Journal articles on the topic 'Security orchestration and automation'

To see the other types of publications on this topic, follow the link: Security orchestration and automation.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security orchestration and automation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Tembhurne, Omprakash, Sonali Milmile, Ganesh R. Pathak, Atul O. Thakare, and Abhijeet Thakare. "An Orchestrator." International Journal of Open Source Software and Processes 13, no. 1 (January 1, 2022): 1–17. http://dx.doi.org/10.4018/ijossp.308792.

Full text
Abstract:
A development of an orchestrator that manages multiusers and shared resources is extremely useful for automaton of jobs on the multiple machines. Many companies such as UiPath, Blue Prism, Automation Anywhere, etc. have their own orchestrator, but their orchestration services have some drawbacks (i.e., huge cost of yearly subscription, lack of user defined flexibility in architecture, and third-party security issues). The manuscript contains the design and analysis of orchestrator using open-source programming language and cloud platform (i.e., Python and OpenStack). The main focus of this paper is design and development of the orchestrator with shared resources and distribute environment management system that help to manage the multiuser, multi-machine environment in an efficient way. The overall examination delights that design and development of inhouse orchestrator application using open-source assets is not only useful in terms of colossal expense slicing, but also the development of free and flexible robotic process automation applications.
APA, Harvard, Vancouver, ISO, and other styles
2

Kinyua, Johnson, and Lawrence Awuah. "AI/ML in Security Orchestration, Automation and Response: Future Research Directions." Intelligent Automation & Soft Computing 28, no. 2 (2021): 527–45. http://dx.doi.org/10.32604/iasc.2021.016240.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chara Eddine, Meftah Mohammed. "A Comparative Study of Formal Approaches for Web Service Oriented Architecture." Network and Communication Technologies 5, no. 2 (December 31, 2020): 15. http://dx.doi.org/10.5539/nct.v5n2p15.

Full text
Abstract:
The security in web service oriented architecture (WSOA) development has become a critical need and goal. WSOA as service-oriented architecture (SOA) designs the software as services and uses the services as platforms. Web services orchestration describes how web services can interact with each other from an operational perspective. Many languages allow expression of executable processes to implementing web services orchestration. These languages are used to describe how the interactions between multiple services are coordinated to achieve a goal. However, the operational semantics of each of the structures of these languages is not formally defined and they have limitations regarding the reasoning and the verification of the web services compositions. Several studies and approaches have been proposed in this context, are devoted to the formalization of web services orchestrations and allow some verification of their behavior; these approaches are partial solutions to the problem of development of the safe composition. We explore the advantages and limitations of more than fourteen approaches and research work. We propose a model for comparison between works, studies, and approaches in this field. The proposed model adopts the concepts of the formalization and the automation of development processes.
APA, Harvard, Vancouver, ISO, and other styles
4

Lee, Minkyung, Julian Jang-Jaccard, and Jin Kwak. "Novel Architecture of Security Orchestration, Automation and Response in營nternet of Blended Environment." Computers, Materials & Continua 73, no. 1 (2022): 199–223. http://dx.doi.org/10.32604/cmc.2022.028495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Shichao, and Mengchu Zhou. "Evolving Container to Unikernel for Edge Computing and Applications in Process Industry." Processes 9, no. 2 (February 14, 2021): 351. http://dx.doi.org/10.3390/pr9020351.

Full text
Abstract:
Industry 4.0 promotes manufacturing and process industry towards digitalization and intellectualization. Edge computing can provide delay-sensitive services in industrial processes to realize intelligent production. Lightweight virtualization technology is one of the key elements of edge computing, which can implement resource management, orchestration, and isolation services without considering heterogenous hardware. It has revolutionized software development and deployment. The scope of this review paper is to present an in-depth analysis of two such technologies, Container and Unikernel, for edge computing. We discuss and compare their applicability in terms of migration, security, and orchestration for edge computing and industrial applications. We describe their performance indexes, evaluation methods and related findings. We then discuss their applications in industrial processes. To promote further research, we present some open issues and challenges to serve as a road map for both researchers and practitioners in the areas of Industry 4.0, industrial process automation, and advanced computing.
APA, Harvard, Vancouver, ISO, and other styles
6

Ohmori, Motoyuki. "On Automation and Orchestration of an Initial Computer Security Incident Response by Introducing Centralized Incident Tracking System." Journal of Information Processing 27 (2019): 564–73. http://dx.doi.org/10.2197/ipsjjip.27.564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sierra, Rodrigo, and Hubert Odziemczyk. "Readying CERN for connected device era." EPJ Web of Conferences 245 (2020): 07015. http://dx.doi.org/10.1051/epjconf/202024507015.

