This document proposes a conceptual trusted incident reaction architecture based on a multi-agent system. The architecture is designed to dynamically and flexibly react to security incidents across an enterprise network. It incorporates the concept of trust into the decision-making process for determining and deploying appropriate security responses. The architecture is illustrated using a case study of a medical application distributed across buildings, a campus, and metropolitan area networks.
A Simplified Cost Efficient Distributed System architecture which relies on replication and recovery techniques using monitoring service, proxy service to handle service calls and a specialized server architecture which serves as both backup and standby service provider.
A secure service provisioning framework for cyber physical cloud computing sy...ijdpsjournal
Cyber physical systems (CPS) are mission critical systems engineered by combination of cyber and
physical systems respectively. These systems are tightly coupled, resource constrained systems and have
dynamic real time applications. Due to the limitation of resources, and in order to improve the efficiency of
the CPS systems, they are combined with cloud computing architecture, and are called as Cyber Physical
Cloud Computing Systems (CPCCS). These CPCCS have critical care applications where security of the
systems is a major concern. Therefore, we propose a Secure Service provisioning architecture for Cyber
Physical Cloud Computing Systems (CPCCS), which includes the combination of technologies such as
CPS, Cloud Computing and Wireless Sensor Networks. In addition to this, we also highlight various
threats/attacks; security requirements and mechanisms that are applicable to CPCCS at different layers
and propose two security models that can be adapted in a layered architectural format.
Security Authorization: An Approach for Community Cloud Computing EnvironmentsBooz Allen Hamilton
White paper explores some of the challenges encountered when attempting to perform traditional security authorization or certification and authentication processes for cloud computing environments (CCEs).
A Simplified Cost Efficient Distributed System architecture which relies on replication and recovery techniques using monitoring service, proxy service to handle service calls and a specialized server architecture which serves as both backup and standby service provider.
A secure service provisioning framework for cyber physical cloud computing sy...ijdpsjournal
Cyber physical systems (CPS) are mission critical systems engineered by combination of cyber and
physical systems respectively. These systems are tightly coupled, resource constrained systems and have
dynamic real time applications. Due to the limitation of resources, and in order to improve the efficiency of
the CPS systems, they are combined with cloud computing architecture, and are called as Cyber Physical
Cloud Computing Systems (CPCCS). These CPCCS have critical care applications where security of the
systems is a major concern. Therefore, we propose a Secure Service provisioning architecture for Cyber
Physical Cloud Computing Systems (CPCCS), which includes the combination of technologies such as
CPS, Cloud Computing and Wireless Sensor Networks. In addition to this, we also highlight various
threats/attacks; security requirements and mechanisms that are applicable to CPCCS at different layers
and propose two security models that can be adapted in a layered architectural format.
Security Authorization: An Approach for Community Cloud Computing EnvironmentsBooz Allen Hamilton
White paper explores some of the challenges encountered when attempting to perform traditional security authorization or certification and authentication processes for cloud computing environments (CCEs).
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEYIJNSA Journal
The autonomic network gathers several aspects of Self-organization, which is depicted, into different
autonomous function such as the Self- configuration, the Self-optimization, the Self-repair, the Selfprotection, and the Self-cure. The latter is considered as one of the autonomous functions wished of a system network, which could be described by autonomous behavior is realized by structures of the control
loops and loop of control.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A Centralized Network Management Application for Academia and Small Business ...ITIIIndustries
Software-defined networking (SDN) is reshaping the networking paradigm. Previous research shows that SDN has advantages over traditional networks because it separates the control and data plane, leading to greater flexibility through network automation and programmability. Small business and academia networks require flexibility, like service provider networks, to scale, deploy, and self-heal network infrastructure that comprises of cloud operating systems, virtual machines, containers, vendor networking equipment, and virtual network functions (VNFs); however, as SDN evolves in industry, there has been limited research to develop an SDN architecture to fulfil the requirements of small business and academia networks. This research proposes a network architecture that can abstract, orchestrate, and scale configurations based on academia and small business network requirements. Our results show that the proposed architecture provides enhanced network management and operations when combined with the network orchestration application (NetO-App) developed in this research. The NetO-App orchestrates network policies, automates configuration changes, secures container infrastructure, and manages internal and external communication between the campus networking infrastructure.
A study on security responsibilities and adoption in cloudeSAT Journals
Abstract Cloud computing is one of the popular enterprise models where computing resources are made available on-demand to the user as needed. Due to this increasing demand for more clouds there is an ever growing threat of security becoming a major issue. cloud computing is a construct that allows you to access applications that actually reside at a location other than your computer or other Internet-connected device, most often, this will be a distant data center. In a simple, topological sense, a cloud computing solution is made up of several elements: clients, the datacenter, and distributed servers. Each element has a purpose and plays a specific role in delivering a functional cloud based application, the increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. So this paper shall look at ways in which security responsibilities and Cloud Adoption Keywords: Cloud Computing, Service models, Cloud Security, Secure Cloud Adoption,
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
Multi-cloud is an advanced version of cloud computing that allows its users to utilize different cloud systems from several Cloud Service Providers (CSPs) remotely. Although it is a very efficient computing
facility, threat detection, data protection, and vendor lock-in are the major security drawbacks of this infrastructure. These factors act as a catalyst in promoting serious cyber-crimes of the virtual world. Privacy and safety issues of a multi-cloud environment have been overviewed in this research paper. The
objective of this research is to analyze some logical automation and monitoring provisions, such as monitoring Cyber-physical Systems (CPS), home automation, automation in Big Data Infrastructure (BDI), Disaster Recovery (DR), and secret protection. The Results of this research investigation indicate that it is possible to avoid security snags of a multi-cloud interface by adopting these scientific solutions methodically.
A Secure & Scalable Access Method in Cloud Computingijsrd.com
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible cryptography based scheme. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against malicious data modification attack, The proposed scheme not only achieves scalability due to its hierarchical structure, but also inherits flexibility. We implement our scheme and show that it is both efficient and flexible in dealing with access control for outsourced data in cloud computing with comprehensive experiments.
