Serveur d'exploration Cyberinfrastructure

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems

Identifieur interne : 000118 ( Istex/Corpus ); précédent : 000117; suivant : 000119

Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems

Auteurs : Yacov Y. Haimes ; Clyde C. Chittister

Source :

RBID : ISTEX:54A5844681AE8C22CF79E214AF0746DDC2AB7808

English descriptors

Abstract

Building on systems‐based philosophy, theory, methodology, and practice, the challenges associated with modeling, assessing, managing, and communicating the multidimensional risk to cyberinfrastructure systems (CIS) serviced by cloud computing technology (CCT) as systems of systems (SoS) are explored. The article raises concerns about the euphoria in the literature about CCT and stresses the importance of understanding the complex process of modeling, assessing, managing, and communicating the risks associated with CIS‐CCT. Several themes are highlighted: the theory of scenario structuring; the epistemology of the states of the CIS‐CCT systems; the role of systems integration in CIS‐CCT; the risk to CIS‐CCT from malicious insiders' intrusion; the complex definition and quantification of the risk function associated with CIS‐CCT systems; and modeling the multiple perspectives of CIS‐CCT, focusing on hierarchical holographic modeling (HHM) and phantom system models (PSM). The paper concludes with an epilogue and list of references. © 2011 Wiley Periodicals, Inc. Syst Eng

