reasons for security problems that refers to appropriate information systems (IS) design. Fortunately there are several standards, like the Common Criteria, which help to deal with the security requirements along all the IS development cycle. In this paper a comparative analysis of eight different relevant technical proposals, which place great importance on the establishing of security requirements in the development of IS, is carried out. And they provide some significant contributions in aspects related to security. Nevertheless, they only satisfy partly the necessary criteria for the establishment of security requirements, with guarantees and integration in the development of IS. Thus we conclude that they are not specific enough for dealing with security requirements in the first stages of IS development in a systematic and intuitive way.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115633614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
An architecture for service discovery based on capability matching 一种基于功能匹配的服务发现体系结构
J. Mocnik, Piotr Karwaczynski
Discovery of service providers that are useful to service requesters is a common problem in large, dynamic service-oriented systems, such as Grids. Simple service indices do not address this problem adequately when the service requesters need to describe complex conditions to be met by the service providers. Furthermore, the problem of sharing services among multiple service providers in order to enable the system to serve as many independent requesters as possible while still meeting their conditions is not addressed by such systems. This paper presents an architecture of a service discovery system for Grids, that allows dynamic registration of services and their provided capabilities. Discovery is based on matching of requested and provided capabilities. The matching process enables trading the degree of satisfaction of requested capabilities for availability of the system to multiple requesters. The discovery service seamlessly integrates with existing Grid infrastructure and specifications.
发现对服务请求者有用的服务提供者是大型、动态的面向服务的系统(如grid)中的一个常见问题。当服务请求者需要描述服务提供者要满足的复杂条件时,简单的服务索引不能充分解决这个问题。此外,在多个服务提供者之间共享服务,以使系统能够为尽可能多的独立请求者提供服务,同时仍然满足他们的条件,这种系统没有解决这个问题。本文提出了一种网格服务发现系统的体系结构,该体系结构允许动态注册服务及其提供的功能。发现基于请求和提供的功能的匹配。匹配过程支持将所请求功能的满足程度与系统对多个请求者的可用性进行交换。发现服务与现有的网格基础设施和规范无缝集成。
{"title":"An architecture for service discovery based on capability matching","authors":"J. Mocnik, Piotr Karwaczynski","doi":"10.1109/ARES.2006.25","DOIUrl":"https://doi.org/10.1109/ARES.2006.25","url":null,"abstract":"Discovery of service providers that are useful to service requesters is a common problem in large, dynamic service-oriented systems, such as Grids. Simple service indices do not address this problem adequately when the service requesters need to describe complex conditions to be met by the service providers. Furthermore, the problem of sharing services among multiple service providers in order to enable the system to serve as many independent requesters as possible while still meeting their conditions is not addressed by such systems. This paper presents an architecture of a service discovery system for Grids, that allows dynamic registration of services and their provided capabilities. Discovery is based on matching of requested and provided capabilities. The matching process enables trading the degree of satisfaction of requested capabilities for availability of the system to multiple requesters. The discovery service seamlessly integrates with existing Grid infrastructure and specifications.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126234604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quality of password management policy 密码管理策略的质量
Carlos Villarrubia, E. Fernández-Medina, M. Piattini
The use of passwords is the most common method to carry out the authentication of users in information systems. For this reason, quality in the password management is a need to reach reasonable levels in the typical objectives of security. In this paper, we propose a set of metrics of password policies based on the most outstanding factors in this authentication mechanism. Together with the metrics, we propose a quality indicator derived from these metrics that allows us to have a global vision of the quality of the password management policy used. Finally, we indicate the future works to be performed to check the validity and usefulness of the proposed metrics.