Domain partitioned element management systems employing mobile agents for dis...IJCNCJournal
Network management systems based on mobile agents a
re efficiently a better alternative than typical
client/server based architectures. Centralized mana
gement models like SNMP or CMIP based management
models suffer from scalability and flexibility issu
es which are addressed to great extent by flat bed
or static
mid-level manager models based on mobile agents, ye
t the use of mobile agents to distribute and delega
te
management tasks for above stated agent-based manag
ement frameworks like initial flat bed models and
static mid-level managers cannot efficiently meet t
he demands of current networks which are growing in
size and complexity. In view of the above mentioned
limitations, we proposed a domain partitioned netw
ork
management model based-on mobile agent & Element Ma
nagement Systems in order to minimize
management data flow to a centralized server. Intel
ligent agent allocated to specific EMS performs loc
al
network management and reports the results to the s
uperior manager and finally the global manager
performs global network management using those subm
itted management results. Experimental results of
various scenarios of the proposed model have been p
resented to support the arguments given in favor of
the
prototype system based on mobile agents.
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...ijsrd.com
Cloud computing have high demand due to waste and huge data usage of clients. The privacy and security become major concern on the outsourced cloud data storage. The attribute based encryption schemes are used recently for access control of outsourced cloud data. It has highly inflexible in implementing complex access control policies. The existing work presented Hierarchical attribute set based Encryption (HASBE) that extended cipher-text policy attribute set based encryption (ASBE) with hierarchical structure of users. It used achieve scalability, inherits flexibility, fine grained access control, and employs multiple value assignments for access expiration time, and deal with user revocation efficiently. The performance analysis is made to evaluate the computational complexity of access control for outsourced data in cloud computing. However varying of cloud service provider complicates the hierarchical access control policies. The proposal presented an Adaptive Delegation Authority model enhancement to HASBE. It is used to minimize the complexity of access control policies in changing cloud service provider. The delegation authority coordinates the data owners and consumer for easy and quick data access control. It intimates the data owners and consumers about the authority delegation. The delegation authority sends encryption standards to be followed thereafter. The simulation is carried with Cloud simulator using java to testify in the effectiveness of Adaptive Delegation Authority enhancement to HASBE.
Harnessing the cloud for securely outsourcing large scale systems of linear e...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEYIJNSA Journal
The autonomic network gathers several aspects of Self-organization, which is depicted, into different
autonomous function such as the Self- configuration, the Self-optimization, the Self-repair, the Selfprotection, and the Self-cure. The latter is considered as one of the autonomous functions wished of a system network, which could be described by autonomous behavior is realized by structures of the control
loops and loop of control.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A Centralized Network Management Application for Academia and Small Business ...ITIIIndustries
Software-defined networking (SDN) is reshaping the networking paradigm. Previous research shows that SDN has advantages over traditional networks because it separates the control and data plane, leading to greater flexibility through network automation and programmability. Small business and academia networks require flexibility, like service provider networks, to scale, deploy, and self-heal network infrastructure that comprises of cloud operating systems, virtual machines, containers, vendor networking equipment, and virtual network functions (VNFs); however, as SDN evolves in industry, there has been limited research to develop an SDN architecture to fulfil the requirements of small business and academia networks. This research proposes a network architecture that can abstract, orchestrate, and scale configurations based on academia and small business network requirements. Our results show that the proposed architecture provides enhanced network management and operations when combined with the network orchestration application (NetO-App) developed in this research. The NetO-App orchestrates network policies, automates configuration changes, secures container infrastructure, and manages internal and external communication between the campus networking infrastructure.
A study on security responsibilities and adoption in cloudeSAT Journals
Abstract Cloud computing is one of the popular enterprise models where computing resources are made available on-demand to the user as needed. Due to this increasing demand for more clouds there is an ever growing threat of security becoming a major issue. cloud computing is a construct that allows you to access applications that actually reside at a location other than your computer or other Internet-connected device, most often, this will be a distant data center. In a simple, topological sense, a cloud computing solution is made up of several elements: clients, the datacenter, and distributed servers. Each element has a purpose and plays a specific role in delivering a functional cloud based application, the increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. So this paper shall look at ways in which security responsibilities and Cloud Adoption Keywords: Cloud Computing, Service models, Cloud Security, Secure Cloud Adoption,
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
Multi-cloud is an advanced version of cloud computing that allows its users to utilize different cloud systems from several Cloud Service Providers (CSPs) remotely. Although it is a very efficient computing
facility, threat detection, data protection, and vendor lock-in are the major security drawbacks of this infrastructure. These factors act as a catalyst in promoting serious cyber-crimes of the virtual world. Privacy and safety issues of a multi-cloud environment have been overviewed in this research paper. The
objective of this research is to analyze some logical automation and monitoring provisions, such as monitoring Cyber-physical Systems (CPS), home automation, automation in Big Data Infrastructure (BDI), Disaster Recovery (DR), and secret protection. The Results of this research investigation indicate that it is possible to avoid security snags of a multi-cloud interface by adopting these scientific solutions methodically.
A Secure & Scalable Access Method in Cloud Computingijsrd.com
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible cryptography based scheme. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against malicious data modification attack, The proposed scheme not only achieves scalability due to its hierarchical structure, but also inherits flexibility. We implement our scheme and show that it is both efficient and flexible in dealing with access control for outsourced data in cloud computing with comprehensive experiments.
Domain partitioned element management systems employing mobile agents for dis...IJCNCJournal
Network management systems based on mobile agents a
re efficiently a better alternative than typical
client/server based architectures. Centralized mana
gement models like SNMP or CMIP based management
models suffer from scalability and flexibility issu
es which are addressed to great extent by flat bed
or static
mid-level manager models based on mobile agents, ye
t the use of mobile agents to distribute and delega
te
management tasks for above stated agent-based manag
ement frameworks like initial flat bed models and
static mid-level managers cannot efficiently meet t
he demands of current networks which are growing in
size and complexity. In view of the above mentioned
limitations, we proposed a domain partitioned netw
ork
management model based-on mobile agent & Element Ma
nagement Systems in order to minimize
management data flow to a centralized server. Intel
ligent agent allocated to specific EMS performs loc
al
network management and reports the results to the s
uperior manager and finally the global manager
performs global network management using those subm
itted management results. Experimental results of
various scenarios of the proposed model have been p
resented to support the arguments given in favor of
the
prototype system based on mobile agents.
