메뉴 건너뛰기




Volumn , Issue , 2009, Pages 153-160

Robust, secure, self-adaptive and resilient messaging middleware for business critical systems

Author keywords

Evolution; Messaging middleware; Resilience; Security assurance; Self adaptation; Self healing; Self protection

Indexed keywords

ADAPTIVE FUNCTIONS; BRUTE-FORCE APPROACH; CRITICAL INFRASTRUCTURE; CRITICAL SYSTEMS; EVOLVABILITY; MESSAGING SYSTEM; PROTOTYPING; RUNTIMES; SECURITY ASSURANCE; SECURITY THREATS; SECURITY VULNERABILITIES; SELF ADAPTATION; SELF-ADAPTABILITY; SELF-ADAPTIVE; SELF-HEALING; STATE OF THE ART; STRINGENT REQUIREMENT; SYSTEM SUPPORTS;

EID: 77950971375     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ComputationWorld.2009.26     Document Type: Conference Paper
Times cited : (15)

References (34)
  • 2
    • 58149182029 scopus 로고    scopus 로고
    • 1 June, accessed June 10th, 2009, from
    • J. DeMott. The evolving art of fuzzing, 1 June, 2006, accessed June 10th, 2009, from http://www.vdalabs.com/tools/The-Evolving-Art-of-Fuzzing.pdf.
    • (2006) The Evolving Art of Fuzzing
    • DeMott, J.1
  • 3
    • 58149201620 scopus 로고    scopus 로고
    • ESB. Accessed June 30th, 2009, from
    • ESB. Enterprise Service Bus (ESB). Accessed June 30th, 2009, from http://www.sonicsoftware.com/psm/enterprise-service-bus/index.ssp.
    • Enterprise Service Bus (ESB)
  • 5
    • 77950998890 scopus 로고    scopus 로고
    • IBM., accessed July 3rd, 2009 from
    • IBM. IBM WebSphere MQ support, accessed July 3rd, 2009 from http://www-01.ibm.com/software/integration/wmq/support/.
    • IBM WebSphere MQ Support
  • 7
    • 77950997808 scopus 로고    scopus 로고
    • Semantic message oriented middleware for publish/subscribe networks, sensors, and command, control, communications, and intelligence (C3I) technologies for homeland security and homeland defense III
    • In proceedings of the SPIE
    • H. Li and G. Jiang. Semantic message oriented middleware for publish/subscribe networks, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense III. In proceedings of the SPIE. In proceedings of the SPIE, 5403:24-133, 2004.
    • (2004) Proceedings of the SPIE , vol.5403 , pp. 24-133
    • Li, H.1    Jiang, G.2
  • 9
    • 34548143043 scopus 로고    scopus 로고
    • A message oriented middleware solution enabling non-repudiation evidence generation for reliable web services
    • Springer Berlin/Heidelberg,/, (0302-9743):, 06 June
    • S. Parkin, D. Ingham, and G. Morgan. A message oriented middleware solution enabling non-repudiation evidence generation for reliable web services. Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 4526/2007(0302-9743):9-19, 06 June, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4526 , Issue.2007 , pp. 9-19
    • Parkin, S.1    Ingham, D.2    Morgan, G.3
  • 11
    • 84899203852 scopus 로고    scopus 로고
    • Accessed July 1st, 2009, from
    • TIBCO. Rendezvous. Accessed July 1st, 2009, from http://www.tibco.com/ software/messaging/rendezvous/default.jsp.
    • Rendezvous
  • 12
    • 70449502638 scopus 로고    scopus 로고
    • Identification of basic measurable security components for a distributed messaging system
    • June 18-23, 2009-Athens/Vouliagmeni, Greece, IEEE Computer Society
    • R. Savola and H. Abie, Identification of Basic Measurable Security Components for a Distributed Messaging System, The 3rd International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2009, June 18-23, 2009-Athens/Vouliagmeni, Greece, IEEE Computer Society, pp. 121-128.
    • (2009) 3rd International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) , pp. 121-128
    • Savola, R.1    Abie, H.2
  • 14
    • 0037232265 scopus 로고    scopus 로고