Url:
DOI: 10.1002/sys.20204

Links to Exploration step

ISTEX:54A5844681AE8C22CF79E214AF0746DDC2AB7808

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems</title>
<author>
<name sortKey="Haimes, Yacov Y" sort="Haimes, Yacov Y" uniqKey="Haimes Y" first="Yacov Y." last="Haimes">Yacov Y. Haimes</name>
<affiliation>
<mods:affiliation>Center for Risk Management, University of Virginia, Charlottesville, VA 22903</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: haimes@virginia.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Chittister, Clyde C" sort="Chittister, Clyde C" uniqKey="Chittister C" first="Clyde C." last="Chittister">Clyde C. Chittister</name>
<affiliation>
<mods:affiliation>Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA 15213</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: cc@sei.cmu.edu</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:54A5844681AE8C22CF79E214AF0746DDC2AB7808</idno>
<date when="2012" year="2012">2012</date>
<idno type="doi">10.1002/sys.20204</idno>
<idno type="url">https://api.istex.fr/document/54A5844681AE8C22CF79E214AF0746DDC2AB7808/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000118</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems</title>
<author>
<name sortKey="Haimes, Yacov Y" sort="Haimes, Yacov Y" uniqKey="Haimes Y" first="Yacov Y." last="Haimes">Yacov Y. Haimes</name>
<affiliation>
<mods:affiliation>Center for Risk Management, University of Virginia, Charlottesville, VA 22903</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: haimes@virginia.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Chittister, Clyde C" sort="Chittister, Clyde C" uniqKey="Chittister C" first="Clyde C." last="Chittister">Clyde C. Chittister</name>
<affiliation>
<mods:affiliation>Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA 15213</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: cc@sei.cmu.edu</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="j">Systems Engineering</title>
<title level="j" type="abbrev">Syst. Engin.</title>
<idno type="ISSN">1098-1241</idno>
<idno type="eISSN">1520-6858</idno>
<imprint>
<publisher>Wiley Subscription Services, Inc., A Wiley Company</publisher>
<pubPlace>Hoboken</pubPlace>
<date type="published" when="2012-06">2012-06</date>
<biblScope unit="volume">15</biblScope>
<biblScope unit="issue">2</biblScope>
<biblScope unit="page" from="213">213</biblScope>
<biblScope unit="page" to="224">224</biblScope>
</imprint>
<idno type="ISSN">1098-1241</idno>
</series>
<idno type="istex">54A5844681AE8C22CF79E214AF0746DDC2AB7808</idno>
<idno type="DOI">10.1002/sys.20204</idno>
<idno type="ArticleID">SYS20204</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">1098-1241</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="KwdEn" xml:lang="en">
<term>computing technology</term>
<term>cyberinfrastructure</term>
<term>modeling</term>
<term>risk</term>
<term>systems of systems</term>
</keywords>
</textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Building on systems‐based philosophy, theory, methodology, and practice, the challenges associated with modeling, assessing, managing, and communicating the multidimensional risk to cyberinfrastructure systems (CIS) serviced by cloud computing technology (CCT) as systems of systems (SoS) are explored. The article raises concerns about the euphoria in the literature about CCT and stresses the importance of understanding the complex process of modeling, assessing, managing, and communicating the risks associated with CIS‐CCT. Several themes are highlighted: the theory of scenario structuring; the epistemology of the states of the CIS‐CCT systems; the role of systems integration in CIS‐CCT; the risk to CIS‐CCT from malicious insiders' intrusion; the complex definition and quantification of the risk function associated with CIS‐CCT systems; and modeling the multiple perspectives of CIS‐CCT, focusing on hierarchical holographic modeling (HHM) and phantom system models (PSM). The paper concludes with an epilogue and list of references. © 2011 Wiley Periodicals, Inc. Syst Eng</div>
</front>
</TEI>
<istex>
<corpusName>wiley</corpusName>
<author>
<json:item>
<name>Yacov Y. Haimes</name>
<affiliations>
<json:string>Center for Risk Management, University of Virginia, Charlottesville, VA 22903</json:string>
<json:string>E-mail: haimes@virginia.edu</json:string>
</affiliations>
</json:item>
<json:item>
<name>Clyde C. Chittister</name>
<affiliations>
