Distributed component platforms isolate much of the conceptual and technical complexity involved in constructing component-based applications. The authors examine the concepts underlying DCPs, the two market leaders-Microsoft's DCOM and Sun's JavaBeans-and emerging Internet and OMG standards.
Cyber attacks continue to proliferate, with increasing sophistication and severity. Businesses and government agencies must establish robust governance, cultures, and data management processes to minimize vulnerability to such threats and ensure effective responses. Capability Maturity Models (CMMs) have been proposed to address this critical need; they enable organizations to benchmark their Cyber Security processes against a framework of recognized best practices. Unfortunately, CMMs are inherently static and diagnostic: they help identify maturity gaps, but are not directly actionable. This paper describes how to extend an existing Cyber Security CMM into a dynamic performance management framework through an intuitive Model-Simulate-Analyze methodology. This softwarebased framework enables organizations to formulate plans for improving their Cyber Security maturity levels; test and validate or refine those plans prior to roll-out; and monitor execution results to detect emerging problems and make appropriate midcourse adjustments to ensure success.
or "brittle"), mediated by only one or several individuals Abstract-DynNetSim is a dynamic network software platform * "Hub" individuals, whose connections (and influence) are for modeling and analyzing social and other networks as they so extensive that their departure would seriously evolve over time. DynNetSim combines stochastic modeling with * * * * -fa behavioral simulation framework that synthesizes system crom iser nal cailities oerformance dynamics and computational agent paradigms. The resultingFrom an internal perspective, these network features framework provides a holistic depiction of networks responding represent targets for remediation efforts by organizations, such to influences of environmental forces, trends, and disruptive as reassignments; reorganization; or training, communication events. In social networks comprised of intentional (goal-and incentive programs. Resolving these flaws can improve directed) entities such as terrorist groups, such responses may resiliency and performance substantially. From an external encompass opportunistic and adaptive behaviors. DynNetSim perspective, network anomalies represent opportunities for also enables exploration of the likely impacts of prospective . ' strategies to change networks, such as attacking adversaries' adversaries to exploit and attack for strategic advantage. In social networks or reducing vulnerabilities in our own critical both cases, network analysis focuses attention and resources infrastructure systems. DynNetSim can enhance diverse counter-on critical weaknesses to address. terrorism activities including intelligence analysis; critical Until recently, social network analysis has been confined infrastructure protection; and preparedness planning.largely to static models. Static methods entail obvious limitations in tracking changes in network structure over time.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.