2022
DOI: 10.3897/jucs.66857
|View full text |Cite
|
Sign up to set email alerts
|

SoREn, How Dynamic Software Update Tools Can Help Cybersecurity Systems to Improve Monitoring and Actions

Abstract: Because stopping a service to apply updates raises issues, Dynamic Software Updating studies the application of updates on programs without disrupting the services they provide. This is acheived using specific mechanisms operating updating tasks such as the modification of the program state. To acheive transparency, Dynamic Software Updating systems use pre-selected and pre-configured mechanisms. Developers provide patches that are transparently converted to dynamic updates. The cost of such transparency is of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Within the autonomous area, the university information resource management system controls the precise execution of grid tasks within the virtual organization [34][35][36]. Such a hierarchical information resource management strategy in colleges and universities satisfies the requirements of virtual organization autonomy to the greatest extent.…”
Section: E Mechanism Of Optimal Allocation Of Regional Higher Educati...mentioning
confidence: 99%
“…Within the autonomous area, the university information resource management system controls the precise execution of grid tasks within the virtual organization [34][35][36]. Such a hierarchical information resource management strategy in colleges and universities satisfies the requirements of virtual organization autonomy to the greatest extent.…”
Section: E Mechanism Of Optimal Allocation Of Regional Higher Educati...mentioning
confidence: 99%
“…AI regulations must raise trust levels and encourage users to upload their private information online. Policymakers and legislators should collaborate to develop a robust artificial intelligence regulatory framework and control systems for the preventing abuse of personal data [143]. In addition, global-scale agreements must be adopted with common goals that are flexible and accommodate global contexts.…”
Section: Smart Governancementioning
confidence: 99%
“…The Identity Management and Access Control objective complements the practices declared in ISO 29146, NIST SP 800-205 and the ISO 24760 family, for which reason it proposes the following capabilities: 55) Management of identities and credentials for users and devices [99]; 56) Access and Physical Protection [100]; 57) Remote Access [101]; 58) Permits with less privilege and segregation of duties [102]; 59) Integrity and Segregation [103] In the Protective Technology objective, recommended practices are included in NIST SP 800-160, NIST SP 800-40, NIST SP 800-86, CMMi, ISO 62443 data protection [106], the maturity model for web applications against cyber-attacks based on in OSWAP [107], and the Action Plan for the implementation of an ICAO Cybersecurity Strategy, the proposed capabilities are: 69) Cryptography [108]; 70) Personnel and Assignment of Cybersecurity Roles [109]; 71) Security in Unattended Systems and Unconnected Assets [110]; 72) Resilience in capacity to ensure availability [111]; 73) Baseline and Update [112]; 74) Vulnerability Management [113]; 75) Guarantee of Integrity and Non-repudiation [114]; 76) Safeguards [115]; 77) Antivirus Protection [116] [117]; 87) Firewall, protection of networks and communications [59]; 88) Deployment Resilience Techniques [118]; 89) Technology Monitoring [119] and 90) Security Architecture [120].…”
Section: List Of Objectives Capabilities and Specification Of Require...mentioning
confidence: 99%