Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems
Identifieur interne : 000568 ( Main/Exploration ); précédent : 000567; suivant : 000569Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems
Auteurs : Yacov Y. Haimes [États-Unis] ; Clyde C. Chittister [États-Unis]Source :
- Systems Engineering [ 1098-1241 ] ; 2012-06.
Descripteurs français
- Pascal (Inist)
English descriptors
- KwdEn :
Abstract
Building on systems‐based philosophy, theory, methodology, and practice, the challenges associated with modeling, assessing, managing, and communicating the multidimensional risk to cyberinfrastructure systems (CIS) serviced by cloud computing technology (CCT) as systems of systems (SoS) are explored. The article raises concerns about the euphoria in the literature about CCT and stresses the importance of understanding the complex process of modeling, assessing, managing, and communicating the risks associated with CIS‐CCT. Several themes are highlighted: the theory of scenario structuring; the epistemology of the states of the CIS‐CCT systems; the role of systems integration in CIS‐CCT; the risk to CIS‐CCT from malicious insiders' intrusion; the complex definition and quantification of the risk function associated with CIS‐CCT systems; and modeling the multiple perspectives of CIS‐CCT, focusing on hierarchical holographic modeling (HHM) and phantom system models (PSM). The paper concludes with an epilogue and list of references. © 2011 Wiley Periodicals, Inc. Syst Eng
Url:
DOI: 10.1002/sys.20204
Affiliations:
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: 000118
- to stream Istex, to step Curation: 000118
- to stream Istex, to step Checkpoint: 000087
- to stream Main, to step Merge: 000569
- to stream PascalFrancis, to step Corpus: 000026
- to stream PascalFrancis, to step Curation: 000219
- to stream PascalFrancis, to step Checkpoint: 000016
- to stream Main, to step Merge: 000629
- to stream Main, to step Curation: 000568
Le document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems</title>
<author><name sortKey="Haimes, Yacov Y" sort="Haimes, Yacov Y" uniqKey="Haimes Y" first="Yacov Y." last="Haimes">Yacov Y. Haimes</name>
</author>
<author><name sortKey="Chittister, Clyde C" sort="Chittister, Clyde C" uniqKey="Chittister C" first="Clyde C." last="Chittister">Clyde C. Chittister</name>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:54A5844681AE8C22CF79E214AF0746DDC2AB7808</idno>
<date when="2012" year="2012">2012</date>
<idno type="doi">10.1002/sys.20204</idno>
<idno type="url">https://api.istex.fr/document/54A5844681AE8C22CF79E214AF0746DDC2AB7808/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000118</idno>
<idno type="wicri:Area/Istex/Curation">000118</idno>
<idno type="wicri:Area/Istex/Checkpoint">000087</idno>
<idno type="wicri:doubleKey">1098-1241:2012:Haimes Y:risk:to:cyberinfrastructure</idno>
<idno type="wicri:Area/Main/Merge">000569</idno>
<idno type="wicri:source">INIST</idno>
<idno type="RBID">Pascal:12-0273910</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">000026</idno>
<idno type="wicri:Area/PascalFrancis/Curation">000219</idno>
<idno type="wicri:Area/PascalFrancis/Checkpoint">000016</idno>
<idno type="wicri:doubleKey">1098-1241:2012:Haimes Y:risk:to:cyberinfrastructure</idno>
<idno type="wicri:Area/Main/Merge">000629</idno>
<idno type="wicri:Area/Main/Curation">000568</idno>
<idno type="wicri:Area/Main/Exploration">000568</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems</title>
<author><name sortKey="Haimes, Yacov Y" sort="Haimes, Yacov Y" uniqKey="Haimes Y" first="Yacov Y." last="Haimes">Yacov Y. Haimes</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<placeName><region type="state">Virginie</region>
</placeName>
<wicri:cityArea>Center for Risk Management, University of Virginia, Charlottesville</wicri:cityArea>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">États-Unis</country>
</affiliation>
</author>
<author><name sortKey="Chittister, Clyde C" sort="Chittister, Clyde C" uniqKey="Chittister C" first="Clyde C." last="Chittister">Clyde C. Chittister</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<placeName><region type="state">Pennsylvanie</region>
</placeName>
