Abstract | ||
---|---|---|
When managing complex information systems to provide critical services, a key requirement is reaching a high level of dependability. Information security problems and techniques have an ever-increasing role in this task. We have developed a methodology and tools for joint security design and validation, to support the quest towards more formal and manageable practices in configuring information system dependability. Our novel approach exploits dependability ontologies and model transformation techniques to perform the automatic generation of configuration directives for the dependability relevant features of the system. This paper presents some relevant aspects of our dependability ontology, and of the associated configuration algorithms. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1504/IJCCBS.2010.036603 | IJCCBS |
Keywords | Field | DocType |
relevant aspect,information security problem,dependability relevant feature,joint security design,associated configuration algorithm,configuring information system dependability,dependable configuration,configuration directive,automatic generation,complex information system,dependability ontology,information security,reliability,information systems,information system | Information system,Ontology (information science),Ontology,Model transformation,Dependability,Systems engineering,Computer science,Information security,Algorithm,Exploit,Security design | Journal |
Volume | Issue | Citations |
1 | 4 | 0 |
PageRank | References | Authors |
0.34 | 10 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Marco Domenico Aime | 1 | 4 | 1.91 |
Paolo Carlo Pomi | 2 | 0 | 0.34 |
Marco Vallini | 3 | 32 | 4.22 |