在信息系统中,使用密码进行用户认证是最常用的方法。因此,质量在密码管理中是一个需要达到合理安全水平的典型目标。在本文中,我们根据该认证机制中最突出的因素提出了一组密码策略度量。与这些指标一起,我们提出了从这些指标派生的质量指标,使我们能够全面了解所使用的密码管理策略的质量。最后,我们指出了未来要执行的工作,以检查所提议的度量的有效性和有用性。
{"title":"Quality of password management policy","authors":"Carlos Villarrubia, E. Fernández-Medina, M. Piattini","doi":"10.1109/ARES.2006.102","DOIUrl":"https://doi.org/10.1109/ARES.2006.102","url":null,"abstract":"The use of passwords is the most common method to carry out the authentication of users in information systems. For this reason, quality in the password management is a need to reach reasonable levels in the typical objectives of security. In this paper, we propose a set of metrics of password policies based on the most outstanding factors in this authentication mechanism. Together with the metrics, we propose a quality indicator derived from these metrics that allows us to have a global vision of the quality of the password management policy used. Finally, we indicate the future works to be performed to check the validity and usefulness of the proposed metrics.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114722771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Achieving availability and reliability in wireless sensor networks applications 实现无线传感器网络应用的可用性和可靠性
Amirhosein Taherkordi, Majid Alkaee Taleghan, M. Sharifi
Recently, the use of wireless sensor networks has spread to applications areas that are not viable or cost-efficient to be run on other types of networks. The majority of these applications should be run continuously and reliably without interruption. Hence, the two significant quality factors that should be nowadays taken into account in developing wireless sensor networks applications are 'availability' and 'reliability' of application services. The specific characteristics and constraints of wireless sensor networks require a different interpretation of these two factors when developing applications for such networks. In this paper, we propose a middleware layer mechanism for satisfying these two factors. We propose an event-based middleware service that is specifically designed for wireless sensor networks in which a group of sensor nodes forms a cluster and a replicated service is run on each cluster head. The communication model among cluster members and cluster head is based on the publish/subscribe scheme. We show how the replicated services and communication model in cluster nodes increases the availability and reliability of applications running under the proposed middleware.
最近,无线传感器网络的使用已经扩展到在其他类型的网络上运行不可行或成本效益不高的应用领域。这些应用程序中的大多数应该连续可靠地运行,而不会中断。因此,现在在开发无线传感器网络应用时应该考虑的两个重要质量因素是应用服务的“可用性”和“可靠性”。在为无线传感器网络开发应用程序时,无线传感器网络的具体特征和限制要求对这两个因素进行不同的解释。在本文中,我们提出了一种中间件层机制来满足这两个因素。我们提出了一种基于事件的中间件服务,该服务是专门为无线传感器网络设计的,其中一组传感器节点形成一个集群,并且在每个集群头上运行一个复制服务。集群成员和集群头之间的通信模型基于发布/订阅模式。我们将展示集群节点中的复制服务和通信模型如何提高在提议的中间件下运行的应用程序的可用性和可靠性。
{"title":"Achieving availability and reliability in wireless sensor networks applications","authors":"Amirhosein Taherkordi, Majid Alkaee Taleghan, M. Sharifi","doi":"10.1109/ARES.2006.21","DOIUrl":"https://doi.org/10.1109/ARES.2006.21","url":null,"abstract":"Recently, the use of wireless sensor networks has spread to applications areas that are not viable or cost-efficient to be run on other types of networks. The majority of these applications should be run continuously and reliably without interruption. Hence, the two significant quality factors that should be nowadays taken into account in developing wireless sensor networks applications are 'availability' and 'reliability' of application services. The specific characteristics and constraints of wireless sensor networks require a different interpretation of these two factors when developing applications for such networks. In this paper, we propose a middleware layer mechanism for satisfying these two factors. We propose an event-based middleware service that is specifically designed for wireless sensor networks in which a group of sensor nodes forms a cluster and a replicated service is run on each cluster head. The communication model among cluster members and cluster head is based on the publish/subscribe scheme. We show how the replicated services and communication model in cluster nodes increases the availability and reliability of applications running under the proposed middleware.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124230283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Building an encrypted file system on the EGEE grid: application to protein sequence analysis 在EGEE网格上建立加密文件系统:在蛋白质序列分析中的应用
Christophe Blanchet, Rémi Mollon, G. Deléage
Bioinformatics needs high-throughput computing and huge data storage to understand datasets such as ones produced by complete genome projects. But these data are linked to patients, and used in scientific or industrial processes such as drug design and gene function identification. These use cases need to have a certain level of confidentiality and integrity to preserve the patient privacy or the patent secret. Obviously important in a local computing context such as supercomputer or cluster, these requirements are exarcebated in the context of a grid such EGEE, where the computing and storage resources are distributed across a worldwide platform. We have developed the EncFile encrypted files management system, deployed on the production platform of the EGEE project, and associated to encrypted representative biological resources. Thus we provided grid users with a user-friendly component that doesn't require any user privileges. Moreover, our EncFile system can be also deployed on other distributed systems as it is not linked to the EGEE grid components.
