Abstract. The complexity of today’s distributed computing environ-ments is such that the presence of bugs and security holes is statistically unavoidable. A very promising approach to this issue is to implement a self-protected system, similarly to a natural immune system which has the ability to detect the intrusion of foreign elements and react while it is still in progress. This paper describes an approach relying on component-based software engineering to ease the protection of distributed systems. The knowledge of the application architecture is used to detect foreign activities and to trigger counter measures. We focus on a mean to recognize known and unknown attacks independently from legacy software and avoiding false positives. Hen...
In this work we present the DESERT tool that allows the automatic generation of distributed monitori...
Abstract. The secure deployment of components is widely recognized as a cru-cial problem in componen...
Modern computing platforms have progressed to more secure environments with various defensive techni...
International audienceThe complexity of today's distributed computing environments is such that the ...
The complexity of today’s distributed computing environment is such that the presence of bugs and se...
The complexity of today's distributed computing environment is such that the presence of bugs a...
International audienceSelf-protection refers to the ability for a system to detect illegal behaviors...
Abstract — The complexity of today's distributed computing environment is such that the presenc...
This paper illustrates an approach to add security policies to a component-based system. We consider...
This paper illustrates an approach to add security policies to a component-based system. We consider...
Software systems, in particular component (or service) based software systems, are becoming highly d...
Today's software landscape features a high degree of complexity, frequent changes in requirements an...
Software engineering moved from traditional methods of software enterprise applications to com-ponen...
Industrial control applications are today software defined and networked, making them even more vuln...
Today’s software landscape features a high degree of complexity, frequent change and many uncertaint...
In this work we present the DESERT tool that allows the automatic generation of distributed monitori...
Abstract. The secure deployment of components is widely recognized as a cru-cial problem in componen...
Modern computing platforms have progressed to more secure environments with various defensive techni...
International audienceThe complexity of today's distributed computing environments is such that the ...
The complexity of today’s distributed computing environment is such that the presence of bugs and se...
The complexity of today's distributed computing environment is such that the presence of bugs a...
International audienceSelf-protection refers to the ability for a system to detect illegal behaviors...
Abstract — The complexity of today's distributed computing environment is such that the presenc...
This paper illustrates an approach to add security policies to a component-based system. We consider...
This paper illustrates an approach to add security policies to a component-based system. We consider...
Software systems, in particular component (or service) based software systems, are becoming highly d...
Today's software landscape features a high degree of complexity, frequent changes in requirements an...
Software engineering moved from traditional methods of software enterprise applications to com-ponen...
Industrial control applications are today software defined and networked, making them even more vuln...
Today’s software landscape features a high degree of complexity, frequent change and many uncertaint...
In this work we present the DESERT tool that allows the automatic generation of distributed monitori...
Abstract. The secure deployment of components is widely recognized as a cru-cial problem in componen...
Modern computing platforms have progressed to more secure environments with various defensive techni...