{"title":"自适应安全消息中间件的创新与进展","authors":"R. Savola, H. Abie, J. Bigham, D. Rotondi","doi":"10.1109/ICDCSW.2010.70","DOIUrl":null,"url":null,"abstract":"Increasing requirements for the resilience, security, adaptation, intelligence and scalability of complex business critical systems have set new challenges for system developers and application designers. Messaging infrastructures are often used to implement systems of this type. We provide an overview of the main advances in the adaptive security, security metrics, vulnerability discovery, anomaly detection and authentication solutions of the GEMOM (Genetic Message Oriented Secure Middleware) research project and discuss exploitation possibilities.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Innovations and Advances in Adaptive Secure Message Oriented Middleware\",\"authors\":\"R. Savola, H. Abie, J. Bigham, D. Rotondi\",\"doi\":\"10.1109/ICDCSW.2010.70\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Increasing requirements for the resilience, security, adaptation, intelligence and scalability of complex business critical systems have set new challenges for system developers and application designers. Messaging infrastructures are often used to implement systems of this type. We provide an overview of the main advances in the adaptive security, security metrics, vulnerability discovery, anomaly detection and authentication solutions of the GEMOM (Genetic Message Oriented Secure Middleware) research project and discuss exploitation possibilities.\",\"PeriodicalId\":133907,\"journal\":{\"name\":\"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops\",\"volume\":\"53 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-06-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICDCSW.2010.70\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDCSW.2010.70","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Innovations and Advances in Adaptive Secure Message Oriented Middleware
Increasing requirements for the resilience, security, adaptation, intelligence and scalability of complex business critical systems have set new challenges for system developers and application designers. Messaging infrastructures are often used to implement systems of this type. We provide an overview of the main advances in the adaptive security, security metrics, vulnerability discovery, anomaly detection and authentication solutions of the GEMOM (Genetic Message Oriented Secure Middleware) research project and discuss exploitation possibilities.