生物信息学需要高通量计算和巨大的数据存储来理解数据集,如全基因组计划产生的数据集。但这些数据与患者有关,并用于药物设计和基因功能鉴定等科学或工业过程。这些用例需要具有一定程度的机密性和完整性,以保护患者隐私或专利秘密。在诸如超级计算机或集群之类的本地计算上下文中,这些需求显然很重要,这些需求在诸如EGEE这样的网格上下文中得到了阐述,其中计算和存储资源分布在全球平台上。我们开发了EncFile加密文件管理系统,部署在EGEE项目的生产平台上,关联加密代表性生物资源。因此,我们为网格用户提供了一个不需要任何用户权限的用户友好组件。此外,我们的EncFile系统也可以部署在其他分布式系统上,因为它没有链接到EGEE网格组件。
{"title":"Building an encrypted file system on the EGEE grid: application to protein sequence analysis","authors":"Christophe Blanchet, Rémi Mollon, G. Deléage","doi":"10.1109/ARES.2006.39","DOIUrl":"https://doi.org/10.1109/ARES.2006.39","url":null,"abstract":"Bioinformatics needs high-throughput computing and huge data storage to understand datasets such as ones produced by complete genome projects. But these data are linked to patients, and used in scientific or industrial processes such as drug design and gene function identification. These use cases need to have a certain level of confidentiality and integrity to preserve the patient privacy or the patent secret. Obviously important in a local computing context such as supercomputer or cluster, these requirements are exarcebated in the context of a grid such EGEE, where the computing and storage resources are distributed across a worldwide platform. We have developed the EncFile encrypted files management system, deployed on the production platform of the EGEE project, and associated to encrypted representative biological resources. Thus we provided grid users with a user-friendly component that doesn't require any user privileges. Moreover, our EncFile system can be also deployed on other distributed systems as it is not linked to the EGEE grid components.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114960476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Modeling the reliability of search and rescue operations within the UK through Bayesian belief networks 通过贝叶斯信念网络模拟英国境内搜索和救援行动的可靠性
A. Russell, J. Quigley, R. Meer
This paper uses a Bayesian belief networks (BBN) methodology to assess the reliability of search and rescue (SAR) operations within the UK coastguard (maritime rescue) coordination centers. This is an extension of earlier work, which investigated the rationale of the government's decision to close a number of coordination centers. The previous study made use of secondary data sources and employed a binary logistic regression methodology to support the analysis. This study focused on the collection of primary data through a structured elicitation process, which resulted in the construction of a BBN. The main findings of the study are that approaches such as logistic regression are complementary to BBN's. The former provided a more objective assessment of associations between variables but was restricted in the level of detail that could be explicitly expressed within the model due to lack of available data. The latter method provided a much more detailed model but the validity of the numeric assessments was more questionable. Each method can be used to inform and defend the development of the other. The paper describes in detail the elicitation process employed to construct the BBN and reflects on the potential for bias.