<wicri:cityArea>Software Engineering Institute, Carnegie Mellon University, Pittsburgh</wicri:cityArea>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">États-Unis</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="j">Systems Engineering</title>
<title level="j" type="abbrev">Syst. Engin.</title>
<idno type="ISSN">1098-1241</idno>
<idno type="eISSN">1520-6858</idno>
<imprint><publisher>Wiley Subscription Services, Inc., A Wiley Company</publisher>
<pubPlace>Hoboken</pubPlace>
<date type="published" when="2012-06">2012-06</date>
<biblScope unit="volume">15</biblScope>
<biblScope unit="issue">2</biblScope>
<biblScope unit="page" from="213">213</biblScope>
<biblScope unit="page" to="224">224</biblScope>
</imprint>
<idno type="ISSN">1098-1241</idno>
</series>
<idno type="istex">54A5844681AE8C22CF79E214AF0746DDC2AB7808</idno>
<idno type="DOI">10.1002/sys.20204</idno>
<idno type="ArticleID">SYS20204</idno>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">1098-1241</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass><keywords scheme="KwdEn" xml:lang="en"><term>Cloud computing</term>
<term>Computer security</term>
<term>Epistemology</term>
<term>Information system</term>
<term>Integration</term>
<term>Modeling</term>
<term>Risk management</term>
<term>Script</term>
<term>Stress</term>
<term>System architecture</term>
<term>Systems engineering</term>
<term>computing technology</term>
<term>cyberinfrastructure</term>
<term>modeling</term>
<term>risk</term>
<term>systems of systems</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr"><term>Architecture système</term>
<term>Epistémologie</term>
<term>Gestion risque</term>
<term>Informatique dans les nuages</term>
<term>Ingénierie système</term>
<term>Intégration</term>
<term>Modélisation</term>
<term>Scénario</term>
<term>Stress</term>
<term>Système information</term>
<term>Sécurité informatique</term>
</keywords>
</textClass>
<langUsage><language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Building on systems‐based philosophy, theory, methodology, and practice, the challenges associated with modeling, assessing, managing, and communicating the multidimensional risk to cyberinfrastructure systems (CIS) serviced by cloud computing technology (CCT) as systems of systems (SoS) are explored. The article raises concerns about the euphoria in the literature about CCT and stresses the importance of understanding the complex process of modeling, assessing, managing, and communicating the risks associated with CIS‐CCT. Several themes are highlighted: the theory of scenario structuring; the epistemology of the states of the CIS‐CCT systems; the role of systems integration in CIS‐CCT; the risk to CIS‐CCT from malicious insiders' intrusion; the complex definition and quantification of the risk function associated with CIS‐CCT systems; and modeling the multiple perspectives of CIS‐CCT, focusing on hierarchical holographic modeling (HHM) and phantom system models (PSM). The paper concludes with an epilogue and list of references. © 2011 Wiley Periodicals, Inc. Syst Eng</div>
</front>
</TEI>
<affiliations><list><country><li>États-Unis</li>
</country>
<region><li>Pennsylvanie</li>
<li>Virginie</li>
</region>
</list>
<tree><country name="États-Unis"><region name="Virginie"><name sortKey="Haimes, Yacov Y" sort="Haimes, Yacov Y" uniqKey="Haimes Y" first="Yacov Y." last="Haimes">Yacov Y. Haimes</name>
</region>
<name sortKey="Chittister, Clyde C" sort="Chittister, Clyde C" uniqKey="Chittister C" first="Clyde C." last="Chittister">Clyde C. Chittister</name>
<name sortKey="Chittister, Clyde C" sort="Chittister, Clyde C" uniqKey="Chittister C" first="Clyde C." last="Chittister">Clyde C. Chittister</name>
<name sortKey="Haimes, Yacov Y" sort="Haimes, Yacov Y" uniqKey="Haimes Y" first="Yacov Y." last="Haimes">Yacov Y. Haimes</name>
</country>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/CyberinfraV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000568 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 000568 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Ticri/CIDE |area= CyberinfraV1 |flux= Main |étape= Exploration |type= RBID |clé= ISTEX:54A5844681AE8C22CF79E214AF0746DDC2AB7808 |texte= Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems }}
This area was generated with Dilib version V0.6.25. |