2011
DOI: 10.21236/ada543839
|View full text |Cite
|
Sign up to set email alerts
|

Advances in the Acquisition of Secure Systems Based on Open Architectures

Abstract: The research presented at the symposium was supported by the Acquisition Chair of the Graduate School of Business & Public Policy at the Naval Postgraduate School. in its first seven years. The sheer volume of research products-almost 600 published papers (e.g., technical reports, journal articles, theses)-indicates the extent to which the depth and breadth of acquisition research has increased during these years. Over 300 authors contributed to these works, which means that the pool of those who have had sign… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…How to provide automated tools and practical techniques that provide (more) robust acceptance/compliance checking prior to a new system version being installed prior to going live in operation, seems to be an underspecified process enactment problem. Adding robust diversity mechanisms and capabilities for dramatically improving OA system security [11,17,30] remains an open question for further study. Once again, a case study can serve as a starting point for examining such issues and concerns, and this is our strategy.…”
Section: Related Research and Develop-ment Effortsmentioning
confidence: 99%
See 4 more Smart Citations
“…How to provide automated tools and practical techniques that provide (more) robust acceptance/compliance checking prior to a new system version being installed prior to going live in operation, seems to be an underspecified process enactment problem. Adding robust diversity mechanisms and capabilities for dramatically improving OA system security [11,17,30] remains an open question for further study. Once again, a case study can serve as a starting point for examining such issues and concerns, and this is our strategy.…”
Section: Related Research and Develop-ment Effortsmentioning
confidence: 99%
“…Security policy constraints for components, configured sub-systems, or an overall system are expressed and analyzed in a similar manner [30]. The ability to model and automatically analyze such obligations and rights is needed at build-time and release deployment-time.…”
Section: Architectural Design Processmentioning
confidence: 99%
See 3 more Smart Citations