    • Security in an autonomic computing environment
    • D. M. Chess, C. C. Palmer, and S. R. White, Security in an autonomic computing environment, IBM Systems Journal, Vol. 42, No 1, 2003 107-118.
    • (2003) IBM Systems Journal , vol.42 , Issue.1 , pp. 107-118
    • Chess, D.M.1    Palmer, C.C.2    White, S.R.3
  • 19
    • 74249094009 scopus 로고    scopus 로고
    • Semantics of static, adaptive, and incremental security policies
    • Indianapolis, Technical Report ATM 2001(8104-05)-1, The Aerospace Corporation July
    • L. Marcus, Semantics of static, adaptive, and incremental security policies, First Symposium on Requirements Engineering for Information Security (SREIS) March 2001, Indianapolis, Technical Report ATM 2001(8104-05)-1, The Aerospace Corporation July 2001.
    • (2001) First Symposium on Requirements Engineering for Information Security (SREIS) March 2001
    • Marcus, L.1
  • 21
    • 33750014792 scopus 로고    scopus 로고
    • A Bioinspired approach for self-protecting an organic middleware with artificial antibodies, self-organizing systems
    • Springer Berlin/Heidelberg,/, September 21
    • A. Pietzowski, B. Satzger, W. Trumler, and T. Ungerer, A Bioinspired Approach for Self-protecting an Organic Middleware with Artificial Antibodies, Self-Organizing Systems, LNCS, Springer Berlin/Heidelberg, Vol. 4124/2006, pp. 202-215, September 21, 2006.
    • (2006) LNCS , vol.4124 , Issue.2006 , pp. 202-215
    • Pietzowski, A.1    Satzger, B.2    Trumler, W.3    Ungerer, T.4
  • 26
    • 84944315981 scopus 로고    scopus 로고
    • Practical and theoretical issues on adaptive security
    • Novosibirsk State Technical University, and Adaptive security in complex information systems, (8023863):, 28 June-6 July
    • A. Shnitko, Practical and Theoretical Issues on Adaptive Security, Novosibirsk State Technical University, and Adaptive security in complex information systems, in Proc. 7th Korea-Russia International Symposium on Science and Technology, (8023863):206-210, 28 June-6 July, 2003.
    • (2003) Proc. 7th Korea-Russia International Symposium on Science and Technology , pp. 206-210
    • Shnitko, A.1
  • 30
    • 84962702813 scopus 로고    scopus 로고
    • Anomaly-based self-protection against network attacks
    • Ed.: M. Parashar and S. Hariri, CRC Press
    • G. Qu and S. Hariri, Anomaly-Based Self-Protection against Network Attacks, in Autonomic Computing: Concepts, Infrastructure, and Applications, Ed.: M. Parashar and S. Hariri, CRC Press, 2007, pp. 493-521.
    • (2007) Autonomic Computing: Concepts, Infrastructure, and Applications , pp. 493-521
    • Qu, G.1    Hariri, S.2
  • 31
    • 79960422013 scopus 로고    scopus 로고
    • A comparison of two approaches for achieving flexible and adaptive security middleware
    • Leuven, Belgium, December 2, ACM 2008
    • T. Goovaerts, B. D. Win, and W. Joosen, A comparison of two approaches for achieving flexible and adaptive security middleware, Proc. of the 2008 workshop on Middleware Security, Leuven, Belgium, December 2, 2008. ACM 2008, pp.19-24.
    • (2008) Proc. of the 2008 Workshop on Middleware Security , pp. 19-24
    • Goovaerts, T.1    Win, B.D.2    Joosen, W.3
  • 32
    • 46849111613 scopus 로고    scopus 로고
    • Virtualised trusted computing platform for adaptive security enforcement of web services interactions
    • 9-13 July
    • I. Djordjevic, S.K. Nair, and T. Dimitrakos, Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions, IEEE Int. Conference on Web Services (ICWS 2007), 9-13 July 2007, pp 615-622.
    • (2007) IEEE Int. Conference on Web Services (ICWS 2007) , pp. 615-622
    • Djordjevic, I.1    Nair, S.K.2    Dimitrakos, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.