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...ijsrd.com
Cloud computing have high demand due to waste and huge data usage of clients. The privacy and security become major concern on the outsourced cloud data storage. The attribute based encryption schemes are used recently for access control of outsourced cloud data. It has highly inflexible in implementing complex access control policies. The existing work presented Hierarchical attribute set based Encryption (HASBE) that extended cipher-text policy attribute set based encryption (ASBE) with hierarchical structure of users. It used achieve scalability, inherits flexibility, fine grained access control, and employs multiple value assignments for access expiration time, and deal with user revocation efficiently. The performance analysis is made to evaluate the computational complexity of access control for outsourced data in cloud computing. However varying of cloud service provider complicates the hierarchical access control policies. The proposal presented an Adaptive Delegation Authority model enhancement to HASBE. It is used to minimize the complexity of access control policies in changing cloud service provider. The delegation authority coordinates the data owners and consumer for easy and quick data access control. It intimates the data owners and consumers about the authority delegation. The delegation authority sends encryption standards to be followed thereafter. The simulation is carried with Cloud simulator using java to testify in the effectiveness of Adaptive Delegation Authority enhancement to HASBE.
Harnessing the cloud for securely outsourcing large scale systems of linear e...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Privacy Protection in Distributed Industrial Systemiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...IJNSA Journal
The emerging mobile technology has brought revolutionized changes in the computer era. One such technology of networking is Mobile Ad hoc Networks (MANETS), where the mobility and infrastructure less of the nodes takes predominant roles. These features make MANETS more vulnerable to attacks. As the research continues several aspects can be explored in this area. At the very first it can be the problem of how to make the cross layer detection of attacks more efficient and work well. Since every layer in the network deals with different type of attacks, a possible viewpoint to those attack scenarios can be presented so that it can be extended in the later part. It becomes necessary to figure out the security solution architecture if there are different detection results generated by different layers. Secondly, there
should be a measure of the network metrics to show increased performance. The paper presents such a defensive mechanism cross layered architecture which strives to identify and correct misbehaviour in MANETS especially with respect to routing layer. The evaluation of the proposed solution is also given with results obtained to show the performance of the network.
The paradigm called “Cloud computing” acts as a mechanism for attaining the resources of shared technology and infrastructure cost-effectively. The on-demand services are accomplished to execute the various operations across the network. Regularly, the last client doesn't know about the area of open physical assets and devices. Developing, using, and dealing with their applications 'on the cloud', which includes virtualization of assets that keeps and guides itself are led by arranged activities to clients. Calculation experience the new methodology of cloud computing which perhaps keeps the world and can set up all the human necessities. At the end of the day, cloud computing is the ensuing normal step in the development of on-request data innovation administrations and items. The Cloud is an allegory for the Internet and is an idea for the secured confused foundation; it likewise relies upon drawing network graphs on a computer. In this work, thorough investigations of distributed computing security and protection concerns are given. The work distinguishes both the identified and unidentified attacks, vulnerabilities in the cloud, security attacks and also the solutions to control these threats and attacks. Moreover, the restrictions of the present solutions and offers various perceptions of security viewpoints are distinguished and explored. At long last, a cloud security system is given in which the different lines of protection and the reliance levels among them are identified.
Blueprint for Cyber Security Zone ModelingITIIIndustries
The increasing need to implement on-line services for all industries has placed greater focus upon the security controls deployed to protect the corporate network. The demand for cyber security is further required when IT solutions are built to operate in the cloud. As more business activities are migrated to the on-line channel the security protection systems must cater for a variety of applications. This includes access for enterprise users who are mobile, working from home, or situated at business partner locations. One set of key security measures deployed to protect the enterprise perimeter include firewalls, network routers, and access gateways. In addition, a set of controls are also in place for cloud enabled IT solutions. Collectively these components make up a set of protection systems referred to as the security zones. In this paper, a security zone model that has been deployed in practice for the industry is presented. The zone model serves as a design blueprint to validate existing architectures or to assist in the design of new cyber security zone deployments.
Modern internet services rely on web and cloud technology, and as such they are no longer independent packages with in-built security, but are constructed through the combination and reuse of other services distributed across the web. While the ability to build applications in this way results in highly innovative services, it creates new issues in terms of security. Trusted computing aims to provide a way to meet the evolving security requirements of users, businesses, regulators and infrastructure owners.
Multi-Agent System (MAS) monitoring solutions are designed for a plethora of usage topics. Existing approach mostly used cloned back-end architectures while front-end monitoring interface tends to constitute the real specificity of the solution. These interfaces are recurrently structured around three dimensions: access to informed knowledge, agent’s behavioural rules, and restitution of real-time states of specific system sector. In this paper, we propose prototyping a sector-agnostic MAS platform (Smart-X) which gathers in an integrated and independent platform all the functionalities required to monitor and to govern a wide range of sector specific environments. For illustration and validation purposes, the use of Smart-X is introduced and explained with a smart-mobility case study.
Aligning the business operations with the appropriate IT infrastructure is a challenging and critical activity. Without efficient business/IT alignment, the companies face the risk not to be able to deliver their business services satisfactorily and that their image is seriously altered and jeopardized. Among the many challenges of business/IT alignment is the access rights management which should be conducted considering the rising governance needs, such as taking into account the business actors' responsibility. Unfortunately, in this domain, we have observed that no solution, model and method, fully considers and integrates the new needs yet. Therefore, the paper proposes firstly to define an expressive Responsibility metamodel, named ReMMo, which allows representing the existing responsibilities at the business layer and, thereby, allows engineering the access rights required to perform these responsibilities, at the application layer. Secondly, the Responsibility metamodel has been integrated with ArchiMate® to enhance its usability and benefits from the enterprise architecture formalism. Finally, a method has been proposed to define the access rights more accurately, considering the alignment of ReMMo and RBAC. The research was realized following a design science and action design based research method and the results have been evaluated through an extended case study at the Hospital Center in Luxembourg.
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Sérgio Sacani
Since volcanic activity was first discovered on Io from Voyager images in 1979, changes
on Io’s surface have been monitored from both spacecraft and ground-based telescopes.
