{"title":"面向安全系统的问题和模型","authors":"C. Ramamoorthy","doi":"10.1109/ICIS.2008.115","DOIUrl":null,"url":null,"abstract":"Summary form only given. Virus infestation is rampant in today's internet based IT activities. The viruses (including worms, and Trojan Horses) are constantly and rapidly created to damage e=commerce and web based application. Importantly, they corrupt communications, valuable databases and disrupt service oriented functions. In the future, they can severely hurt the new applications spanning from health care to home appliance control. We shall present a broad discussion on a few mostly software engineering topics, pointing out their relevance and relationship to IT security issues.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Issues and Models of Security Oriented Systems\",\"authors\":\"C. Ramamoorthy\",\"doi\":\"10.1109/ICIS.2008.115\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Summary form only given. Virus infestation is rampant in today's internet based IT activities. The viruses (including worms, and Trojan Horses) are constantly and rapidly created to damage e=commerce and web based application. Importantly, they corrupt communications, valuable databases and disrupt service oriented functions. In the future, they can severely hurt the new applications spanning from health care to home appliance control. We shall present a broad discussion on a few mostly software engineering topics, pointing out their relevance and relationship to IT security issues.\",\"PeriodicalId\":382781,\"journal\":{\"name\":\"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIS.2008.115\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIS.2008.115","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Summary form only given. Virus infestation is rampant in today's internet based IT activities. The viruses (including worms, and Trojan Horses) are constantly and rapidly created to damage e=commerce and web based application. Importantly, they corrupt communications, valuable databases and disrupt service oriented functions. In the future, they can severely hurt the new applications spanning from health care to home appliance control. We shall present a broad discussion on a few mostly software engineering topics, pointing out their relevance and relationship to IT security issues.