{"title":"通过自适应智能代理保护信息安全可用性","authors":"Robby Fussell","doi":"10.1109/MILCOM.2005.1606116","DOIUrl":null,"url":null,"abstract":"The information security model is composed of confidentiality, integrity, and availability. Availability is the area of information security that requires services and components to be continuously available for the user community. If a service or component is unavailable, confidentiality and integrity are meaningless. Network availability is the underlining component that must be existent in order for services to be accessible for end users. Developers have used redundancy to assist in ensuring that an application or network is available; however, this is a costly solution if many network components and services are involved.","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Protecting information security availability via self-adapting intelligent agents\",\"authors\":\"Robby Fussell\",\"doi\":\"10.1109/MILCOM.2005.1606116\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The information security model is composed of confidentiality, integrity, and availability. Availability is the area of information security that requires services and components to be continuously available for the user community. If a service or component is unavailable, confidentiality and integrity are meaningless. Network availability is the underlining component that must be existent in order for services to be accessible for end users. Developers have used redundancy to assist in ensuring that an application or network is available; however, this is a costly solution if many network components and services are involved.\",\"PeriodicalId\":223742,\"journal\":{\"name\":\"MILCOM 2005 - 2005 IEEE Military Communications Conference\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-10-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"MILCOM 2005 - 2005 IEEE Military Communications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MILCOM.2005.1606116\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 2005 - 2005 IEEE Military Communications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.2005.1606116","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Protecting information security availability via self-adapting intelligent agents
The information security model is composed of confidentiality, integrity, and availability. Availability is the area of information security that requires services and components to be continuously available for the user community. If a service or component is unavailable, confidentiality and integrity are meaningless. Network availability is the underlining component that must be existent in order for services to be accessible for end users. Developers have used redundancy to assist in ensuring that an application or network is available; however, this is a costly solution if many network components and services are involved.