Here, we present the highest spatial resolution images of Io ever obtained from a groundbased telescope. These images, acquired by the SHARK-VIS instrument on the Large
Binocular Telescope, show evidence of a major resurfacing event on Io’s trailing hemisphere. When compared to the most recent spacecraft images, the SHARK-VIS images
show that a plume deposit from a powerful eruption at Pillan Patera has covered part
of the long-lived Pele plume deposit. Although this type of resurfacing event may be common on Io, few have been detected due to the rarity of spacecraft visits and the previously low spatial resolution available from Earth-based telescopes. The SHARK-VIS instrument ushers in a new era of high resolution imaging of Io’s surface using adaptive
optics at visible wavelengths.
A brief information about the SCOP protein database used in bioinformatics.
The Structural Classification of Proteins (SCOP) database is a comprehensive and authoritative resource for the structural and evolutionary relationships of proteins. It provides a detailed and curated classification of protein structures, grouping them into families, superfamilies, and folds based on their structural and sequence similarities.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.Sérgio Sacani
The return of a sample of near-surface atmosphere from Mars would facilitate answers to several first-order science questions surrounding the formation and evolution of the planet. One of the important aspects of terrestrial planet formation in general is the role that primary atmospheres played in influencing the chemistry and structure of the planets and their antecedents. Studies of the martian atmosphere can be used to investigate the role of a primary atmosphere in its history. Atmosphere samples would also inform our understanding of the near-surface chemistry of the planet, and ultimately the prospects for life. High-precision isotopic analyses of constituent gases are needed to address these questions, requiring that the analyses are made on returned samples rather than in situ.
The increased availability of biomedical data, particularly in the public domain, offers the opportunity to better understand human health and to develop effective therapeutics for a wide range of unmet medical needs. However, data scientists remain stymied by the fact that data remain hard to find and to productively reuse because data and their metadata i) are wholly inaccessible, ii) are in non-standard or incompatible representations, iii) do not conform to community standards, and iv) have unclear or highly restricted terms and conditions that preclude legitimate reuse. These limitations require a rethink on data can be made machine and AI-ready - the key motivation behind the FAIR Guiding Principles. Concurrently, while recent efforts have explored the use of deep learning to fuse disparate data into predictive models for a wide range of biomedical applications, these models often fail even when the correct answer is already known, and fail to explain individual predictions in terms that data scientists can appreciate. These limitations suggest that new methods to produce practical artificial intelligence are still needed.
In this talk, I will discuss our work in (1) building an integrative knowledge infrastructure to prepare FAIR and "AI-ready" data and services along with (2) neurosymbolic AI methods to improve the quality of predictions and to generate plausible explanations. Attention is given to standards, platforms, and methods to wrangle knowledge into simple, but effective semantic and latent representations, and to make these available into standards-compliant and discoverable interfaces that can be used in model building, validation, and explanation. Our work, and those of others in the field, creates a baseline for building trustworthy and easy to deploy AI models in biomedicine.
Bio
Dr. Michel Dumontier is the Distinguished Professor of Data Science at Maastricht University, founder and executive director of the Institute of Data Science, and co-founder of the FAIR (Findable, Accessible, Interoperable and Reusable) data principles. His research explores socio-technological approaches for responsible discovery science, which includes collaborative multi-modal knowledge graphs, privacy-preserving distributed data mining, and AI methods for drug discovery and personalized medicine. His work is supported through the Dutch National Research Agenda, the Netherlands Organisation for Scientific Research, Horizon Europe, the European Open Science Cloud, the US National Institutes of Health, and a Marie-Curie Innovative Training Network. He is the editor-in-chief for the journal Data Science and is internationally recognized for his contributions in bioinformatics, biomedical informatics, and semantic technologies including ontologies and linked data.
Nutraceutical market, scope and growth: Herbal drug technologyLokesh Patil
As consumer awareness of health and wellness rises, the nutraceutical market—which includes goods like functional meals, drinks, and dietary supplements that provide health advantages beyond basic nutrition—is growing significantly. As healthcare expenses rise, the population ages, and people want natural and preventative health solutions more and more, this industry is increasing quickly. Further driving market expansion are product formulation innovations and the use of cutting-edge technology for customized nutrition. With its worldwide reach, the nutraceutical industry is expected to keep growing and provide significant chances for research and investment in a number of categories, including vitamins, minerals, probiotics, and herbal supplements.
Professional air quality monitoring systems provide immediate, on-site data for analysis, compliance, and decision-making.
Monitor common gases, weather parameters, particulates.
Multi-source connectivity as the driver of solar wind variability in the heli...Sérgio Sacani
The ambient solar wind that flls the heliosphere originates from multiple
sources in the solar corona and is highly structured. It is often described
as high-speed, relatively homogeneous, plasma streams from coronal
holes and slow-speed, highly variable, streams whose source regions are
under debate. A key goal of ESA/NASA’s Solar Orbiter mission is to identify
solar wind sources and understand what drives the complexity seen in the
heliosphere. By combining magnetic feld modelling and spectroscopic
techniques with high-resolution observations and measurements, we show
that the solar wind variability detected in situ by Solar Orbiter in March
2022 is driven by spatio-temporal changes in the magnetic connectivity to
multiple sources in the solar atmosphere. The magnetic feld footpoints
connected to the spacecraft moved from the boundaries of a coronal hole
to one active region (12961) and then across to another region (12957). This
is refected in the in situ measurements, which show the transition from fast
to highly Alfvénic then to slow solar wind that is disrupted by the arrival of
a coronal mass ejection. Our results describe solar wind variability at 0.5 au
but are applicable to near-Earth observatories.
Richard's entangled aventures in wonderlandRichard Gill
Since the loophole-free Bell experiments of 2020 and the Nobel prizes in physics of 2022, critics of Bell's work have retreated to the fortress of super-determinism. Now, super-determinism is a derogatory word - it just means "determinism". Palmer, Hance and Hossenfelder argue that quantum mechanics and determinism are not incompatible, using a sophisticated mathematical construction based on a subtle thinning of allowed states and measurements in quantum mechanics, such that what is left appears to make Bell's argument fail, without altering the empirical predictions of quantum mechanics. I think however that it is a smoke screen, and the slogan "lost in math" comes to my mind. I will discuss some other recent disproofs of Bell's theorem using the language of causality based on causal graphs. Causal thinking is also central to law and justice. I will mention surprising connections to my work on serial killer nurse cases, in particular the Dutch case of Lucia de Berk and the current UK case of Lucy Letby.