本文使用贝叶斯信念网络(BBN)方法来评估英国海岸警卫队(海上救援)协调中心内搜救(SAR)行动的可靠性。这是早期工作的延伸,早期工作调查了政府决定关闭一些协调中心的理由。先前的研究使用二手数据来源,并采用二元逻辑回归方法来支持分析。本研究的重点是通过结构化的启发过程收集原始数据,从而构建BBN。该研究的主要发现是,逻辑回归等方法是BBN的补充。前者对变量之间的关联提供了更客观的评估,但由于缺乏可用数据,可以在模型内明确表达的详细程度受到限制。后一种方法提供了一个更详细的模型,但数值评估的有效性更值得怀疑。每一种方法都可以用来为另一种方法的发展提供信息和保护。本文详细描述了用于构建BBN的激发过程,并反映了潜在的偏差。
{"title":"Modeling the reliability of search and rescue operations within the UK through Bayesian belief networks","authors":"A. Russell, J. Quigley, R. Meer","doi":"10.1109/ARES.2006.85","DOIUrl":"https://doi.org/10.1109/ARES.2006.85","url":null,"abstract":"This paper uses a Bayesian belief networks (BBN) methodology to assess the reliability of search and rescue (SAR) operations within the UK coastguard (maritime rescue) coordination centers. This is an extension of earlier work, which investigated the rationale of the government's decision to close a number of coordination centers. The previous study made use of secondary data sources and employed a binary logistic regression methodology to support the analysis. This study focused on the collection of primary data through a structured elicitation process, which resulted in the construction of a BBN. The main findings of the study are that approaches such as logistic regression are complementary to BBN's. The former provided a more objective assessment of associations between variables but was restricted in the level of detail that could be explicitly expressed within the model due to lack of available data. The latter method provided a much more detailed model but the validity of the numeric assessments was more questionable. Each method can be used to inform and defend the development of the other. The paper describes in detail the elicitation process employed to construct the BBN and reflects on the potential for bias.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"1 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123417262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Schedulability driven security optimization in real-time systems 实时系统中可调度性驱动的安全性优化
Man Lin, L. Yang
This paper presents EDF schedulability driven security optimization in real-time systems. An increasing number of real-time applications like aircraft control and medical electronics systems require high quality of security to assure confidentiality and integrity of information. However, security requirements were not adequately considered in most existing real-time systems. We propose a group based security service model for real-time systems where the services are partitioned into groups. Services in the same security group provide the same type of security service but of different quality due to the different mechanism used. Service from different groups can be combined to achieve better security. The overhead model of the security services is also described. We consider EDF scheduling policy and develop a security aware EDF schedulability test. Two approaches: integer linear programming technique and an efficient heuristic search technique are proposed to select the best combination of security services for real-time systems while guaranteeing their schedulability.
提出了实时系统中EDF可调度性驱动的安全优化方法。越来越多的实时应用,如飞机控制和医疗电子系统,需要高质量的安全,以确保信息的保密性和完整性。然而,在大多数现有的实时系统中,安全需求没有得到充分考虑。我们提出了一种基于组的实时系统安全服务模型,其中服务被划分为组。同一安全组中的服务提供相同类型的安全服务,但由于使用的机制不同,服务的质量也不同。不同组的服务可以组合在一起,实现更好的安全性。还描述了安全服务的开销模型。我们考虑了EDF调度策略,并开发了一个安全的EDF可调度性测试。在保证实时系统可调度性的同时,提出了整数线性规划技术和高效启发式搜索技术两种方法来选择实时系统安全服务的最佳组合。
{"title":"Schedulability driven security optimization in real-time systems","authors":"Man Lin, L. Yang","doi":"10.1109/ARES.2006.117","DOIUrl":"https://doi.org/10.1109/ARES.2006.117","url":null,"abstract":"This paper presents EDF schedulability driven security optimization in real-time systems. An increasing number of real-time applications like aircraft control and medical electronics systems require high quality of security to assure confidentiality and integrity of information. However, security requirements were not adequately considered in most existing real-time systems. We propose a group based security service model for real-time systems where the services are partitioned into groups. Services in the same security group provide the same type of security service but of different quality due to the different mechanism used. Service from different groups can be combined to achieve better security. The overhead model of the security services is also described. We consider EDF scheduling policy and develop a security aware EDF schedulability test. Two approaches: integer linear programming technique and an efficient heuristic search technique are proposed to select the best combination of security services for real-time systems while guaranteeing their schedulability.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122468386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
First International Conference on Availability, Reliability and Security (ARES'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1