Full text
Abstract:
Whether you consider “IoT” as a real thing or a buzzword, there’s no doubt that connected devices, data analysis and automation are transforming industry. CERN is no exception: a network of LoRa-based radiation monitors has recently been deployed and there is a growing interest in the advantages connected devices could bring—to accelerator operations just as much as to building management. Connected devices bring risks as well as advantages, however, and the last thing any business needs is an unsafe, uncoordinated and unmanaged sensor environment. To support the deployment of the LoRa-based radiation sensors, CERN has established both a Low Power Wireless Area Network (LPWAN) to complement the existing wired and wireless networks and a service infrastructure to manage the provisioning, orchestration, data transfer, security and operation for connected devices.
APA, Harvard, Vancouver, ISO, and other styles
8

Sarkar, Sirshak, Gaurav Choudhary, Shishir Kumar Shandilya, Azath Hussain, and Hwankuk Kim. "Security of Zero Trust Networks in Cloud Computing: A Comparative Review." Sustainability 14, no. 18 (September 7, 2022): 11213. http://dx.doi.org/10.3390/su141811213.

Full text
Abstract:
Recently, networks have shifted from traditional in-house servers to third-party-managed cloud platforms due to its cost-effectiveness and increased accessibility toward its management. However, the network remains reactive, with less accountability and oversight of its overall security. Several emerging technologies have restructured our approach to the security of cloud networks; one such approach is the zero-trust network architecture (ZTNA), where no entity is implicitly trusted in the network, regardless of its origin or scope of access. The network rewards trusted behaviour and proactively predicts threats based on its users’ behaviour. The zero-trust network architecture is still at a nascent stage, and there are many frameworks and models to follow. The primary focus of this survey is to compare the novel requirement-specific features used by state-of-the-art research models for zero-trust cloud networks. In this manner, the features are categorized across nine parameters into three main types: zero-trust-based cloud network models, frameworks and proofs-of-concept. ZTNA, when wholly realized, enables network administrators to tackle critical issues such as how to inhibit internal and external cyber threats, enhance the visibility of the network, automate the calculation of trust for network entities and orchestrate security for users. The paper further focuses on domain-specific issues plaguing modern cloud computing networks, which leverage choosing and implementing features necessary for future networks and incorporate intelligent security orchestration, automation and response. The paper also discusses challenges associated with cloud platforms and requirements for migrating to zero-trust architecture. Finally, possible future research directions are discussed, wherein new technologies can be incorporated into the ZTA to build robust trust-based enterprise networks deployed in the cloud.
APA, Harvard, Vancouver, ISO, and other styles
9

Goutam, Aradhana, Raj Kamal, and Maya Ingle. "Specification for security Orchestration." Procedia Engineering 38 (2012): 429–41. http://dx.doi.org/10.1016/j.proeng.2012.06.053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Potter, Bruce. "Security automation." Network Security 2007, no. 9 (September 2007): 18–19. http://dx.doi.org/10.1016/s1353-4858(07)70084-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Molina Zarca, Alejandro, Miloud Bagaa, Jorge Bernal Bernabe, Tarik Taleb, and Antonio F. Skarmeta. "Semantic-Aware Security Orchestration in SDN/NFV-Enabled IoT Systems." Sensors 20, no. 13 (June 27, 2020): 3622. http://dx.doi.org/10.3390/s20133622.

Full text
Abstract:
IoT systems can be leveraged by Network Function Virtualization (NFV) and Software-Defined Networking (SDN) technologies, thereby strengthening their overall flexibility, security and resilience. In this sense, adaptive and policy-based security frameworks for SDN/NFV-aware IoT systems can provide a remarkable added value for self-protection and self-healing, by orchestrating and enforcing dynamically security policies and associated Virtual Network Functions (VNF) or Virtual network Security Functions (VSF) according to the actual context. However, this security orchestration is subject to multiple possible inconsistencies between the policies to enforce, the already enforced management policies and the evolving status of the managed IoT system. In this regard, this paper presents a semantic-aware, zero-touch and policy-driven security orchestration framework for autonomic and conflict-less security orchestration in SDN/NFV-aware IoT scenarios while ensuring optimal allocation and Service Function Chaining (SFC) of VSF. The framework relies on Semantic technologies and considers the security policies and the evolving IoT system model to dynamically and formally detect any semantic conflict during the orchestration. In addition, our optimized SFC algorithm maximizes the QoS, security aspects and resources usage during VSF allocation. The orchestration security framework has been implemented and validated showing its feasibility and performance to detect the conflicts and optimally enforce the VSFs.
APA, Harvard, Vancouver, ISO, and other styles
12