This pdf is about the Schizophrenia.
For more details visit on YouTube; @SELF-EXPLANATORY;
https://www.youtube.com/channel/UCAiarMZDNhe1A3Rnpr_WkzA/videos
Thanks...!
1. Conceptual Trusted Incident Reaction Architecture
Christophe Feltus
Public Research Centre Henri Tudor
29, avenue John F. Kennedy,
L1855 Luxembourg – Kirchberg,
Luxembourg
christophe.feltus@tudor.lu
Abstract: Enterprise networks are continuously growing up and rising connections
with various software and systems. Their components’ security is a tremendous
challenge especially due to their heterogeneity and distributed structure.
Mechanisms, such as the intrusion detection system, are developed to monitor the
security level of those components, their exposure to external attacks or internal
failure, and their compliance to target trust level. Although the concept of trust
exists for a long time in the computer sciences, it is mainly deployed in the arena
of peer-to-peer networking and in specific domains like the eCommerce. The paper
proposes a conceptual trusted incident reaction architecture elaborated firstly based
on a multi agent system that offers the ability to be dynamic and flexible, and
secondly based on a decision mechanism that supports the choice of components
based on contextual attributes and based on information weighted with trust value.
1 Introduction
For many years, corporate networks have driven the trends of openness, mobility and
flexibility. That anabasis in the field of computer network is an open door for many
technical progressions that have rendered possible a new way of making business never
imagined before. While that improvement provides many facilities, it also appears to be
Pandora’s Box for new risks of malicious acts or manipulation problems. The control of
a network, its extensions and its progression outside the company is made difficult by
these arising new services. Therefore, the supervision and control of the information
flow exchange to, and from, significant business functions that it supports are raising a
continuously growing amount of sophisticated solutions. Intrusion Detection System
(IDS) mostly contribute to expand that set of products at the origin of security reactions.
In this paper, we propose a conceptual trust architecture that completes in the first place
the traditional itemised requirements. E.g.: react quickly and efficiently to any simple
attacks but also to any complex and distributed ones; ensure homogeneous and smart
communication between the composing nodes, and be open to a wide range of
technology. In the second place, this architecture completes our previous responds to the
following additional requirements dictated by new business constraints [GKF09]: ability
to make decision on a business based approach, ability to map the solution onto a layered
2. based infrastructure, and integration of the concept of trust in the decision processes. The
paper completes our previous works [IGAB06] by including trust in the decision
mechanism. This architecture has been defined in a 3 phases approach. The first phase
defines the architecture [GKF09] using a MAS structure modelled on the XACML
architecture. The second phase elaborates the decision mechanism supporting that
architecture. The decision mechanism is elaborated [FKA10] based on the Bayesian
network (BN) and the influence diagram (ID) [Ya07]. The bigger rectangle is the MAS
architecture that includes the decision mechanism (shorter rectangle). That last makes
decision based on contextual constraints and trust value as input and provides utility
value to the node of the system for output.
Figure 1: Reaction mechanism architecture
Whereas the here above described architecture permits to react when an incident occurs,
it his necessary in parallel to select a language to support the semantic expression of the
reaction. Rules elicited by this language compose the system security policy as well as
the reaction policy. In case of an incident reaction, policy adaptation is considered as a
regulation process. The main steps of the policy regulation process take the business
rules as input, and map them onto technical policies. These technical policies are
deployed and instantiated on the infrastructure in order to have an improved state of
temporary network security stability adapted to the ongoing attack. This policy
regulation is thereafter achieved by modifying/adding new policy rules to reach a new
set of stable policies.
To illustrate the performance of this reaction architecture, we use the results of the
BARWAN project [BKAB98]. This project focused on enabling truly useful mobile
networking across an extremely wide variety of real world networks and mobile devices.
The case study analyzed by the project is a medical application enabled by wide area
wireless and that exploits the Berkeley InfoPad [TPDB98] pooled computing power to
permit a small number of workstations to support a large number of end users. Fig.2
highlights the distribution of the application over the buildings, the campus and the
metropolitan layers. In that paper, an architecture to adapt a reaction once an attack
occurs on one of those layers is proposed. Additionally, the architecture makes it
possible to integrate internal or external contextual information for the reaction decision
like, e.g. the usage of the application, as proposed in the case study, during a medical
rescue operation after a serious car accident on the Golden Gate Bridge. The values used
for the illustration are issued from [FKA10].
2 Multi agent System architecture
The distributed architecture introduced in the paper is composed of several components,
called operators, which have different responsibilities. Those operators are organized in
3. two dimensions, as presented in Fig. 2. The vertical dimension, structured in layers
relative to the managed network organization, allows adding abstraction in going
upward: the lowest layer is closed to the managed system and thus plays the role of an
interface between the targeted network and the management system. The higher layer
encompasses a global perception of the whole system and is able to take some decisions
based on a more complete knowledge of the system, business, and organization.
Intermediate levels (1 to n-1) guarantee flexibility and scalability to the architecture in
order to consider management constraints of the infrastructure. Those middleware levels
are optional but allow the system to be better adapted to the complexity of a given
organization and the size of the information system.
Figure 2: Overall architecture layers
The horizontal dimension contains three trees (alert, reaction and deployment) placed
side by side and composed respectively with the following components: (1) The Alert
Correlation Engine (ACE) that collects, normalizes, correlates, analyzes the alerts
coming from the networks and which represent an incident. The confirmed alert is
forwarded to the reaction decision component. (2) The Police Instantiation Engine (PIE)
receives the confirmed alert to which a reaction is expected. Considering the knowledge
of the policy and of the systems’ organization and specified behaviour, these
components decide if a reaction is needed and they define that reaction. The reaction
may be a modification, an addition to or a removal of current policy. (3) The Policy
Deployment Point (PDP) instantiates and deploys the new policies on the targeted
networks. The deployment is made by the Policy Enforcement Point (PEP) that enforces
these new policies and lead to a new security stability of the network. The terminology
used is extracted from both: [Xa00] and [CM03]. Fig. 2. explains how the three layers
are mapped to the architecture borrowed from [BKAB98]. From top to bottom: the
metropolitan area, the campus area, and the in building network (building A and B).
