Serveur d'exploration Cyberinfrastructure

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems

Identifieur interne : 000568 ( Main/Exploration ); précédent : 000567; suivant : 000569

Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems

Auteurs : Yacov Y. Haimes [États-Unis] ; Clyde C. Chittister [États-Unis]

Source :

RBID : ISTEX:54A5844681AE8C22CF79E214AF0746DDC2AB7808

Descripteurs français

English descriptors

Abstract

Building on systems‐based philosophy, theory, methodology, and practice, the challenges associated with modeling, assessing, managing, and communicating the multidimensional risk to cyberinfrastructure systems (CIS) serviced by cloud computing technology (CCT) as systems of systems (SoS) are explored. The article raises concerns about the euphoria in the literature about CCT and stresses the importance of understanding the complex process of modeling, assessing, managing, and communicating the risks associated with CIS‐CCT. Several themes are highlighted: the theory of scenario structuring; the epistemology of the states of the CIS‐CCT systems; the role of systems integration in CIS‐CCT; the risk to CIS‐CCT from malicious insiders' intrusion; the complex definition and quantification of the risk function associated with CIS‐CCT systems; and modeling the multiple perspectives of CIS‐CCT, focusing on hierarchical holographic modeling (HHM) and phantom system models (PSM). The paper concludes with an epilogue and list of references. © 2011 Wiley Periodicals, Inc. Syst Eng