<json:string>Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA 15213</json:string>
<json:string>E-mail: cc@sei.cmu.edu</json:string>
</affiliations>
</json:item>
</author>
<subject>
<json:item>
<lang>
<json:string>eng</json:string>
</lang>
<value>computing technology</value>
</json:item>
<json:item>
<lang>
<json:string>eng</json:string>
</lang>
<value>risk</value>
</json:item>
<json:item>
<lang>
<json:string>eng</json:string>
</lang>
<value>cyberinfrastructure</value>
</json:item>
<json:item>
<lang>
<json:string>eng</json:string>
</lang>
<value>systems of systems</value>
</json:item>
<json:item>
<lang>
<json:string>eng</json:string>
</lang>
<value>modeling</value>
</json:item>
</subject>
<articleId>
<json:string>SYS20204</json:string>
</articleId>
<language>
<json:string>eng</json:string>
</language>
<originalGenre>
<json:string>article</json:string>
</originalGenre>
<abstract>Building on systems‐based philosophy, theory, methodology, and practice, the challenges associated with modeling, assessing, managing, and communicating the multidimensional risk to cyberinfrastructure systems (CIS) serviced by cloud computing technology (CCT) as systems of systems (SoS) are explored. The article raises concerns about the euphoria in the literature about CCT and stresses the importance of understanding the complex process of modeling, assessing, managing, and communicating the risks associated with CIS‐CCT. Several themes are highlighted: the theory of scenario structuring; the epistemology of the states of the CIS‐CCT systems; the role of systems integration in CIS‐CCT; the risk to CIS‐CCT from malicious insiders' intrusion; the complex definition and quantification of the risk function associated with CIS‐CCT systems; and modeling the multiple perspectives of CIS‐CCT, focusing on hierarchical holographic modeling (HHM) and phantom system models (PSM). The paper concludes with an epilogue and list of references. © 2011 Wiley Periodicals, Inc. Syst Eng</abstract>
<qualityIndicators>
<score>6.8</score>
<pdfVersion>1.3</pdfVersion>
<pdfPageSize>612 x 792 pts (letter)</pdfPageSize>
<refBibsNative>true</refBibsNative>
<keywordCount>5</keywordCount>
<abstractCharCount>1085</abstractCharCount>
<pdfWordCount>8872</pdfWordCount>
<pdfCharCount>57664</pdfCharCount>
<pdfPageCount>12</pdfPageCount>
<abstractWordCount>150</abstractWordCount>
</qualityIndicators>
<title>Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems</title>
<genre>
<json:string>article</json:string>
</genre>
<host>
<volume>15</volume>
<publisherId>
<json:string>SYS</json:string>
</publisherId>
<pages>
<total>12</total>
<last>224</last>
<first>213</first>
</pages>
<issn>
<json:string>1098-1241</json:string>
</issn>
<issue>2</issue>
<subject>
<json:item>
<value>Regular Paper</value>
</json:item>
</subject>
<genre>
<json:string>journal</json:string>
</genre>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1520-6858</json:string>
</eissn>
<title>Systems Engineering</title>
<doi>
<json:string>10.1002/(ISSN)1520-6858</json:string>
</doi>
</host>
<publicationDate>2012</publicationDate>
<copyrightDate>2012</copyrightDate>
<doi>
<json:string>10.1002/sys.20204</json:string>
</doi>
<id>54A5844681AE8C22CF79E214AF0746DDC2AB7808</id>
<score>0.3254118</score>
<fulltext>
<json:item>
<original>true</original>
<mimetype>application/pdf</mimetype>
<extension>pdf</extension>
<uri>https://api.istex.fr/document/54A5844681AE8C22CF79E214AF0746DDC2AB7808/fulltext/pdf</uri>
</json:item>
<json:item>
<original>false</original>
<mimetype>application/zip</mimetype>
<extension>zip</extension>
<uri>https://api.istex.fr/document/54A5844681AE8C22CF79E214AF0746DDC2AB7808/fulltext/zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/document/54A5844681AE8C22CF79E214AF0746DDC2AB7808/fulltext/tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems</title>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<publisher>Wiley Subscription Services, Inc., A Wiley Company</publisher>
<pubPlace>Hoboken</pubPlace>
<availability>
<p>Copyright © 2011 Wiley Periodicals, Inc.</p>
</availability>
<date>2012</date>
</publicationStmt>
<sourceDesc>
<biblStruct type="inbook">
<analytic>
<title level="a" type="main" xml:lang="en">Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems</title>
<author xml:id="author-1">
<persName>
<forename type="first">Yacov Y.</forename>
<surname>Haimes</surname>
</persName>
<email>haimes@virginia.edu</email>