Papadakis-Vlachopapadopoulos, Konstantinos, Ioannis Dimolitsas, Dimitrios Dechouniotis, Eirini Eleni Tsiropoulou, Ioanna Roussaki, and Symeon Papavassiliou. "On Blockchain-Based Cross-Service Communication and Resource Orchestration on Edge Clouds." Informatics 8, no. 1 (February 26, 2021): 13. http://dx.doi.org/10.3390/informatics8010013.

Full text
Abstract:
With the advent of 5G verticals and the Internet of Things paradigm, Edge Computing has emerged as the most dominant service delivery architecture, placing augmented computing resources in the proximity of end users. The resource orchestration of edge clouds relies on the concept of network slicing, which provides logically isolated computing and network resources. However, though there is significant progress on the automation of the resource orchestration within a single cloud or edge cloud datacenter, the orchestration of multi-domain infrastructure or multi-administrative domain is still an open challenge. Towards exploiting the network service marketplace at its full capacity, while being aligned with ETSI Network Function Virtualization architecture, this article proposes a novel Blockchain-based service orchestrator that leverages the automation capabilities of smart contracts to establish cross-service communication between network slices of different tenants. In particular, we introduce a multi-tier architecture of a Blockchain-based network marketplace, and design the lifecycle of the cross-service orchestration. For the evaluation of the proposed approach, we set up cross-service communication in an edge cloud and we demonstrate that the orchestration overhead is less than other cross-service solutions.
APA, Harvard, Vancouver, ISO, and other styles
13

Klose, Anselm, Julius Lorenz, Lukas Bittorf, Katharina Stark, Mario Hoernicke, Andreas Stutz, Hannes Weinhold, et al. "Orchestration of modular plants." atp magazin 63, no. 9 (August 12, 2022): 68–77. http://dx.doi.org/10.17560/atp.v63i9.2599.

Full text
Abstract:
In Modular Automation, the orchestration creates the link between process equipment assemblies (PEA) and processes towards operation. This paper presents a general methodology, so-called type-based orchestration, on how to design a fully functional modular process plant based on the module type package (MTP). In a number of discussion rounds, the steps were identified, generalized, and formulated as a method. Existing standards were applied to describe additional required information. The resulting phases and steps, as well as the practical application, have shown that a large part of the planning can be done using only the type-information of planned modules. The type-based orchestration is later completed with instance information. The methodology was tested against a modular distillation plant from the Technical University of Dortmund.
APA, Harvard, Vancouver, ISO, and other styles
14

Qadeer, Arslan, Asad Waqar Malik, Anis Ur Rahman, Hamayun Mian Muhammad, and Arsalan Ahmad. "Virtual Infrastructure Orchestration For Cloud Service Deployment." Computer Journal 63, no. 2 (December 5, 2019): 295–307. http://dx.doi.org/10.1093/comjnl/bxz125.

Full text
Abstract:
Abstract Cloud adoption has significantly increased using the infrastructure-as-a-service (IaaS) paradigm, in order to meet the growing demands of computing, storage and networking, in small as well as large enterprises. Different vendors provide their customized solutions for OpenStack deployment on bare metal or virtual infrastructure. Among these many available IaaS solutions, OpenStack stands out as being an agile and open-source platform. However, its deployment procedure is a time-taking and complex process with a learning curve. This paper addresses the lack of basic infrastructure automation in almost all of the OpenStack deployment projects. We propose a flexible framework to automate the process of infrastructure bring up for deployment of several OpenStack distributions, as well as resolving dependencies for a successful deployment. Our experimental results demonstrate the effectiveness of the proposed framework in terms of automation status and deployment time, that is, reducing the time spent in preparing a basic virtual infrastructure by four times, on average.
APA, Harvard, Vancouver, ISO, and other styles
15

Highland, HaroldJoseph. "Office automation security." Computers & Security 6, no. 6 (December 1987): 452–57. http://dx.doi.org/10.1016/0167-4048(87)90023-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Stutz, Andreas, Alexander Fay, Mike Barth, and Mathias Maurmaier. "Orchestration vs. Choreography Functional Association for Future Automation Systems." IFAC-PapersOnLine 53, no. 2 (2020): 8268–75. http://dx.doi.org/10.1016/j.ifacol.2020.12.1961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Pokhrel, Shiva Raj. "Software Defined Internet of Vehicles for Automation and Orchestration." IEEE Transactions on Intelligent Transportation Systems 22, no. 6 (June 2021): 3890–99. http://dx.doi.org/10.1109/tits.2021.3077363.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Wang, Shuyi, and Longxiang Yang. "Securing Dynamic Service Function Chain Orchestration in EC-IoT Using Federated Learning." Sensors 22, no. 23 (November 22, 2022): 9041. http://dx.doi.org/10.3390/s22239041.

