Reflections on operating in hostile environments

We introduce a generally applicable framework to assess and substantiate the security of a software component of a computer system. The framework constitutes a metamodel. Security models can be derived from it for components of a computer system. The concept of trust is interwoven into the metamodel...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Bazaz, A., Arthur, J.D., Marchany, R.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page 10 pp.
container_title
container_volume
creator Bazaz, A.
Arthur, J.D.
Marchany, R.
description We introduce a generally applicable framework to assess and substantiate the security of a software component of a computer system. The framework constitutes a metamodel. Security models can be derived from it for components of a computer system. The concept of trust is interwoven into the metamodel and is an integral part of derived security models.
doi_str_mv 10.1109/HICSS.2004.1265454
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1265454</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1265454</ieee_id><sourcerecordid>1265454</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-4c276a9a3799ca178cda36a674f4fecc6447eecbc23a9c98960395429d73d66a3</originalsourceid><addsrcrecordid>eNotj8tKAzEUQAMiqLU_UDf5gRlv3nOXMqgtFATbfUkzdzQyTcokCP69gj2bsztwGFsJaIUAfFxv-t2ulQC6FdIabfQVuwNn0UgwVtywZSlf8IcxXYfmlsE7jROFGnMqPCeezzT7GtMHj4l_5lLjRJzSd5xzOlGq5Z5dj34qtLx4wfYvz_t-3WzfXjf907aJCLXRQTrr0SuHGLxwXRi8st46PeqRQrBaO6JwDFJ5DNihBYVGSxycGqz1asEe_rORiA7nOZ78_HO4PKlfNvBCew</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Reflections on operating in hostile environments</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Bazaz, A. ; Arthur, J.D. ; Marchany, R.</creator><creatorcontrib>Bazaz, A. ; Arthur, J.D. ; Marchany, R.</creatorcontrib><description>We introduce a generally applicable framework to assess and substantiate the security of a software component of a computer system. The framework constitutes a metamodel. Security models can be derived from it for components of a computer system. The concept of trust is interwoven into the metamodel and is an integral part of derived security models.</description><identifier>ISBN: 0769520561</identifier><identifier>ISBN: 9780769520568</identifier><identifier>DOI: 10.1109/HICSS.2004.1265454</identifier><language>eng</language><publisher>IEEE</publisher><subject>Application software ; Australia ; Computer crime ; Computer errors ; Computer security ; Internet ; Military computing ; Reflection ; Rivers ; Waste management</subject><ispartof>37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the, 2004, p.10 pp.</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1265454$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,4036,4037,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1265454$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Bazaz, A.</creatorcontrib><creatorcontrib>Arthur, J.D.</creatorcontrib><creatorcontrib>Marchany, R.</creatorcontrib><title>Reflections on operating in hostile environments</title><title>37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the</title><addtitle>HICSS</addtitle><description>We introduce a generally applicable framework to assess and substantiate the security of a software component of a computer system. The framework constitutes a metamodel. Security models can be derived from it for components of a computer system. The concept of trust is interwoven into the metamodel and is an integral part of derived security models.</description><subject>Application software</subject><subject>Australia</subject><subject>Computer crime</subject><subject>Computer errors</subject><subject>Computer security</subject><subject>Internet</subject><subject>Military computing</subject><subject>Reflection</subject><subject>Rivers</subject><subject>Waste management</subject><isbn>0769520561</isbn><isbn>9780769520568</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj8tKAzEUQAMiqLU_UDf5gRlv3nOXMqgtFATbfUkzdzQyTcokCP69gj2bsztwGFsJaIUAfFxv-t2ulQC6FdIabfQVuwNn0UgwVtywZSlf8IcxXYfmlsE7jROFGnMqPCeezzT7GtMHj4l_5lLjRJzSd5xzOlGq5Z5dj34qtLx4wfYvz_t-3WzfXjf907aJCLXRQTrr0SuHGLxwXRi8st46PeqRQrBaO6JwDFJ5DNihBYVGSxycGqz1asEe_rORiA7nOZ78_HO4PKlfNvBCew</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Bazaz, A.</creator><creator>Arthur, J.D.</creator><creator>Marchany, R.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2004</creationdate><title>Reflections on operating in hostile environments</title><author>Bazaz, A. ; Arthur, J.D. ; Marchany, R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-4c276a9a3799ca178cda36a674f4fecc6447eecbc23a9c98960395429d73d66a3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Application software</topic><topic>Australia</topic><topic>Computer crime</topic><topic>Computer errors</topic><topic>Computer security</topic><topic>Internet</topic><topic>Military computing</topic><topic>Reflection</topic><topic>Rivers</topic><topic>Waste management</topic><toplevel>online_resources</toplevel><creatorcontrib>Bazaz, A.</creatorcontrib><creatorcontrib>Arthur, J.D.</creatorcontrib><creatorcontrib>Marchany, R.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bazaz, A.</au><au>Arthur, J.D.</au><au>Marchany, R.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Reflections on operating in hostile environments</atitle><btitle>37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the</btitle><stitle>HICSS</stitle><date>2004</date><risdate>2004</risdate><spage>10 pp.</spage><pages>10 pp.-</pages><isbn>0769520561</isbn><isbn>9780769520568</isbn><abstract>We introduce a generally applicable framework to assess and substantiate the security of a software component of a computer system. The framework constitutes a metamodel. Security models can be derived from it for components of a computer system. The concept of trust is interwoven into the metamodel and is an integral part of derived security models.</abstract><pub>IEEE</pub><doi>10.1109/HICSS.2004.1265454</doi></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 0769520561
ispartof 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the, 2004, p.10 pp.
issn
language eng
recordid cdi_ieee_primary_1265454
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Application software
Australia
Computer crime
Computer errors
Computer security
Internet
Military computing
Reflection
Rivers
Waste management
title Reflections on operating in hostile environments
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-16T02%3A53%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Reflections%20on%20operating%20in%20hostile%20environments&rft.btitle=37th%20Annual%20Hawaii%20International%20Conference%20on%20System%20Sciences,%202004.%20Proceedings%20of%20the&rft.au=Bazaz,%20A.&rft.date=2004&rft.spage=10%20pp.&rft.pages=10%20pp.-&rft.isbn=0769520561&rft.isbn_list=9780769520568&rft_id=info:doi/10.1109/HICSS.2004.1265454&rft_dat=%3Cieee_6IE%3E1265454%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1265454&rfr_iscdi=true