<affiliation>Center for Risk Management, University of Virginia, Charlottesville, VA 22903</affiliation>
</author>
<author xml:id="author-2">
<persName>
<forename type="first">Clyde C.</forename>
<surname>Chittister</surname>
</persName>
<email>cc@sei.cmu.edu</email>
<affiliation>Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA 15213</affiliation>
</author>
</analytic>
<monogr>
<title level="j">Systems Engineering</title>
<title level="j" type="abbrev">Syst. Engin.</title>
<idno type="pISSN">1098-1241</idno>
<idno type="eISSN">1520-6858</idno>
<idno type="DOI">10.1002/(ISSN)1520-6858</idno>
<imprint>
<publisher>Wiley Subscription Services, Inc., A Wiley Company</publisher>
<pubPlace>Hoboken</pubPlace>
<date type="published" when="2012-06"></date>
<biblScope unit="volume">15</biblScope>
<biblScope unit="issue">2</biblScope>
<biblScope unit="page" from="213">213</biblScope>
<biblScope unit="page" to="224">224</biblScope>
</imprint>
</monogr>
<idno type="istex">54A5844681AE8C22CF79E214AF0746DDC2AB7808</idno>
<idno type="DOI">10.1002/sys.20204</idno>
<idno type="ArticleID">SYS20204</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<creation>
<date>2012</date>
</creation>
<langUsage>
<language ident="en">en</language>
</langUsage>
<abstract xml:lang="en">
<p>Building on systems‐based philosophy, theory, methodology, and practice, the challenges associated with modeling, assessing, managing, and communicating the multidimensional risk to cyberinfrastructure systems (CIS) serviced by cloud computing technology (CCT) as systems of systems (SoS) are explored. The article raises concerns about the euphoria in the literature about CCT and stresses the importance of understanding the complex process of modeling, assessing, managing, and communicating the risks associated with CIS‐CCT. Several themes are highlighted: the theory of scenario structuring; the epistemology of the states of the CIS‐CCT systems; the role of systems integration in CIS‐CCT; the risk to CIS‐CCT from malicious insiders' intrusion; the complex definition and quantification of the risk function associated with CIS‐CCT systems; and modeling the multiple perspectives of CIS‐CCT, focusing on hierarchical holographic modeling (HHM) and phantom system models (PSM). The paper concludes with an epilogue and list of references. © 2011 Wiley Periodicals, Inc. Syst Eng</p>
</abstract>
<textClass xml:lang="en">
<keywords scheme="keyword">
<list>
<head>keywords</head>
<item>
<term>computing technology</term>
</item>
<item>
<term>risk</term>
</item>
<item>
<term>cyberinfrastructure</term>
</item>
<item>
<term>systems of systems</term>
</item>
<item>
<term>modeling</term>
</item>
</list>
</keywords>
</textClass>
<textClass>
<keywords scheme="Journal Subject">
<list>
<head>article-category</head>
<item>
<term>Regular Paper</term>
</item>
</list>
</keywords>
</textClass>
</profileDesc>
<revisionDesc>
<change when="2011-03-18">Received</change>
<change when="2011-09-29">Registration</change>
<change when="2012-06">Published</change>
</revisionDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<original>false</original>
<mimetype>text/plain</mimetype>
<extension>txt</extension>
<uri>https://api.istex.fr/document/54A5844681AE8C22CF79E214AF0746DDC2AB7808/fulltext/txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="Wiley, elements deleted: body">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8" standalone="yes"</istex:xmlDeclaration>
<istex:document>
<component version="2.0" type="serialArticle" xml:lang="en">
<header>
<publicationMeta level="product">
<publisherInfo>
<publisherName>Wiley Subscription Services, Inc., A Wiley Company</publisherName>
<publisherLoc>Hoboken</publisherLoc>
</publisherInfo>
<doi registered="yes">10.1002/(ISSN)1520-6858</doi>
<issn type="print">1098-1241</issn>
<issn type="electronic">1520-6858</issn>
<idGroup>
<id type="product" value="SYS"></id>
</idGroup>
<titleGroup>
<title type="main" xml:lang="en" sort="SYSTEMS ENGINEERING">Systems Engineering</title>
<title type="short">Syst. Engin.</title>
</titleGroup>
</publicationMeta>
<publicationMeta level="part" position="20">
<doi origin="wiley" registered="yes">10.1002/sys.v15.2</doi>
<numberingGroup>
<numbering type="journalVolume" number="15">15</numbering>
<numbering type="journalIssue">2</numbering>
</numberingGroup>
<coverDate startDate="2012-06">Summer 2012</coverDate>
</publicationMeta>
<publicationMeta level="unit" type="article" position="70" status="forIssue">
<doi origin="wiley" registered="yes">10.1002/sys.20204</doi>