Full text
Abstract:
Dynamic service orchestration is becoming more and more necessary as IoT and edge computing technologies continue to advance due to the flexibility and diversity of services. With the surge in the number of edge devices and the increase in data volume of IoT scenarios, there are higher requirements for the transmission security of privacy information from each edge device and the processing efficiency of SFC orchestration. This paper proposes a kind of dynamic SFC orchestration security algorithm applicable to EC-IoT scenarios based on the federated learning framework, combined with a block coordinated descent approach and the quadratic penalty algorithm to achieve communication efficiency and data privacy protection. A deep reinforcement learning algorithm is used to simultaneously adapt the SFC orchestration method in order to dynamically observe environmental changes and decrease end-to-end delay. The experimental results show that compared with the existing dynamic SFC orchestration algorithms, the proposed algorithm can achieve better convergence and latency performance under the condition of privacy protection; the overall latency is reduced by about 33%, and the overall convergence speed is improved by about 9%, which not only achieves the security of data privacy protection of edge computing nodes, but also meets the requirements of dynamic SFC orchestration.
APA, Harvard, Vancouver, ISO, and other styles
19

Slawomir Kuklinski, Lechoslaw Tomaszewski, Robert Kolakowski, Anne-Marie Bosneag, Ashima Chawla, Adlen Ksentini, Sabra Ben Saad, et al. "AI-driven predictive and scalable management and orchestration of network slices." ITU Journal on Future and Evolving Technologies 3, no. 3 (November 16, 2022): 570–88. http://dx.doi.org/10.52953/ipui5221.

Full text
Abstract:
The future network slicing enabled mobile ecosystem is expected to support a wide set of heterogenous vertical services over a common infrastructure. The service robustness and their intrinsic requirements, together with the heterogeneity of mobile infrastructure and resources in both the technological and the spatial domain, significantly increase the complexity and create new challenges regarding network management and orchestration. High degree of automation, flexibility and programmability are becoming the fundamental architectural features to enable seamless support for the modern telco-based services. In this paper, we present a novel management and orchestration platform for network slices, which has been devised by the Horizon 2020 MonB5G project. The proposed framework is a highly scalable solution for network slicing management and orchestration that implements a distributed and programmable AI-driven management architecture. The cognitive capabilities are provided at different levels of management hierarchy by adopting necessary data abstractions. Moreover, the framework leverages intent-based operations to improve its modularity and genericity. The mentioned features enhance the management automation, making the architecture a significant step towards self-managed network slices.
APA, Harvard, Vancouver, ISO, and other styles
20

Islam, Chadni, Muhammad Ali Babar, and Surya Nepal. "A Multi-Vocal Review of Security Orchestration." ACM Computing Surveys 52, no. 2 (May 31, 2019): 1–45. http://dx.doi.org/10.1145/3305268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Hwang, J., K. Bai, M. Tacci, M. Vukovic, and N. Anerousis. "Automation and orchestration framework for large-scale enterprise cloud migration." IBM Journal of Research and Development 60, no. 2-3 (March 2016): 1:1–1:12. http://dx.doi.org/10.1147/jrd.2015.2511810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Shemyakinskaya, Anastasia Sergeevna, and Igor Valerevich Nikiforov. "Hard drives monitoring automation approach for Kubernetes container orchestration system." Proceedings of the Institute for System Programming of the RAS 32, no. 2 (2020): 99–106. http://dx.doi.org/10.15514/ispras-2020-32(2)-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Williams, Adam D. "Multilayered Network Models for Security: Enhancing System Security Engineering with Orchestration." INSIGHT 25, no. 2 (June 2022): 44–48. http://dx.doi.org/10.1002/inst.12385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Runde, Markus, Walter Speth, Thomas Steffen, and Christoph Thiell. "Automation Security Risk Assessment." atp edition 58 (January 1, 2016): 48. http://dx.doi.org/10.17560/atp.v58i01-02.551.