4. The scientific literature is rich in papers addressing the usage of XACML as a language
to improve the trust in information sharing [MCCP06], however, it lacks proposals
concerning the trust between the components of the XACML architecture itself. Despite
the few existing solutions, [KCEV05] proposes an architecture based on the addition of a
Security Information Point (SIP) along the existing components to manage the following
security features: generation of random secret keys for encryption, verification of the
integrity of access control policies, management of security related information and
coordination between components. As highlighted in Fig. 3, we complete the SIP with
the management of the trust between all of the XACML components. The MAS
architecture is associated with a communication engine. This engine is based on a
message format and on a message exchange protocol issued by [De07]. The message
format is defined in XML and structured around a number of attributes that specify the
message source, the message destination, the level on which the destination trusts the
source, and the message type (alert, reaction, policy request, policy modification, policy
modification validation, decision and synchronization). The protocol defines the
exchange format and the workflow of messages between the architecture components. It
encompasses a set of rules that governs the syntax, semantics, and synchronization
communication. Electronic institution based on agents provides the requisite
characteristics to support the function of the operators. Hence, agents are assigned roles
in order to specify their function in the architecture and the communication protocol is
accordingly defined between them. Fig. 3 introduces the developed architecture
illustrated based on BARWAN. The flow is supposed to begin with an alert detected by
the IDS, positioned on the InfoPad server. This alert is send to the BuildingA_ACE
agent that does or does not confirm the alert to the PIE. The decision to confirm the alert
is explained in section 3. Afterwards, the PIE decides to apply new policies or to forward
the alert to an ACE from a higher layer. Its PIE agent sends the policies to the PDP
agent, which decides which PEP is able to implement it in terms of rules or script on
devices (InfoPad server, fileserver, etc.). Then the PDP agent sends the new policy to the
InfoPad PEP agent that knows how to transform a policy into an understandable rule or
script for the InfoPad server. The decisions lay on information issued by the context and
weighted based on trust values provided by the trust engine. A focused analysis of the
PDP points out that it is composed of several modules. For the MAS perspective, the
Component Configuration Mapper results from the interaction between the PDP agent
and the Facilitator Agent while the Policy Analysis module is achieved by the PDP
agent. The Facilitator manages the network topology by retrieving PEP agents according
to their localization (devices registered with IP address or MAC address) or according to
actions they could apply and their type (router, firewall, file server, etc.). Therefore, the
Facilitator uses white pages and yellow pages services. The JADE [BPR99] platform
provides implemented facilitator and searching services. Besides, the use of a MAS
framework provides flexibility, openness and heterogeneity. Actually, when we decide
to add a new PEP, we just have to provide its PEP Agent with the ability to concretely
apply the policies that will register itself through the Facilitator, which will update the
databases. The main goal of the reaction policy enforcement engine is to apply policies
in terms of specific concrete rules on “technical” devices (router, firewall, fileserver, and
other systems named PEP).
5. 3 Decision Support System
The system should be able to provide mechanisms to make decisions in a set of
situations like: conflicts between several choices of reactions or necessities to escalade
(or not) reactions to the upper layer. One challenge of the DSS is the management of
uncertainty. Uncertainty is defined as situation caused by a lack of knowledge about the
environment when agents need to decide the truth of statement. The decision inputs of
the alert sending are e.g.: the frequency of the alerts, the contribution of the system to the
medical rescue operation (if any), or the criticality of the rescue operation. The decision
outputs e.g.: the escalation of the alert to upper ACE. As explained by [Ya07], the
decision mechanism stands on four pillars: Ontology, BN, ID and Virtual Knowledge
Community (VKC). In that paper, the VKC is not addressed because the 3 first pillars
are sufficient to understand the decision mechanism. The preferred approach to design
the decision mechanism is studied from the research performed by Yang’s thesis and is
adapted for the incident reaction through a MAS architecture. This paper completes
Yang’s research since our DSS is illustrated by a real architecture for incident reaction.
Figure 3: MAS reaction architecture
Ontology is the most import pillar in that it supports the BN and ID pillars. For the
incident reaction system, ontology is defined using the Web Ontology Language (OWL).
Resource Development Frameworks (RDF) syntax is the most commonly used method
to model information in OWL. It may be implemented in web resources and is structured
based on the set [object, subject, trustValue (objet, subject), predicate]. Object and
6. subject are resources, predicate is an attribute or a relation used to describe a resource,
and trustValue has been added to reflect the trust value that the subject has on the object.
In BARWAN case study, the DSS decides to transfer an alert from the IDS to the
BuildingA_ACE, to forward that alert to an upper ACE, and to confirm the alert to the
PIE. On Fig 4., t [0,1] reflects the trust between the agents that play the role of the
components or between these agents and data sources. Fig. 4’s data are random for
illustration. The ontology permits to formalize the concept encompassed in the MAS
architecture as well as their relations. However, at the ontological level of formalization,
uncertainty challenge remains unaddressed and decision mechanism remain needed for
the agents to take the decision. OntoBayes is an extension of OWL with two features:
BN that address the uncertainty and ID that support the decision mechanism process.