<idGroup>
<id type="unit" value="SYS20204"></id>
</idGroup>
<countGroup>
<count type="pageTotal" number="12"></count>
</countGroup>
<titleGroup>
<title type="articleCategory">Regular Paper</title>
<title type="tocHeading1">Regular Papers</title>
</titleGroup>
<copyright ownership="publisher">Copyright © 2011 Wiley Periodicals, Inc.</copyright>
<eventGroup>
<event type="manuscriptReceived" date="2011-03-18"></event>
<event type="manuscriptRevised" date="2011-07-26"></event>
<event type="manuscriptAccepted" date="2011-09-29"></event>
<event type="xmlConverted" agent="Converter:JWSART34_TO_WML3G version:3.1.3 standalone mode:FullText" date="2012-04-20"></event>
<event type="publishedOnlineEarlyUnpaginated" date="2012-02-09"></event>
<event type="firstOnline" date="2012-02-09"></event>
<event type="publishedOnlineFinalForm" date="2012-04-20"></event>
<event type="xmlConverted" agent="Converter:WILEY_ML3G_TO_WILEY_ML3GV2 version:3.8.8" date="2014-02-10"></event>
<event type="xmlConverted" agent="Converter:WML3G_To_WML3G version:4.3.4 mode:FullText" date="2015-02-24"></event>
</eventGroup>
<numberingGroup>
<numbering type="pageFirst">213</numbering>
<numbering type="pageLast">224</numbering>
</numberingGroup>
<linkGroup>
<link type="toTypesetVersion" href="file:SYS.SYS20204.pdf"></link>
</linkGroup>
</publicationMeta>
<contentMeta>
<countGroup>
<count type="figureTotal" number="1"></count>
<count type="tableTotal" number="0"></count>
<count type="referenceTotal" number="30"></count>
</countGroup>
<titleGroup>
<title type="main" xml:lang="en">Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems</title>
<title type="short" xml:lang="en">RISK TO CYBERINFRASTRUCTURE SYSTEMS SERVED BY CCT AS SoS</title>
</titleGroup>
<creators>
<creator xml:id="au1" creatorRole="author" affiliationRef="#af1">
<personName>
<givenNames>Yacov Y.</givenNames>
<familyName>Haimes</familyName>
</personName>
<contactDetails>
<email>haimes@virginia.edu</email>
</contactDetails>
</creator>
<creator xml:id="au2" creatorRole="author" affiliationRef="#af2">
<personName>
<givenNames>Clyde C.</givenNames>
<familyName>Chittister</familyName>
</personName>
<contactDetails>
<email>cc@sei.cmu.edu</email>
</contactDetails>
</creator>
</creators>
<affiliationGroup>
<affiliation xml:id="af1" countryCode="US" type="organization">
<unparsedAffiliation>Center for Risk Management, University of Virginia, Charlottesville, VA 22903</unparsedAffiliation>
</affiliation>
<affiliation xml:id="af2" countryCode="US" type="organization">
<unparsedAffiliation>Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA 15213</unparsedAffiliation>
</affiliation>
</affiliationGroup>
<keywordGroup xml:lang="en" type="author">
<keyword xml:id="kwd1">computing technology</keyword>
<keyword xml:id="kwd2">risk</keyword>
<keyword xml:id="kwd3">cyberinfrastructure</keyword>
<keyword xml:id="kwd4">systems of systems</keyword>
<keyword xml:id="kwd5">modeling</keyword>
</keywordGroup>
<abstractGroup>
<abstract type="main" xml:lang="en">
<title type="main">Abstract</title>
<p>Building on systems‐based philosophy, theory, methodology, and practice, the challenges associated with modeling, assessing, managing, and communicating the multidimensional risk to
<i>cyberinfrastructure</i>
systems (CIS) serviced by cloud computing technology (CCT) as systems of systems (SoS) are explored. The article raises concerns about the euphoria in the literature about CCT and stresses the importance of understanding the complex process of modeling, assessing, managing, and communicating the risks associated with CIS‐CCT. Several themes are highlighted: the theory of scenario structuring; the epistemology of the states of the CIS‐CCT systems; the role of systems integration in CIS‐CCT; the risk to CIS‐CCT from malicious insiders' intrusion; the complex definition and quantification of the risk function associated with CIS‐CCT systems; and modeling the multiple perspectives of CIS‐CCT, focusing on hierarchical holographic modeling (HHM) and phantom system models (PSM). The paper concludes with an epilogue and list of references. © 2011 Wiley Periodicals, Inc. Syst Eng</p>
</abstract>
</abstractGroup>
</contentMeta>
</header>
</component>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems</title>
</titleInfo>
<titleInfo type="abbreviated" lang="en">
<title>RISK TO CYBERINFRASTRUCTURE SYSTEMS SERVED BY CCT AS SoS</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA" lang="en">