Full text
Abstract:
Um Security-Schutzmaßnahmen für die Automatisierungstechnik sinnvoll zu implementieren, wird eine Entscheidungsgrundlage benötigt. Eine Risikoanalyse, die Werte erfasst und ermittelt, kann das leisten. Der Beitrag stellt praktische Herangehensweisen zur Durchführung von Risikoanalysen vor, die eine Auswahl von hinreichenden Schutzmaßnahmen erlaubt.
APA, Harvard, Vancouver, ISO, and other styles
25

Kothiyal, Sonakshi. "Automation in Cyber-Security." International Journal for Research in Applied Science and Engineering Technology 7, no. 5 (May 31, 2019): 581–84. http://dx.doi.org/10.22214/ijraset.2019.5098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Wong, Ken. "Security and Office Automation." EDPACS 15, no. 3 (September 1987): 5–11. http://dx.doi.org/10.1080/07366988709452219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Wong, Ken. "Security and office automation." Computers & Security 7, no. 1 (February 1988): 106–7. http://dx.doi.org/10.1016/0167-4048(88)90548-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Sinde, Sai Priya, Bhavika Thakkalapally, Meghamala Ramidi, and Sowmya Veeramalla. "Continuous Integration and Deployment Automation in AWS Cloud Infrastructure." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 1305–9. http://dx.doi.org/10.22214/ijraset.2022.44106.

Full text
Abstract:
Abstract-The primary objective of this project is to figure out how an application is automatically deployed. To automate the deployment, we'll require a container orchestration platform. Kubernetes is now a widely used container orchestration tool. Users can deploy, scale, and manage containerized applications thanks to Kubernetes' robustness. Continuous Integration and Continuous Delivery (CI/CD) of a project is required in modern development, and the focus is on developing and executing tests on every commit to ensure your test environment is constantly up-to-date. From the integration and testing phases through the delivery and deployment phases, CI/CD brings automation and continuous monitoring of programmers throughout their lifecycle. GitHub Actions is one of the CI/CD technology available in the market. By using GitHub as a source code management tool, it's best to use GitHub Actions as a continuous integration and delivery solution because it's supplied by GitHub. This does not require any setting or setup. As a result, incorporating these tools will speed up the deployment of an application. Keywords- GitHub Actions, Amazon Web Services, Continuous Integration and Continuous Deployment, Kubernetes, Workflows.
APA, Harvard, Vancouver, ISO, and other styles
29

Radack, Shirley, and Rick Kuhn. "Managing Security: The Security Content Automation Protocol." IT Professional 13, no. 1 (January 2011): 9–11. http://dx.doi.org/10.1109/mitp.2011.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Moubayed, Abdallah, Abdallah Shami, and Anwer Al-Dulaimi. "On End-to-End Intelligent Automation of 6G Networks." Future Internet 14, no. 6 (May 29, 2022): 165. http://dx.doi.org/10.3390/fi14060165.

Full text
Abstract:
The digital transformation of businesses and services is currently in full force, opening the world to a new set of unique challenges and opportunities. In this context, 6G promises to be the set of technologies, architectures, and paradigms that will promote the digital transformation and enable growth and sustainability by offering the means to interact and control the digital and virtual worlds that are decoupled from their physical location. One of the main challenges facing 6G networks is “end-to-end network automation”. This is because such networks have to deal with more complex infrastructure and a diverse set of heterogeneous services and fragmented use cases. Accordingly, this paper aims at envisioning the role of different enabling technologies towards end-to-end intelligent automated 6G networks. To this end, this paper first reviews the literature focusing on the orchestration and automation of next-generation networks by discussing in detail the challenges facing efficient and fully automated 6G networks. This includes automating both the operational and functional elements for 6G networks. Additionally, this paper defines some of the key technologies that will play a vital role in addressing the research gaps and tackling the aforementioned challenges. More specifically, it outlines how advanced data-driven paradigms such as reinforcement learning and federated learning can be incorporated into 6G networks for more dynamic, efficient, effective, and intelligent network automation and orchestration.
APA, Harvard, Vancouver, ISO, and other styles
31

Li, Wei, Yuan Jiang, Xiaoliang Zhang, Fangfang Dang, Feng Gao, Haomin Wang, and Qi Fan. "Reliability Assurance Dynamic SSC Placement Using Reinforcement Learning." Information 13, no. 2 (January 21, 2022): 53. http://dx.doi.org/10.3390/info13020053.

