2021
DOI: 10.1007/978-3-030-90428-9_4
|View full text |Cite
|
Sign up to set email alerts
|

An Assurance Framework and Process for Hybrid Systems

Abstract: Security assurance is a discipline aiming to demonstrate that a target system holds some non-functional properties and behaves as expected. These techniques have been recently applied to the cloud, facing some critical issues especially when integrated within existing security processes and executed in a programmatic way. Furthermore, they pose significant costs when hybrid systems, mixing public and private infrastructures, are considered. In this paper, we a present an assurance framework that implements an … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…Further, it was discovered that selecting features for high-dimensional datasets in parallel could lessen the computing load of logistic regression [21]. Although it does a reasonable job of classifying data, logistic regression suffers from a lack of computing efficiency [22]. This is because it typically uses an optimization technique belonging to the hill-climbing Newton family, such as Newton-Raphson and its variants and extensions, to arrive at an estimate.…”
Section: Fig 1: Malware Analysis In Cloudmentioning
confidence: 99%
“…Further, it was discovered that selecting features for high-dimensional datasets in parallel could lessen the computing load of logistic regression [21]. Although it does a reasonable job of classifying data, logistic regression suffers from a lack of computing efficiency [22]. This is because it typically uses an optimization technique belonging to the hill-climbing Newton family, such as Newton-Raphson and its variants and extensions, to arrive at an estimate.…”
Section: Fig 1: Malware Analysis In Cloudmentioning
confidence: 99%
“…As an industry adopts more and more IIoT based systems, it will become increasingly necessary to use an efficient system control strategy. Assurance has been identified as a suitable way to control a target system against security concerns [13], computing, for instance, a risk indicator [14]. More particularly, the industry must be capable of confidently identifying IIoT systems to prevent the use of miscreant or unreliable devices and systems.…”
Section: Introductionmentioning
confidence: 99%
“…The advent of Edge Computing has changed the way a service composition can be deployed, allowing for instance to better support real-time applications via low latency [1] and in general a better placement of services to fulfill specific QoS requests [2], [3]. Despite being physically separated from the Cloud, the Edge heavily depends on it to execute resourcehungry tasks, since computational power available on Edge nodes decreases the farthest they are from the Cloud.…”
Section: Introductionmentioning
confidence: 99%