Document Type
Article
Publication Date
2015
DOI
10.1016/j.procs.2015.05.370
Publication Title
Procedia Computer Science
Volume
51
Pages
2623-2637
Conference Name
ICCS 2015 International Conference on Computational Science
Abstract
Future crisis management systems needresilient and trustworthy infrastructures to quickly develop reliable applications and processes, andensure end-to-end security, trust, and privacy. Due to the multiplicity and diversity of involved actors, volumes of data, and heterogeneity of shared information;crisis management systems tend to be highly vulnerable and subjectto unforeseen incidents. As a result, the dependability of crisis management systems can be at risk. This paper presents a cloud-based resilient and trustworthy infrastructure (known as rDaaS) to quickly develop secure crisis management systems. The rDaaS integrates the Dynamic Data-Driven Application Systems (DDDAS) paradigm into a service-oriented architecture over cloud technology and provides a set of resilient DDDAS-As-A Service (rDaaS) components to build secure and trusted adaptable crisis processes. The rDaaS also ensures resilience and security by obfuscating the execution environment and applying Behavior Software Encryption and Moving Technique Defense. A simulation environment for a nuclear plant crisis management case study is illustrated to build resilient and trusted crisis response processes.
Original Publication Citation
Badr, Y., Hariri, S., Al-Nashif, Y., & Blasch, E. (2015). Resilient and trustworthy dynamic data-driven application systems (DDDSS) services for crisis management environments. Procedia Computer Science, 51, 2623-2637. doi:https://doi.org/10.1016/j.procs.2015.05.370
Repository Citation
Badr, Youakim; Hariti, Salim; AL-Nashif, Youssif; and Blasch, Erik, "Resilient and Trustworthy Dynamic Data-driven Application Systems (DDDAS) Services for Crisis Management Environments" (2015). Electrical & Computer Engineering Faculty Publications. 128.
https://digitalcommons.odu.edu/ece_fac_pubs/128
Included in
Electrical and Computer Engineering Commons, Information Security Commons, Systems Architecture Commons