Full text
Abstract:
Software-defined networking (SDN) and network function virtualization (NFV) make a network programmable, resulting in a more flexible and agile network. An important and promising application for these two technologies is network security, where they can dynamically chain virtual security functions (VSFs), such as firewalls, intrusion detection systems, and intrusion prevention systems, and thus inspect, monitor, or filter traffic flows in cloud data center networks. In view of the strict delay constraints of security services and the high failure probability of VSFs, we propose the use of a security service chain (SSC) orchestration algorithm that is latency aware with reliability assurance (LARA). This algorithm includes an SSC orchestration module and VSF backup module. We first use a reinforcement learning (RL) based Q-learning algorithm to achieve efficient SSC orchestration and try to reduce the end-to-end delay of services. Then, we measure the importance of the physical nodes carrying the VSF instance and backup VSF according to the node importance of VSF. Extensive simulation results indicate that the LARA algorithm is more effective in reducing delay and ensuring reliability compared with other algorithms.
APA, Harvard, Vancouver, ISO, and other styles
32

Priyadharsini, S. "Home Automation and Security System." International Journal for Research in Applied Science and Engineering Technology V, no. III (March 28, 2017): 1174–79. http://dx.doi.org/10.22214/ijraset.2017.3215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Kaur, Surinder, Rashmi Singh, Neha Khairwal, and Pratyk Jain. "HOME AUTOMATION AND SECURITY SYSTEM." Advanced Computational Intelligence: An International Journal (ACII) 3, no. 3 (July 30, 2016): 17–23. http://dx.doi.org/10.5121/acii.2016.3303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Mathew, Alex. "Cybersecurity Infrastructure and Security Automation." Advanced Computing: An International Journal 10, no. 6 (November 30, 2019): 1–7. http://dx.doi.org/10.5121/acij.2019.10601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Chien, Ting-Li, Kuo-Lan Su, and Jr-Hung Guo. "Intelligent Home-Automation Security System." International Journal of Automation Technology 3, no. 2 (March 5, 2009): 121–29. http://dx.doi.org/10.20965/ijat.2009.p0123.

Full text
Abstract:
The objective of the home security detection and appliance control system is to protect occupants against events -- many of which are attributable to human error. We have developed a module based security system for home automation. The structure of the security system is divided into many modules. Each module in the home -- automation security system we develop has a wireless RF and a speech interface. They contain fire detection module, intruder detection module, environment detection module, gas detection module, (AC) power detection and diagnosis module, appliance control module and team robots. In the security detection module, we use multisensor fusion algorithms to decide an exact output. In the application control module, we use two-wire communication via wireless RF interface. These modules have event-condition voice alarms, and send the real-time status to the master controller. In the smart team robot system, we have designed many smart robots for the security system. We have designed a general user interface (GUI) for the intelligent security system. The user interface can supervise these modules and team robots via wireless RF interface, and use wireless Internet and mobile phone for remote supervision.
APA, Harvard, Vancouver, ISO, and other styles
36

Granzer, Wolfgang, Fritz Praus, and Wolfgang Kastner. "Security in Building Automation Systems." IEEE Transactions on Industrial Electronics 57, no. 11 (November 2010): 3622–30. http://dx.doi.org/10.1109/tie.2009.2036033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

G, SHYAMALA, Ronith Gowda, Sashikiran Gavanivari, Suvith K S, and Vishwamohan Narendra. "Home Automation Security Using Blockchain." International Journal of Computer Science and Engineering 7, no. 7 (July 25, 2020): 63–68. http://dx.doi.org/10.14445/23488387/ijcse-v7i7p111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Marsh, P. "Beyond control [automation system security]." Information Professional 2, no. 2 (April 1, 2005): 12–16. http://dx.doi.org/10.1049/inp:20050202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Moradi, Niloofar, Alireza Shameli-Sendi, and Alireza Khajouei. "A Scalable Stateful Approach for Virtual Security Functions Orchestration." IEEE Transactions on Parallel and Distributed Systems 32, no. 6 (June 1, 2021): 1383–94. http://dx.doi.org/10.1109/tpds.2021.3049804.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Pierantoni, Gabriele, Tamas Kiss, Gabor Terstyanszky, James DesLauriers, Gregoire Gesmier, and Hai-Van Dang. "Describing and Processing Topology and Quality of Service Parameters of Applications in the Cloud." Journal of Grid Computing 18, no. 4 (June 15, 2020): 761–78. http://dx.doi.org/10.1007/s10723-020-09524-0.