ProbCell HasPParameters HasPValue
Cell_1 alert.severity=low|rescue.impact=low 0.8
Cell_2 alert.severity=medium|rescue.impact=low 0.4
Cell_3 alert.severity=high|rescue.impact=l 0.1
Cell_4 alert.severity=low|rescue.impact=medium 0.3
Cell_5 alert.severity=medium|rescue.impact=medium 0.9
Cell_6 alert.severity=high|rescue.impact=medium 0.5
Cell_7 alert.severity=low|rescue.impact=h 0.1
Cell_8 alert.severity=medium|rescue.impact=high 0.4
Cell_9 alert.severity=high|rescue.impact=high 0.7
Table 1: Bayesian probability
Figure 4: Inter components trust values
The Bayes theorem is used to calculate conditional probabilities. The calculation
depends on prior knowledge that could be considered as uncertain. E.g.: the probability
of high impact on the medical rescue if we have a medium severity alert beforehand. The
BNs extension introduces the parameters of that probability by specifying the following
two perspectives: qualitative and quantitative. The qualitative perspective specifies the
random variables explicitly as well as their dependencies and the later links quantitative
information to those variables using OWL. The specification of random variables and
their dependency is performed by introducing the new OWL property element
<owl:ObjectProperty rdf.ID=”dependsOn”/> [Ya07]. Accordingly, the qualitative
7. extension may be represented by 2 Bayesian graph models (Fig. 5). The ovals represent
Bayesian variables and the arrows specify their relations. The graph is to be read, e.g. 1.:
The alert that is forwarded from the BuildingB_ACE to the network upper ACE has
influence on the confirmation of the alert that is send from the CampusArea_ACE to the
CampusArea_PIE. E.g. 2.: The severity of the alert has influence on the action to send an
alert to the BuildingA_ACE. The last examples may be translated using the new OWL
dependsOn element as follows: The quantitative extension is performed in association
with the probability table of the Bayesian variables. In case of the BARWAN, Table 1
provides the quantitative probability P (Table I).
Figure 5: Bayesian graph models
Figure 6: ID’s graph model of alert transfer
Utility HasUParameters HasUValue
Cell_1 send(alert.BuildingA_ACE)=yes|severity.alert=low -80
Cell_2 send(alert.BuildingA_ACE)=yes|severity.alert=medium 50
Cell_3 send(alert.BuildingA_ACE)=yes|severity.alert=high 100
Cell_4 send(alert.BuildingA_ACE)=no|severity.alert=low 80
Cell_5 send(alert.BuildingA_ACE)=no|severity.alert=medium 40
Cell_6 send(alert.BuildingA_ACE)=no|severity.alert=high -100
Table 2: Utility for in lan ACE alert sending
8. IDs extension aims at representing and analyzing a decisional model to support the
decision making process. The review of the literature dealing with the issue of ID
[HM05, Je01] underlines that decision mechanisms are composed by three types of
nodes: 1) Chance nodes that represent variables, which are not controlled by the decision
maker, 2) Decision nodes that represent choices available for the decision maker, and 3)
Utility nodes that represent agent utility functions. Additionally, [TS90] explains that
three types of arcs express the relationship between the nodes: I) Information arcs
(isKnownBy) that point out the information that is indispensable for the decision maker,
II) Conditional arcs (influenceOn) that point out the probabilistic dependency on the
associated variable, and III) Functional arcs (attributeOf) that point out variables used
by utility nodes as decision criteria. Based on that structure of a decisional model, the
alert transfer may be represented in Fig. 6. Ovals stand for Chance nodes, rectangles
stand for Decision nodes, and diamonds stand for Utility nodes. The information arc
relates to all information observed to make a decision and the conditional arc relates to
data issued from Chance node and considered as evidence for the Decision nodes.
Additionally, to make a decision, the agent that takes the decision needs to have its
preferences quantified according to a set of attributes. The most important preference has
the higher value whereas the worst has the lower one. To achieve that, the Utility node is
associated with a utility table that gathers the preferences for all decision choices. Table
2 shows these preferences for the BuildingA_ACE alert sending decision and is
represented by the utility database in Fig. 3. As seen in Fig. 6, a sequential path between
all decisions exists. Indeed, some decision depends on previous decisions and as a
consequence, previous decisions (decision node) become chance nodes for next chance
node. This figure illustrates that send(alert.BuildingA_ACE) is at the same time a
decision node and a chance node that is known to be the decision node
alertForward2(BuildingA_ACE,CampusAreaACE).
The analyze of the DSS shows that, according to the BARWAN case study, the
probability of having a high impact on the rescue is meaningful (0.7) if the severity of
the alert is high (Table I, Cell_9). Hence, sending the alert to the BuildingA_ACE when
the alert severity is high has much utility (Table II, Cell_3). However, in the decision
process, the trust parameter is also to be taken into account: t=0.1 (for the severity
parameter). That reflects, E.g. that the severity is often badly evaluated. For others
parameters like the alert duration, the trust level is higher (t=0.6). As a consequence, if
we suppose that the impact on the rescue of the alert duration is important, this
parameter will be more meaningful, to the decision to send the alert to the
BuildingA_ACE than to the severity. On the contrary, if its impact on the rescue is low,
its value will accordingly be reduced. The impact of trust in the above paragraph is based
on two different parameters (severity and duration). Trust is moreover significant for a
decision based on parameters that provides the same information. E.g., in Fig. 6, the alert
is confirmed by the CampusArea_ACE to the CampusArea_PIE based on the alert
forwarded from the BuildingA_ACE (t=0.7) and from the BuildingB_ACE (t=0.6). In
that case, depending on the configuration of the DSS engine, the decision may be taken
whether based on the more trusted agent or on the average values weighted by trust. This
possible to use trust in IDS offers the advantage to refine the decision make by the MAS
not only regarding the value send by an agent but also based on the context in which the
agent evaluates or based on the previous data he has provided.
9. Although MAS has already been largely investigated in the field of crisis management,
linking the decision making process with trust values remains to the best of our
knowledge not significantly addressed. The review of the research performed in that
field reveals the plethora of efforts made to enhance the detection of attacks and to
correlate them with vulnerability databases [La99], to automate the reaction [BP04], and
to improve their performance [Ja99,AAPM04]. However, research aiming to ensure a
global reaction to attacks in order to avoid their propagation and/or to help the
administrator to deploy the appropriate reactions, remains restrained to some very
specific applications and domains like [RJCM03] that focuses on web services and
internet servers or [TCGN06] that proposes a protocol named ContagAlert, which is able
to propagate an alert while an attack is in progress. This protocol uses contagion
spreading behaviour and is consequently well tailored for wide spread network. The
inconvenient of it is that the decision for the alert propagation is based on threshold
behaviour and do not integrate the business constraints in the decision mechanism.
[IAA06] establishes a connection between the business and the technology but the
perspective of its analysis rather concerns the value associated with a well thought IDS
deployment strategy than IDS systems tailoring according to the business services.
