Buscar
Mostrando ítems 1-10 de 87
Ponencia
Definition and Verification of Security Configurations of Cyber-Physical Systems
(Springer, 2020)
The proliferation of Cyber-Physical Systems (CPSs) is rais ing serious security challenges. These are complex systems, integrating physical elements into automated networked systems, often containing a variety of devices, ...
Ponencia
Improving the Diagnosability of Business Process Management Systems Using Test Points
(Springer, 2010)
The management and automation of business processes have become an essential task within IT organizations, where the diagnosis is a very important issue, since it enables fault isolation in a business process. The ...
Ponencia
Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates
(IEEE Computer Society, 2008)
Filtering is a very important issue in next generation networks. These networks consist of a relatively high number of resource constrained devices with very special features, such as managing frequent topology changes. ...
Ponencia
Querying a Polynomial Object-Relational Constraint Database in Model-Based Diagnosis
(Springer, 2005)
Many papers related to Constraint Databases (CDBs) theories exist, including proposals that present frameworks for the treatment of constraints as a new data type. Our proposal presents a new way of storing and manipulating ...
Ponencia
AMADEUS: Towards the AutoMAteD secUrity teSting
(ACM: Association for Computing Machinery, 2020)
The proper configuration of systems has become a fundamental factor to avoid cybersecurity risks. Thereby, the analysis of cyber security vulnerabilities is a mandatory task, but the number of vul nerabilities and system ...
Ponencia
A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes
(Springer, 2012)
Risk management has become an essential mechanism for business and security analysts, since it enable the identification, evalu ation and treatment of any threats, vulnerabilities, and risks to which organizations maybe ...
Ponencia
Una propuesta usando Restricciones para la toma de decisiones en la tolerancia a fallos en procesos de negocio
(Mondragón Unibertsitatea, 2009)
Cuando un proceso de negocio no obtiene el objetivo que se propone será necesario realizar una diagnosis y detección de errores, descubriendo qué servicios están funcionando de forma incorrecta para su sustitución. El ...
Ponencia
Efficient algorithms and abstract data types for local inconsistency isolation in firewall ACLS
(Institute for Systems and Technologies of Information, Control and Communication (INSTICC), 2009)
Writing and managing firewall ACLs are hard, tedious, time-consuming and error-prone tasks for a wide range of reasons. During these tasks, inconsistent rules can be introduced. An inconsistent firewall ACL implies in ...
Ponencia
Constraint Databases Technology for Polynomial Models Diagnosis
(2004)
Model-based Diagnosis allows the identification of the parts which fail in a system. The models are based on the knowledge of the system to diagnose, and they can be represented by constraints associated to the components. ...
Ponencia
A heuristic polynomial algorithm for local inconsistency diagnosis in firewall rule sets
(SciTePress, 2008)
Firewall ACLs can contain inconsistencies. There is an inconsistency if different actions can be taken on the same flow of traffic, depending on the ordering of the rules. Inconsistent rules should be notified to the system ...