Full text
Abstract:
AbstractTypical cloud applications require high-level policy driven orchestration to achieve efficient resource utilisation and robust security to support different types of users and user scenarios. However, the efficient and secure utilisation of cloud resources to run applications is not trivial. Although there have been several efforts to support the coordinated deployment, and to a smaller extent the run-time orchestration of applications in the Cloud, no comprehensive solution has emerged until now that successfully leverages applications in an efficient, secure and seamless way. One of the major challenges is how to specify and manage Quality of Service (QoS) properties governing cloud applications. The solution to address these challenges could be a generic and pluggable framework that supports the optimal and secure deployment and run-time orchestration of applications in the Cloud. A specific aspect of such a cloud orchestration framework is the need to describe complex applications incorporating several services. These application descriptions must specify both the structure of the application and its QoS parameters, such as desired performance, economic viability and security. This paper proposes a cloud technology agnostic approach to application descriptions based on existing standards and describes how these application descriptions can be processed to manage applications in the Cloud.
APA, Harvard, Vancouver, ISO, and other styles
41

Valera, A., J. Gomez-Moreno, A. Sánchez, C. Ricolfe-Viala, R. Zotovic, and M. Vallés. "Industrial Robot Programming and UPnP Services Orchestration for the Automation of Factories." International Journal of Advanced Robotic Systems 9, no. 4 (January 2012): 123. http://dx.doi.org/10.5772/51373.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Šimek, Dalibor, and Roman Šperka. "How Robot/human Orchestration Can Help in an HR Department: A Case Study From a Pilot Implementation." Organizacija 52, no. 3 (August 1, 2019): 204–17. http://dx.doi.org/10.2478/orga-2019-0013.

Full text
Abstract:
Abstract Background and Purpose: Motivation of this research is to explore the current trend in automating the business processes through software robots (Robotic Process Automation – RPA) and its managing within enterprise environment where most of the processes are executed by human workforce. As the RPA technology expands the demand for its coordinating grows as well. The possible solution to this challenge is shown in case study research in form of implementing orchestration platform to a concrete business process of onboarding in HR department of a multinational company. The aim of this paper is to explore the phases and activities of the pilot project implementation of Robotic Service Orchestration (RSO) in combination with RPA technology and to assess the potential benefits. Design/Methodology/Approach: Case study research approach was selected to explore the research phenomena, which is the implementation of RSO platform in combination with RPA technology and assessing incoming benefits. The case is formed with 2 companies – (1) multinational company with ongoing effort of automating onboarding process, (2) technology and consulting company delivering the automation solution. Data were collected through semi-structured interviews with respondents from two involved companies and by analysing internal documents. Results: The analysis of case provided in this paper revealed some key insights: (1) strategical position of RSO and tactical position of RPA towards the existing legacy systems, (2) need for increased focus on initial process modelling phase, (3) Application Programming Interface (API) integration is more viable solution for RPA, (4) the biggest benefit of RPA - its agility, (5) future potential of the RSO replacing the BPMS. Conclusions: First of all, there is a need of higher number of software robots adopted in a company before orchestration could pay off. On the other side, current Business Process Management Systems (BPMS) solutions don’t offer functionalities for managing human and software robots workforce altogether. RPA is expected to expand and without proper orchestration the effectivity will not grow constantly.
APA, Harvard, Vancouver, ISO, and other styles
43

Badewi, Amgad, Essam Shehab, Jing Zeng, and Mostafa Mohamad. "ERP benefits capability framework: orchestration theory perspective." Business Process Management Journal 24, no. 1 (February 2, 2018): 266–94. http://dx.doi.org/10.1108/bpmj-11-2015-0162.