<title>Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems</title>
</titleInfo>
<name type="personal">
<namePart type="given">Yacov Y.</namePart>
<namePart type="family">Haimes</namePart>
<affiliation>Center for Risk Management, University of Virginia, Charlottesville, VA 22903</affiliation>
<affiliation>E-mail: haimes@virginia.edu</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Clyde C.</namePart>
<namePart type="family">Chittister</namePart>
<affiliation>Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA 15213</affiliation>
<affiliation>E-mail: cc@sei.cmu.edu</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre type="article" displayLabel="article"></genre>
<originInfo>
<publisher>Wiley Subscription Services, Inc., A Wiley Company</publisher>
<place>
<placeTerm type="text">Hoboken</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2012-06</dateIssued>
<dateCaptured encoding="w3cdtf">2011-03-18</dateCaptured>
<dateValid encoding="w3cdtf">2011-09-29</dateValid>
<copyrightDate encoding="w3cdtf">2012</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<internetMediaType>text/html</internetMediaType>
<extent unit="figures">1</extent>
<extent unit="references">30</extent>
</physicalDescription>
<abstract lang="en">Building on systems‐based philosophy, theory, methodology, and practice, the challenges associated with modeling, assessing, managing, and communicating the multidimensional risk to cyberinfrastructure systems (CIS) serviced by cloud computing technology (CCT) as systems of systems (SoS) are explored. The article raises concerns about the euphoria in the literature about CCT and stresses the importance of understanding the complex process of modeling, assessing, managing, and communicating the risks associated with CIS‐CCT. Several themes are highlighted: the theory of scenario structuring; the epistemology of the states of the CIS‐CCT systems; the role of systems integration in CIS‐CCT; the risk to CIS‐CCT from malicious insiders' intrusion; the complex definition and quantification of the risk function associated with CIS‐CCT systems; and modeling the multiple perspectives of CIS‐CCT, focusing on hierarchical holographic modeling (HHM) and phantom system models (PSM). The paper concludes with an epilogue and list of references. © 2011 Wiley Periodicals, Inc. Syst Eng</abstract>
<subject lang="en">
<genre>keywords</genre>
<topic>computing technology</topic>
<topic>risk</topic>
<topic>cyberinfrastructure</topic>
<topic>systems of systems</topic>
<topic>modeling</topic>
</subject>
<relatedItem type="host">
<titleInfo>
<title>Systems Engineering</title>
</titleInfo>
<titleInfo type="abbreviated">
<title>Syst. Engin.</title>
</titleInfo>
<genre type="journal">journal</genre>
<subject>
<genre>article-category</genre>
<topic>Regular Paper</topic>
</subject>
<identifier type="ISSN">1098-1241</identifier>
<identifier type="eISSN">1520-6858</identifier>
<identifier type="DOI">10.1002/(ISSN)1520-6858</identifier>
<identifier type="PublisherID">SYS</identifier>
<part>
<date>2012</date>
<detail type="volume">
<caption>vol.</caption>
<number>15</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>213</start>
<end>224</end>
<total>12</total>
</extent>
</part>
</relatedItem>
<identifier type="istex">54A5844681AE8C22CF79E214AF0746DDC2AB7808</identifier>
<identifier type="DOI">10.1002/sys.20204</identifier>
<identifier type="ArticleID">SYS20204</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Copyright © 2011 Wiley Periodicals, Inc.</accessCondition>
<recordInfo>
<recordContentSource>WILEY</recordContentSource>
<recordOrigin>Wiley Subscription Services, Inc., A Wiley Company</recordOrigin>
</recordInfo>
</mods>
</metadata>
<enrichments>
<json:item>
<type>multicat</type>
<uri>https://api.istex.fr/document/54A5844681AE8C22CF79E214AF0746DDC2AB7808/enrichments/multicat</uri>
</json:item>
</enrichments>
<serie></serie>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/CyberinfraV1/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000118 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 000118 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    CyberinfraV1
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:54A5844681AE8C22CF79E214AF0746DDC2AB7808
   |texte=   Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems
}}

Wicri

This area was generated with Dilib version V0.6.25.
Data generation: Thu Oct 27 09:30:58 2016. Site generation: Sun Mar 10 23:08:40 2024