Fundamental Building Blocks for Security Interoperability in e-Business

2013 ◽  
pp. 118-141
Author(s):  
Muhammad Asim ◽  
Milan Petkovic

The e-business concept goes beyond traditional electronic enterprise systems that are typically owned and controlled by one company. In e-business systems the data is exchanged in a distributed environment where different components and systems are owned and controlled by different companies. This introduces two main challenges: (1) there is a need for adequate security mechanisms that can protect the data in an end-to-end manner (2) the security mechanisms deployed in e-Business systems must be interoperable to ensure that they work with the security mechanism of others’ systems. This chapter makes an overview of security mechanisms applicable to e-Business, as well as relevant security standards. The chapter also gives an outlook on novel approaches to e-Business security.

Author(s):  
Muhammad Asim ◽  
Milan Petkovic

The e-business concept goes beyond traditional electronic enterprise systems that are typically owned and controlled by one company. In e-business systems the data is exchanged in a distributed environment where different components and systems are owned and controlled by different companies. This introduces two main challenges: (1) there is a need for adequate security mechanisms that can protect the data in an end-to-end manner (2) the security mechanisms deployed in e-Business systems must be interoperable to ensure that they work with the security mechanism of others’ systems. This chapter makes an overview of security mechanisms applicable to e-Business, as well as relevant security standards. The chapter also gives an outlook on novel approaches to e-Business security.


Author(s):  
Senthil Murugan Nagarajan ◽  
Muthukumaran V. ◽  
Vinoth Kumar V. ◽  
Beschi I. S. ◽  
S. Magesh

The workflow between business and manufacturing system level is changing leading to delay in exploring the context of innovative ideas and solutions. Smart manufacturing systems progress rapid growth in integrating the operational capabilities of networking functionality and communication services with cloud-based enterprise architectures through runtime environment. Fine tuning aims to process intelligent management, flexible monitoring, dynamic network services using internet of things (IoT)-based service oriented architecture (SOA) solutions in numerous enterprise systems. SOA is an architectural pattern for building software business systems based on loosely coupled enterprise infrastructure services and components. The IoT-based SOA enterprise systems incorporate data elicitation, integrating agile methodologies, orchestrate underlying black-box services by promoting growth in manufacturer enterprises workflow. This chapter proposes the integration of standard workflow model between business system level and manufacturing production level with an IoT-enabled SOA framework.


2016 ◽  
Vol 186 ◽  
pp. 529-537 ◽  
Author(s):  
Oleg Gang

Nanoparticles, due to their broadly tunable functions, are major building blocks for generating new materials. However, building such materials for practical applications by self-assembly is quite challenging. Following the Faraday Discussion on “Nanoparticle Assembly: from Fundamentals to Applications” we discuss here the current trends in the field of self-assembly, including: understanding the unique interplay of molecular and nanoscale effects, a development of novel approaches for the creation of targeted nanoparticle architectures, advances in controlling dynamic behavior of systems and enabling new functions through specifically formed structures.


Author(s):  
Lijun Liao

This chapter deals with the issues concerning e-mail communication security. We analyze the most popular security mechanisms and standards related to the e-mail communication and identify potential threats and vulnerabilities. The most significant drawback of all current approaches is the impossibility of keeping headers information authentic. This leads to possible impersonation attacks and profiling of the e-mail communication, and encourages spam and phishing activities. Furthermore, none of the currently available security mechanisms supports partial signature generation of the e-mail content by distinct signers, which might be useful in commercial scenarios. To handle these problems, we suggest a new approach, called XMaiL, which can be considered as an advanced email security mechanism based on the popular XML technologies. The proposed XMaiL supersedes all currently available e-mail security standards in the sense of the higher flexibility and security.


2021 ◽  
Author(s):  
Mattia Giovanni Spina ◽  
Floriano De Rango ◽  
Gerardo Mario Marotta

2021 ◽  
Author(s):  
Stefan Frässle ◽  
Eduardo A. Aponte ◽  
Saskia Bollmann ◽  
Kay H. Brodersen ◽  
Cao T. Do ◽  
...  

ABSTRACTPsychiatry faces fundamental challenges with regard to mechanistically guided differential diagnosis, as well as prediction of clinical trajectories and treatment response of individual patients. This has motivated the genesis of two closely intertwined fields: (i) Translational Neuromodeling (TN), which develops “computational assays” for inferring patient-specific disease processes from neuroimaging, electrophysiological, and behavioral data; and (ii) Computational Psychiatry (CP), with the goal of incorporating computational assays into clinical decision making in everyday practice. In order to serve as objective and reliable tools for clinical routine, computational assays require end-to-end pipelines from raw data (input) to clinically useful information (output). While these are yet to be established in clinical practice, individual components of this general end-to-end pipeline are being developed and made openly available for community use.In this paper, we present the Translational Algorithms for Psychiatry-Advancing Science (TAPAS) software package, an open-source collection of building blocks for computational assays in psychiatry. Collectively, the tools in TAPAS presently cover several important aspects of the desired end-to-end pipeline, including: (i) tailored experimental designs and optimization of measurement strategy prior to data acquisition, (ii) quality control during data acquisition, and (iii) artifact correction, statistical inference, and clinical application after data acquisition. Here, we review the different tools within TAPAS and illustrate how these may help provide a deeper understanding of neural and cognitive mechanisms of disease, with the ultimate goal of establishing automatized pipelines for predictions about individual patients. We hope that the openly available tools in TAPAS will contribute to the further development of TN/CP and facilitate the translation of advances in computational neuroscience into clinically relevant computational assays.


Energies ◽  
2021 ◽  
Vol 14 (21) ◽  
pp. 6862
Author(s):  
Milan Stojkov ◽  
Nikola Dalčeković ◽  
Branko Markoski ◽  
Branko Milosavljević ◽  
Goran Sladić

The critical infrastructure is constantly under cyber and physical threats. Applying security controls without guidance or traceability can create a false sense of security. Security standards facilitate security knowledge and control best practices in a more systematic way. However, the number of standards is continually increasing. Product providers that operate in multiple geographical regions often face the obligation to comply with multiple standards simultaneously. This introduces the problem of the convenient interpretation of different standards. Thus, a comprehensive analysis of the requirements from different security standards and guidelines applicable to the smart grid has been performed to detect similarities that can be shaped into entities of the conceptual model for requirement representation. The purpose of the model—presented in a form of a Unified Modeling Language (UML) class diagram—is to give product providers a canonical way to map requirements from arbitrary standards, guidelines, and regulations and accelerate the cross-standard compliance readiness by defining priority for requirement implementation. In addition, the research showed that multiple vectors should impact the priority of the implementation of the security controls defined through the requirements: domain affiliation, the essence of the requirement, associated threats, risks, and social dependencies between actors involved in the implementation. To examine the model correctness, NISTIR 7628—de facto smart grid standard—was used to provide insights into how the model would be used for requirements implementation tracking. The structure of individual requirements was analyzed to detect the building blocks and extract relevant parts that can be mapped to the model components. Further, all requirements were classified into one of the defined domains to provide the basis for referencing similar requirements from different standards. Finally, one arbitrary requirement was used to demonstrate model usage, and depict all available information that can be provided to the users in a custom-made scenario where the need arises to have simultaneous alignment with three standards—NISTIR 7628, NIST 800-53, and IEC 62443-3-3.


Sign in / Sign up

Export Citation Format

Share Document