Full text
Abstract:
Purpose The purpose of this paper is to answer two research questions: what are the ERP resources and organizational complementary resources (OCRs) required to achieve each group of benefits? And on the basis of its resources, when should an organization invest more in ERP resources and/or OCRs so that the potential value of its ERP is realised? Design/methodology/approach Studying 12 organizations in different countries and validating the results with 8 consultants. Findings ERP benefits realization capability framework is developed; it shows that each group of benefits requires ERP resources (classified into features, attached technologies and information technology department competences) and OCRs (classified into practices, attitudes, culture, skills and organizational characteristics) and that leaping ahead to gain innovation benefits before being mature enough in realising a firm’s planning and automation capabilities could be a waste of time and effort. Research limitations/implications It is qualitative study. It needs to be backed by quantitative studies to test the results. Practical implications Although the “P” in ERP stands for planning, many academics and practitioners still believe that ERP applies to automation only. This research spotlights that the ability to invest in ERP can increase the innovation and planning capabilities of the organization only if it is extended and grown at the right time and if it is supported by OCRs. It is not cost effective to push an organization to achieve all the benefits at the same time; rather, it is clear that an organization would not be able to enjoy a higher level of benefits until it achieves a significant number of lower-level benefits. Thus, investing in higher-level benefit assets directly after an ERP implementation, when there are no organizational capabilities available to use these assets, could be inefficient. Moreover, it could be stressful to users when they see plenty of new ERP resources without the ability to use them. Although it could be of slight benefit to introduce, for example, business intelligence to employees in the “stabilizing period” (Badewi et al., 2013), from the financial perspective, it is a waste of money since the benefits would not be realised as expected. Therefore, orchestrating ERP assets with the development of organizational capabilities is important for achieving the greatest effectiveness and efficiency of the resources available to the organization. This research can be used as a benchmark for designing the various blueprints required to achieve different groups of benefits from ERP investments. Originality/value This research addresses two novel questions: RQ1: what are the ERP resources and OCRs required to achieve the different kinds of ERP benefits? RQ2: when, and on what basis, should an organization deploy more resources to leverage the ERP business value?
APA, Harvard, Vancouver, ISO, and other styles
44

Hermosilla, Ana, Alejandro Molina Zarca, Jorge Bernal Bernabe, Jordi Ortiz, and Antonio Skarmeta. "Security Orchestration and Enforcement in NFV/SDN-Aware UAV Deployments." IEEE Access 8 (2020): 131779–95. http://dx.doi.org/10.1109/access.2020.3010209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Ben Said, Najah, and Ioana Cristescu. "End-to-end information flow security for web services orchestration." Science of Computer Programming 187 (February 2020): 102376. http://dx.doi.org/10.1016/j.scico.2019.102376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Chen, Liang, Xiao Jun Zuo, and Yu Fei Wang. "Research on Information Security Test Bed and Evaluation Framework for Distribution Automation System." Applied Mechanics and Materials 737 (March 2015): 210–13. http://dx.doi.org/10.4028/www.scientific.net/amm.737.210.

Full text
Abstract:
Analyzing the characters and abstracting the system model of the distribution automation system, information security test-bed of distribution automation is designed. Meanwhile, information security test and evaluation framework is proposed based on the lifecycle of distribution automation system. The evaluation activities and the testing methods are analyzed and key problems and solutions of information security evaluation and reinforcement requirements for distribution automation system are introduced. The work in this paper can effectively support the information security protection of distribution automation system, and can provide reference for other power industrial control systems.
APA, Harvard, Vancouver, ISO, and other styles
47

Liu, Fang. "Social Security Research under Automation Control." Applied Mechanics and Materials 340 (July 2013): 621–25. http://dx.doi.org/10.4028/www.scientific.net/amm.340.621.

Full text
Abstract:
The development of the modern welfare state is not isolated; their welfare policy implementation depends on the advanced economy, extensive coverage, the perfect system, the diversification and welfare system mandatory. Social network analysis is just take this dependence into account, and develop corresponding method to deal with the relationship between variables. This paper, based on the p* model analysis, takes Sweden and Finland, two typical Nordic welfare state, as the examples, and finds the differences in disease disability insurance, unemployment insurance and etc. To understand these differences is of great importance to think about whether to conduct the reform of the welfare state, and how to combine the concrete national conditions with the reform.
APA, Harvard, Vancouver, ISO, and other styles
48

Singh, Er Dhananjali, Satyendra Kumar Singh, and Jitendra Kumar Yadav. "Home Automation and Security Using IOT." IJARCCE 8, no. 5 (May 30, 2019): 52–56. http://dx.doi.org/10.17148/ijarcce.2019.8512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Kirubakaran, B., K. Baveena, M. Keerthana, and R. Ramya. "Automation Based StairBOT for Security Application." DJ Journal of Advances in Electronics and Communication Engineering 4, no. 2 (May 26, 2018): 17–21. http://dx.doi.org/10.18831/djece.org/2018021003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Treytl, Albert, Peter Palensky, and Thilo Sauter. "SECURITY CONSIDERATIONS FOR ENERGY AUTOMATION NETWORKS." IFAC Proceedings Volumes 38, no. 2 (2005): 158–65. http://dx.doi.org/10.3182/20051114-2-mx-3901.00023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography