Adaptive and service-oriented embedded system for information security applications

2019 ◽  
Vol 73 ◽  
pp. 145-154
Author(s):  
Chun-Hsian Huang ◽  
Huang-Yi Chen ◽  
Yao-Ying Tzeng ◽  
Peng-Yi Li
2012 ◽  
pp. 103-116 ◽  
Author(s):  
Guinevere Strack ◽  
Heather R. Luckarift ◽  
Glenn R. Johnson ◽  
Evgeny Katz

2020 ◽  
pp. 2401-2414
Author(s):  
Taewoo Nam

Government 3.0 emerged as a new paradigm of the government workings in Korea. The previous administration's (2013–2017) strong pledge for public sector reform through the Government 3.0 initiative envisions a transparent, competent, and service-oriented government. The paper, with comparison of the Government 3.0 initiative with Government 2.0 as a precedent paradigm and national initiatives of other countries, discusses what kind of challenges the initiative faces and how the government could overcome the challenges. Government 3.0 seems like a policy package of diverse programs. Novel is how the policy package is labeled rather than what the substance is. The initiative delivers normative messages to public employees. Prioritizing quantitative transparency may cause such a side effect as extra tasks of public employees and failure in guaranteeing information security and accuracy. Since a policy package differs and varies with the administration and political parties, what the initiative sheds light on may not last long after the presidential term.


2020 ◽  
pp. 133-153
Author(s):  
Eric Grandry ◽  
Christophe Feltus ◽  
Eric Dubois

Enterprise architecture management provides the mechanism for governing enterprise transformations required by changes in the environment. In this article, the authors focus on changes that result from the analysis of information system risks and of their impacts on the services delivered by the enterprise. The authors present how the concepts of an information system risks management domain can be integrated into the ArchiMate enterprise architecture modelling language. This article approaches the conceptual integration in two design cycles: first, this article will consider information security risks, and then the authors generalize to information system risks. Additionally, the authors illustrate the application of the proposed approach and demonstrate the benefits of the integrated model through the handling of a case study, first in the domain of information security, and then in the domain of information privacy. The generalized risk-oriented EA model leads to a risk integration framework for the service-oriented enterprise.


2009 ◽  
Vol 4 (10) ◽  
Author(s):  
Wei Hu ◽  
Tianzhou Chen ◽  
Qingsong Shi ◽  
Gang Wang ◽  
Nan Zhang ◽  
...  

2013 ◽  
Vol 284-287 ◽  
pp. 3423-3427
Author(s):  
Hung Wei Chang ◽  
Che Wun Chiou ◽  
Wen Yew Liang ◽  
Jenq Haur Wang

Information security is getting more important due to the highly-developed computer technologies. The information security is heavily dependent on cryptosystems such as RSA and elliptic curve cryptosystem (ECC). ECC is suitable for the resource-constrained devices such as embedded system or hand-held devices because ECC can achieve the same security level but uses less cost as compared to RSA. Galois/Finite field multiplication is the most crucial operation in ECC. There are three popular bases in finite field in GF(2m), polynomial basis (PB), normal basis (NB), and dual basis (DB). A low-complexity bit-parallel DB multiplier which employs multiplexer approach is presented in this paper. While comparing with other related works, the proposed DB multiplier saves at least 20% space complexity.


Sign in / Sign up

Export Citation Format

Share Document