Url:
DOI: 10.1002/sys.20204


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems</title>
<author>
<name sortKey="Haimes, Yacov Y" sort="Haimes, Yacov Y" uniqKey="Haimes Y" first="Yacov Y." last="Haimes">Yacov Y. Haimes</name>
</author>
<author>
<name sortKey="Chittister, Clyde C" sort="Chittister, Clyde C" uniqKey="Chittister C" first="Clyde C." last="Chittister">Clyde C. Chittister</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:54A5844681AE8C22CF79E214AF0746DDC2AB7808</idno>
<date when="2012" year="2012">2012</date>
<idno type="doi">10.1002/sys.20204</idno>
<idno type="url">https://api.istex.fr/document/54A5844681AE8C22CF79E214AF0746DDC2AB7808/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000118</idno>
<idno type="wicri:Area/Istex/Curation">000118</idno>
<idno type="wicri:Area/Istex/Checkpoint">000087</idno>
<idno type="wicri:doubleKey">1098-1241:2012:Haimes Y:risk:to:cyberinfrastructure</idno>
<idno type="wicri:Area/Main/Merge">000569</idno>
<idno type="wicri:source">INIST</idno>
<idno type="RBID">Pascal:12-0273910</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">000026</idno>
<idno type="wicri:Area/PascalFrancis/Curation">000219</idno>
<idno type="wicri:Area/PascalFrancis/Checkpoint">000016</idno>
<idno type="wicri:doubleKey">1098-1241:2012:Haimes Y:risk:to:cyberinfrastructure</idno>
<idno type="wicri:Area/Main/Merge">000629</idno>
<idno type="wicri:Area/Main/Curation">000568</idno>
<idno type="wicri:Area/Main/Exploration">000568</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems</title>
<author>
<name sortKey="Haimes, Yacov Y" sort="Haimes, Yacov Y" uniqKey="Haimes Y" first="Yacov Y." last="Haimes">Yacov Y. Haimes</name>
<affiliation wicri:level="2">
<country xml:lang="fr">États-Unis</country>
<placeName>
<region type="state">Virginie</region>
</placeName>
<wicri:cityArea>Center for Risk Management, University of Virginia, Charlottesville</wicri:cityArea>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">États-Unis</country>
</affiliation>
</author>
<author>
<name sortKey="Chittister, Clyde C" sort="Chittister, Clyde C" uniqKey="Chittister C" first="Clyde C." last="Chittister">Clyde C. Chittister</name>
<affiliation wicri:level="2">
<country xml:lang="fr">États-Unis</country>
<placeName>
<region type="state">Pennsylvanie</region>
</placeName>
<wicri:cityArea>Software Engineering Institute, Carnegie Mellon University, Pittsburgh</wicri:cityArea>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">États-Unis</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="j">Systems Engineering</title>
<title level="j" type="abbrev">Syst. Engin.</title>
<idno type="ISSN">1098-1241</idno>
<idno type="eISSN">1520-6858</idno>
<imprint>
<publisher>Wiley Subscription Services, Inc., A Wiley Company</publisher>
<pubPlace>Hoboken</pubPlace>
<date type="published" when="2012-06">2012-06</date>
<biblScope unit="volume">15</biblScope>
<biblScope unit="issue">2</biblScope>
<biblScope unit="page" from="213">213</biblScope>
<biblScope unit="page" to="224">224</biblScope>
</imprint>
<idno type="ISSN">1098-1241</idno>
</series>
<idno type="istex">54A5844681AE8C22CF79E214AF0746DDC2AB7808</idno>
<idno type="DOI">10.1002/sys.20204</idno>
<idno type="ArticleID">SYS20204</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">1098-1241</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="KwdEn" xml:lang="en">
<term>Cloud computing</term>
<term>Computer security</term>
<term>Epistemology</term>
<term>Information system</term>
<term>Integration</term>
<term>Modeling</term>
<term>Risk management</term>
<term>Script</term>
<term>Stress</term>
<term>System architecture</term>
<term>Systems engineering</term>
<term>computing technology</term>
<term>cyberinfrastructure</term>
<term>modeling</term>
<term>risk</term>
<term>systems of systems</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr">
<term>Architecture système</term>
<term>Epistémologie</term>
<term>Gestion risque</term>
<term>Informatique dans les nuages</term>
<term>Ingénierie système</term>
<term>Intégration</term>
<term>Modélisation</term>
<term>Scénario</term>
<term>Stress</term>
<term>Système information</term>
<term>Sécurité informatique</term>
</keywords>
</textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Building on systems‐based philosophy, theory, methodology, and practice, the challenges associated with modeling, assessing, managing, and communicating the multidimensional risk to cyberinfrastructure systems (CIS) serviced by cloud computing technology (CCT) as systems of systems (SoS) are explored. The article raises concerns about the euphoria in the literature about CCT and stresses the importance of understanding the complex process of modeling, assessing, managing, and communicating the risks associated with CIS‐CCT. Several themes are highlighted: the theory of scenario structuring; the epistemology of the states of the CIS‐CCT systems; the role of systems integration in CIS‐CCT; the risk to CIS‐CCT from malicious insiders' intrusion; the complex definition and quantification of the risk function associated with CIS‐CCT systems; and modeling the multiple perspectives of CIS‐CCT, focusing on hierarchical holographic modeling (HHM) and phantom system models (PSM). The paper concludes with an epilogue and list of references. © 2011 Wiley Periodicals, Inc. Syst Eng</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>États-Unis</li>
</country>
<region>
<li>Pennsylvanie</li>
<li>Virginie</li>
</region>
</list>
<tree>
<country name="États-Unis">
<region name="Virginie">
<name sortKey="Haimes, Yacov Y" sort="Haimes, Yacov Y" uniqKey="Haimes Y" first="Yacov Y." last="Haimes">Yacov Y. Haimes</name>
</region>
<name sortKey="Chittister, Clyde C" sort="Chittister, Clyde C" uniqKey="Chittister C" first="Clyde C." last="Chittister">Clyde C. Chittister</name>
<name sortKey="Chittister, Clyde C" sort="Chittister, Clyde C" uniqKey="Chittister C" first="Clyde C." last="Chittister">Clyde C. Chittister</name>
<name sortKey="Haimes, Yacov Y" sort="Haimes, Yacov Y" uniqKey="Haimes Y" first="Yacov Y." last="Haimes">Yacov Y. Haimes</name>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/CyberinfraV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000568 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 000568 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    CyberinfraV1
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     ISTEX:54A5844681AE8C22CF79E214AF0746DDC2AB7808
   |texte=   Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems
}}

Wicri

This area was generated with Dilib version V0.6.25.
Data generation: Thu Oct 27 09:30:58 2016. Site generation: Sun Mar 10 23:08:40 2024