Protecting information security availability via self-adapting intelligent agents

被引:0
|
作者
Fussell, Robby S. [1 ]
机构
[1] Nova SE Univ, AT&T Govt Solut, Ft Lauderdale, FL 33314 USA
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The information security model is composed of confidentiality, integrity, and availability. Availability is the area of information security that requires services and components to be continuously available for the user community. If a service or component is unavailable, confidentiality and integrity are meaningless. Network availability is the underlining component that must be existent in order for services to be accessible for end users. Developers have used redundancy to assist in ensuring that an application or network is available; however, this is a costly solution if many network components and services are involved.
引用
收藏
页码:2977 / 2982
页数:6
相关论文
共 37 条
  • [1] Creating Complex Applications Via Self-Adapting Autonomous Agents in an Intelligent System Framework
    Fuller, Tammy R.
    Deane, Gerald E.
    [J]. 2015 IEEE NINTH INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS - SASO 2015, 2015, : 164 - 165
  • [2] INTELLIGENT AND SELF-ADAPTING INTEGRATION BETWEEN MACHINES AND INFORMATION SYSTEMS
    Kern, Heiko
    Stefan, Fred
    Dimitrieski, Vladimir
    [J]. IADIS-INTERNATIONAL JOURNAL ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2015, 10 (01): : 47 - 63
  • [3] Self-adapting Security Monitoring in Eucalyptus
    Mahmood, Salman
    Yahaya, Nor Adnan
    Hasan, Raza
    Hussain, Saqib
    Malik, Mazhar Hussain
    Sarker, Kamal Uddin
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (03) : 80 - 93
  • [4] Self-adapting reactive autonomous agents
    Andrecut, M
    Ali, MK
    [J]. INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2000, 14 (18): : 1915 - 1926
  • [5] Self-adapting Intelligent Business Processes Execution Analysis
    Kriksciuniene, Dalia
    Strigunaite, Sandra
    [J]. BUSINESS INFORMATION SYSTEMS WORKSHOPS, 2010, 57 : 29 - 32
  • [6] Self-adapting Security Monitoring in Eucalyptus Cloud Environment
    School of Information Technology, Malaysia University of Science and Technology, Selangor, Malaysia
    不详
    不详
    不详
    [J]. Intl. J. Adv. Comput. Sci. Appl., 2158, 3 (80-93):
  • [7] I-navigate: Intelligent, self-adapting navigation maps
    Mayr, Herwig
    [J]. ECBS 2007: 14TH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS: RAISING EXPECTATIONS OF COMPUTER-BASES SYSTEMS, 2007, : 397 - 402
  • [8] A scalable and self-adapting notification framework for healthcare information systems
    Okorodudu, Anthony E.
    Fegaras, Leonidas
    Levine, David
    [J]. UNIVERSAL ACCESS IN THE INFORMATION SOCIETY, 2011, 10 (02) : 207 - 216
  • [9] Using self-adapting navigation data for intelligent, personalized vehicle guidance
    Vesely, Michal
    Mayr, Herwig
    [J]. COMPUTER AIDED SYSTEMS THEORY- EUROCAST 2007, 2007, 4739 : 1097 - 1104
  • [10] Self-adapting Unified Software Test for Network Information Processing
    Xiang, Liu Fu
    [J]. ADVANCES IN ELECTRONIC COMMERCE, WEB APPLICATION AND COMMUNICATION, VOL 1, 2012, 148 : 227 - 232