Abstract
The main objective of the research is to formalize an abstract architecture for the alternative data source that is meant to be used during system availability under intrusion threat. For this purpose, three possible designed semantics have been identify and considered. The security and performance parameters that are required to be exhibited by the alternative data source have been identified. Qualitative analysis is carried out in terms of the identified security and performance parameters, among the considered design semantics to select the potentially secure and suitable design semantic. The selected design semantic becomes the basis of formalizing an abstract architecture for the alternative data source during system availability under intrusion threat scenario.
Original language | English |
---|---|
Title of host publication | IET International Conference on Wireless Communications and Applications, ICWCA 2012 |
Publisher | Institution of Engineering and Technology |
Volume | 614 CP |
ISBN (Electronic) | 9781849195508 |
DOIs | |
Publication status | Published - 15 Jul 2013 |
Event | IET International Conference on Wireless Communications and Applications, ICWCA 2012 - Kuala Lumpur, Malaysia Duration: 8 Oct 2012 → 10 Oct 2012 |
Conference
Conference | IET International Conference on Wireless Communications and Applications, ICWCA 2012 |
---|---|
Country/Territory | Malaysia |
City | Kuala Lumpur |
Period | 8/10/12 → 10/10/12 |
Keywords
- alternative data source
- data migration
- dimensions
- intrusion
- threat