Modular Security: Design and Analysis
نویسنده
چکیده
Software systems made of software components are becoming more and more common. This paper surveys theories and techniques for designing and analyzing security of such systems. The paper gives an overview of security models, introduces formal foundations for system composition and security engineering, and investigates available techniques for security design and analysis, focusing on each technique’s adoption of composition mechanisms and support for security property.
منابع مشابه
QTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملAn Improved Modular Modeling for Analysis of Closed-Cycle Absorption Cooling Systems
A detailed modular modeling of an absorbent cooling system is presented in this paper. The model including the key components is described in terms of design parameters, inputs, control variables, and outputs. The model is used to simulate the operating conditions for estimating the behavior of individual components and system performance, and to conduct a sensitivity analysis based on the give...
متن کاملModular approach for an ASIC integration of electrical drive controls
VLSI circuits design allows today to consider new modes of implementation for electrical controls. However, design techniques require an adaptation effort that few designers, too accustomed to the software approach, provide. The authors of this article propose to develop a methodology to guide the electrical designers towards optimal performances of control algorithms implementation. Thus, they...
متن کاملInvestigation the status of instructional design with modular method in medical education
Background and Goal: Modular method is a form of in-service training which provides job skills into a form of independent training of audiences. Each of modular provides specific skill and at the same time besides the other modular led to a new and comprehensive skill. In fact, any educational modular is a set of knowledge, attitudes and skills which by using them it can be possible to do ...
متن کاملOpen problems in hash function security
A cryptographic hash function compresses arbitrarily long messages to digests of a short and fixed length. Most of existing hash functions are designed to evaluate a compression function with a finite domain in a mode of operation, and the compression function itself is often designed from block ciphers or permutations. This modular design approach allows for a rigorous security analysis via me...
متن کاملUsing Modular Pole for Multi-Objective Design Optimization of a Linear Permanent Magnet Synchronous Motor by Particle Swarm Optimization (PSO)
In this paper particle swarm optimization (PSO) is used for a design optimization of a linear permanent magnet synchronous motor (LPMSM) considering ultra low thrust force ripples, low magnet consumption, improved efficiency and thrust. The influence of PM material is discussed, too and the modular poles are proposed to achieve the best characteristic. PM dimensions and material, air gap and mo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004