{"title":"为入侵威胁下系统可用性期间使用的替代数据源形式化抽象体系结构","authors":"S. Safdar, M. Hassan, R. Akbar, M. Qureshi","doi":"10.1049/cp.2012.2114","DOIUrl":null,"url":null,"abstract":"The main objective of the research is to formalize an abstract architecture for the alternative data source that is meant to be used during system availability under intrusion threat. For this purpose, three possible designed semantics have been identify and considered. The security and performance parameters that are required to be exhibited by the alternative data source have been identified. Qualitative analysis is carried out in terms of the identified security and performance parameters, among the considered design semantics to select the potentially secure and suitable design semantic. The selected design semantic becomes the basis of formalizing an abstract architecture for the alternative data source during system availability under intrusion threat scenario. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Formalizing an abstract architecture for the alternative data source utilized during system availability under intrusion threat\",\"authors\":\"S. Safdar, M. Hassan, R. Akbar, M. Qureshi\",\"doi\":\"10.1049/cp.2012.2114\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The main objective of the research is to formalize an abstract architecture for the alternative data source that is meant to be used during system availability under intrusion threat. For this purpose, three possible designed semantics have been identify and considered. The security and performance parameters that are required to be exhibited by the alternative data source have been identified. Qualitative analysis is carried out in terms of the identified security and performance parameters, among the considered design semantics to select the potentially secure and suitable design semantic. The selected design semantic becomes the basis of formalizing an abstract architecture for the alternative data source during system availability under intrusion threat scenario. (6 pages)\",\"PeriodicalId\":383835,\"journal\":{\"name\":\"IET International Conference on Wireless Communications and Applications\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IET International Conference on Wireless Communications and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1049/cp.2012.2114\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET International Conference on Wireless Communications and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/cp.2012.2114","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Formalizing an abstract architecture for the alternative data source utilized during system availability under intrusion threat
The main objective of the research is to formalize an abstract architecture for the alternative data source that is meant to be used during system availability under intrusion threat. For this purpose, three possible designed semantics have been identify and considered. The security and performance parameters that are required to be exhibited by the alternative data source have been identified. Qualitative analysis is carried out in terms of the identified security and performance parameters, among the considered design semantics to select the potentially secure and suitable design semantic. The selected design semantic becomes the basis of formalizing an abstract architecture for the alternative data source during system availability under intrusion threat scenario. (6 pages)