[WFCR01] also proposes a cost benefit analysis for IDS that reflects the business needs
but does not accordingly parameterized the IDS. Trust and MAS in IDS has been
recently introduced by [BJGD04] and [RTPP07] under a technical perspective, but in
those last researches, as well as in the previously depicted, the alignment of a solution
utility with the business value has been omitted.
4 Conclusions
The paper presents a conceptual trusted incident reaction architecture based on a policy
regulation approach strategy. The solution is composed firstly with a MAS that offers the
advantage to react quickly and efficiently to an attack while being adapted for
heterogeneous and distributed networks. Secondly, with a decision support system that
helps agents to make decisions based on utility preference values and new requirements
coming along those architectures: the awareness of contextual information and the
integration trust weighted attributes. The architecture has been illustrated based on
BARWAN. Accordingly, the decision mechanism has been analyzed for the criticality of
the medical rescue operations while taking the trust in the IDS component into account.
Future works focuses on analysing the performance of the architecture.
This research was funded by the National Research Fund of Luxemburg in the context of
TITAN (Trust Assurance for Critical Infrastructures in Multi agents Environments, FNR
CO/08/IS/21) project.
References
[AAPM04] S. Antonatos, K.G. Anagnostakis, M. Polychronakis, E.P. Markatos: Performance
analysis of content matching intrusion detection systems. 4th
IEEE/IPSJ 2004.
[BJGD04] J. Bigham, X. Jin, D. Gamez, I. Djordjevic, C. Phillips: Dynamic Trust Management
10. of Semi-Automated Complex Systems. CCCT’04, Austin, USA, August 2004.
[BP04] Z.K. Baker; V.K. Prasanna: Automatic synthesis of efficient intrusion detection
systems on FPGAs, 14th Int. Conf. Field Program. Logic Appl., 2004, pp. 311-321.
[BPR99] F. Bellifemine; A. Poggi; G. Rimassa: JADE - A FIPA-compliant agent framework,
CSELT internal technical report. PAAM’99, London, April 1999, pp.97-108.
[BKAB98] E.A. Brewer, R.H. Katz, E. Amir, H. Balakrishnan, Y. Chawathe, A. Fox, S.D.
Gribble, T. Hodes, G. Nguyen, V.N. Padmanabhan, M. Stemm, S. Seshan, T.
Henderson: A network Architecture for Heterogeneous Mobile Computing, IEEE
Personal Communications Magazine.
[CM03] F. Cuppens, A. Miège: Modelling contexts in the Or-BAC model, 19th
Annual
Computer Security Applications Conference, Las Vegas, December, 2003.
[De07] IDMEF/RFC4765, Network Working Group: Debar, H., France Telecom; D. Curry,
Guardian; B. Feinstein, SecureWorks, Inc.; March 2007.
[FKA10] C. Feltus, D. Khadraoui, J. Aubert: A Security Decision-Reaction Architecture for
Heterogeneous Distributed Network, IEEE ARES 2010, Krakow, Poland.
[GKF09] B. Gâteau, D. Khadraoui, C. Feltus: Multi agents System Service based Platform in
Telecommunication Security Incident Reaction, IEEE GIIS 2009.
[HM05] R.A. Howard, J.E. Matheson: Influence diagrams. Decision Analysis, 2(3):127–143.
[IAA06] C. Iheagwara, F. Awan, Y. Acar, C. Miller: Maximizing the Benefits of Intrusion
Prevention Systems: Effective Deployments Strategies, 18th
FIRST 2006, Baltimore.
[IGAB06] C. Incoul, B. Gateau, J. Aubert, N. Bounoughaz, C. Feltus: If only I can trust my
police! SIM : an agent-based audit solution of access right deployment through open
network, CRISIS 2008, Tozeur, Tunisia.
[Ja99] K.A. Jackson: Intrusion Detection System (IDS) Product Survey, Distributed
Knowledge Systems Team; Information and Communications Division; 1999, Los
Alamos National Laboratory, Los Alamos, NM.
[Je01] F.V. Jensen: Bayesian networks and decision graphs. Springer, corr. print. ed, 2001.
[KCEV05] Y. Keleta, M. Coetzee, J.H.P. Eloff, H.S. Venter: Proposing a Secure XACML
architecture ensuring privacy and trust, 5th
ISSA, July 2005, ISBN 1-86854-625X.
[La56] H.D. Lasswell: The decision process; seven categories of functional analysis,
College of Business and Public Administration, University of Maryland, 1956.
[La99] L.J. LaPadula: State of the Art in Anomaly Detection and Reaction Technical Report
MP 99B0000020, Mitre, July 1999.
[MCCP06] U.M. Mbanaso, G.S. Cooper, D.W. Chadwick, S. Proctor: Privacy Preserving Trust
Authorization Framework Using XACML. UNSPECIFIED, ed. International
Workshop on Wireless Mobile Multimedia. IEEE Computer Society, pp. 673-678.
[RJCM03] J.C. Reynolds, J. Just, L. Clough, R. Maglich: On-Line Intrusion Detection and
Attack Prevention Using Diversity, Generate-and-Test, and Generalization,
HICSS’03, p.335.2.
[RTPP07] M. Rehak, J. Tozicka, M. Pechoucek, M. Prokopova, L. Foltyn: Autonomous
Protection Mechanism for Joint Networks in Coalition Operations, KIMAS 2007.
[TS90] J.A. Tatman, R.D. Shachter: Dynamic programming and influence diagrams. IEEE
Transactions on Systems, Man, and Cybernetics, 20(2):365–379, 1990.
[TCGN06] M. Treaster, W. Conner, I. Gupta, K. Nahrstedt: ContagAlert: Using Contagion
Theory for Adaptive, Distributed Alert Propagation, 5th
IEEE NCA 06.
[TPDB98] T.E. Truman, T. Pering, R. Doering, R.W. Brodersen: The InfoPad Multimedia
Terminal: A Portable Device for Wireless Information Access. IEEE Trans. Comput.
47, 10, 1998.
[WFCR01] H. Wei, D. Frinke, O. Carter, C. Ritter: Cost-benefit analysis for network intrusion
detection systems, 28th
CSI, Washington, USA, 2001.
[Ya07] Y. Yang, A framework for decision support systems adapted to uncertain knowledge,
PhD. Thesis, 2007. University of Karlsruhe.