208 research outputs found

    Security and VO management capabilities in a large-scale Grid operating system

    Get PDF
    This paper presents a number of security and VO management capabilities in a large-scale distributed Grid operating system. The capabilities formed the basis of the design and implementation of a number of security and VO management services in the system. The main aim of the paper is to provide some idea of the various functionality cases that need to be considered when designing similar large-scale systems in the future

    A systematic literature review of evidence for the use of assistive exoskeletons in defence and security use cases

    Get PDF
    This is the final version. Available on open access from Taylor and Francis via the DOI in this recordData availability statement: Data to accompany this article have been made available in the supplementary materials.Advances in assistive exoskeleton technology, and a boom in related scientific literature, prompted a need to review the potential use of exoskeletons in defence and security. A systematic review examined the evidence for successful augmentation of human performance in activities deemed most relevant to military tasks. Categories of activities were determined a priori through literature scoping and Human Factors workshops with military stakeholders. Workshops identified promising opportunities and risks for integration of exoskeletons into military use cases. The review revealed promising evidence for exoskeletons' capacity to assist with load carriage, manual lifting, and working with tools. However, the review also revealed significant gaps in exoskeleton capabilities and likely performance levels required in the use case scenarios. Consequently, it was recommended that a future roadmap for introducing exoskeletons to military environments requires development of performance criteria for exoskeletons that can be used to implement a human-centred approach to research and development.Defence Science and Technology Laboratory (DSTL

    Modelling misuse cases as a means of capturing security requirements

    Get PDF
    Use cases as part of requirements engineering are often seen as an essential part of systems development in many methodologies. Given that modern, security-oriented software development methods such as SDL , SQUARE and CLASP place security at the forefront of product initiation, design and implementation, the focus of requirements elicitation must now move to capturing security requirements so as not to replicate past errors. Misuse cases can be an effective tool to model security requirements. This paper uses a case study to investigate the generation of successful misuse cases by employing the STRIDE framework as used in the SDL

    A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems

    Get PDF
    The primary goal of this paper is to develop a structured objectoriented security requirements analysis methodology for the elicitation and analysis of security requirements in embedded systems. There are several approaches to elicit, analyze and specify security requirements in embedded systems ranging from formal mathematical models for proof of certain security properties to informal methods that are easily understood. Applicability of formal security models is limited because they are complex and it is time consuming to develop. On the other hand, informal security requirements analysis methods are not integrated with conceptual models in requirements analysis, and although both external and internal threats have been dealt using use cases and misuse cases, they provide no process for analyzing both internal and external threats in a structured manner. This paper discusses a structured object-oriented security requirements analysis methodology for the elicitation and analysis of security requirements in embedded systems. It is capable of identifying hierarchically both external and internal threats posed by both external and internal actors of a system level by level. It is illustrated and validated by security requirements analysis for an advanced embedded power grid control system
    • …
    corecore