28,906 research outputs found

    Proposing a secure component-based-application logic and system’s integration testing approach

    Get PDF
    Software engineering moved from traditional methods of software enterprise applications to com-ponent based development for distributed system’s applications. This new era has grown up forlast few years, with component-based methods, for design and rapid development of systems, butfact is that , deployment of all secure software features of technology into practical e-commercedistributed systems are higher rated target for intruders. Although most of research has been con-ducted on web application services that use a large share of the present software, but on the otherside Component Based Software in the middle tier ,which rapidly develops application logic, alsoopen security breaching opportunities .This research paper focus on a burning issue for researchersand scientists ,a weakest link in component based distributed system, logical attacks, that cannotbe detected with any intrusion detection system within the middle tier e-commerce distributed ap-plications. We proposed An Approach of Secure Designing application logic for distributed system,while dealing with logically vulnerability issue

    Comparative Law as a Bridge Between the Nation-State and the Global Economy: An Essay for Herbert Bernstein

    Get PDF
    Professor Richard M. Buxbaum delivered the Fourth Annual Herbert L. Bernstein Memorial Lecture in Comparative Law in 2005 and this article is based on his remarks. The article is included in the inaugural volume of CICLOPs that collects the first six Bernstein lectures. In this paper, Richard Buxbaum is primarily concerned with the potential of comparative law as a method to bridge the disparities between the laws of nation-states and the needs of the globalized economy. Buxbaum investigates three separate roles for comparative law in closing this gap: First, he discusses the potential uses of comparative law with regard to the current primacy of national law over the increasingly transnational economic order. Second, he looks into the concern surrounding the growing need for national economic laws to move up a step; here, Buxbaum pays special attention to the problems and benefits created by federalism within both the American and the European systems. Thirdly, and finally, he tackles the elusiveness of what he calls “the slippery issue of ‘economic law’”. In dealing with each of these strands of thought, Buxbaum focuses predominantly on the European Union system and how comparative law can aid in its struggle not only to unify law, but also in efforts to coordinate law between national, sovereign entities. Due to the high degree of difference in the centralization of authority in the American system over the European Union, Buxbaum is able to cast into high relief the need for comparative law within Europe in the absence of a strong legislative body. Buxbaum uses comparative law to bridge the importance of national law in a transnational order with the challenges of achieving a unified economic law between nations, despite the inherent tension between the two concepts

    Towards alignment of architectural domains in security policy specifications

    Get PDF
    Large organizations need to align the security architecture across three different domains: access control, network layout and physical infrastructure. Security policy specification formalisms are usually dedicated to only one or two of these domains. Consequently, more than one policy has to be maintained, leading to alignment problems. Approaches from the area of model-driven security enable creating graphical models that span all three domains, but these models do not scale well in real-world scenarios with hundreds of applications and thousands of user roles. In this paper, we demonstrate the feasibility of aligning all three domains in a single enforceable security policy expressed in a Prolog-based formalism by using the Law Governed Interaction (LGI) framework. Our approach alleviates the limitations of policy formalisms that are domain-specific while helping to reach scalability by automatic enforcement provided by LGI

    Management and Service-aware Networking Architectures (MANA) for Future Internet Position Paper: System Functions, Capabilities and Requirements

    Get PDF
    Future Internet (FI) research and development threads have recently been gaining momentum all over the world and as such the international race to create a new generation Internet is in full swing: GENI, Asia Future Internet, Future Internet Forum Korea, European Union Future Internet Assembly (FIA). This is a position paper identifying the research orientation with a time horizon of 10 years, together with the key challenges for the capabilities in the Management and Service-aware Networking Architectures (MANA) part of the Future Internet (FI) allowing for parallel and federated Internet(s)

    Container-based network function virtualization for software-defined networks

    Get PDF
    Today's enterprise networks almost ubiquitously deploy middlebox services to improve in-network security and performance. Although virtualization of middleboxes attracts a significant attention, studies show that such implementations are still proprietary and deployed in a static manner at the boundaries of organisations, hindering open innovation. In this paper, we present an open framework to create, deploy and manage virtual network functions (NF)s in OpenFlow-enabled networks. We exploit container-based NFs to achieve low performance overhead, fast deployment and high reusability missing from today's NFV deployments. Through an SDN northbound API, NFs can be instantiated, traffic can be steered through the desired policy chain and applications can raise notifications. We demonstrate the systems operation through the development of exemplar NFs from common Operating System utility binaries, and we show that container-based NFV improves function instantiation time by up to 68% over existing hypervisor-based alternatives, and scales to one hundred co-located NFs while incurring sub-millisecond latency

    “A very orderly retreat”: Democratic transition in East Germany, 1989-90

    Get PDF
    East Germany's 1989-90 democratisation is among the best known of East European transitions, but does not lend itself to comparative analysis, due to the singular way in which political reform and democratic consolidation were subsumed by Germany's unification process. Yet aspects of East Germany's democratisation have proved amenable to comparative approaches. This article reviews the comparative literature that refers to East Germany, and finds a schism between those who designate East Germany's transition “regime collapse” and others who contend that it exemplifies “transition through extrication”. It inquires into the merits of each position and finds in favour of the latter. Drawing on primary and secondary literature, as well as archival and interview sources, it portrays a communist elite that was, to a large extent, prepared to adapt to changing circumstances and capable of learning from “reference states” such as Poland. Although East Germany was the Soviet state in which the positions of existing elites were most threatened by democratic transition, here too a surprising number succeeded in maintaining their position while filing across the bridge to market society. A concluding section outlines the alchemy through which their bureaucratic power was transmuted into property and influence in the “new Germany”
    corecore