A Generic Metamodel for IT Security Attack Modeling for Distributed Systems

Author(s):  
André Miede ◽  
Nedislav Nedyalkov ◽  
Christian Gottron ◽  
André König ◽  
Nicolas Repp ◽  
...  
2020 ◽  
pp. 2705-2714
Author(s):  
Turkan Ahmed Khaleel ◽  
Ayhan Ahmed Al-Shumam

The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment. This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Remote Method Invocation (RMI) technique. This algorithm was compared with the most popular algorithms, such as RSA and 3DES. The results were acceptable and need to be improved in the future.


1989 ◽  
Vol 4 (6) ◽  
pp. 321 ◽  
Author(s):  
Jeff Kramer ◽  
Jeff Magee ◽  
Morris Sloman
Keyword(s):  

1989 ◽  
Vol 4 (5) ◽  
pp. 268 ◽  
Author(s):  
Geoffrey F. Carpenter ◽  
Andrew M. Tyrrell
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document