Attributes | Values |
---|
rdf:type
| |
Description
| - Design of safe operating systems and their implementation is expensive and time-consuming process that requires expert knowledge of security consultant. His task is to choose the appropriate safety features that will be included into operation system. Selected security functions must ensure that the risk of a breach of confidentiality, integrity and availability of stored data in relation with the operating security threats is minimal. Expert knowledge of security consultant is very important, because many users and system administrators have a problem with the proper selection and use of safety features. In the event that the consultant is not available, it can cause serious threat of the security of operation system. So, we propose design of the expert system, which selects appropriate safety features into operation system. Features will be selected by user, based on vaguely defined security requirements. Using of expert system will minimize the role of the security consultant.
- Design of safe operating systems and their implementation is expensive and time-consuming process that requires expert knowledge of security consultant. His task is to choose the appropriate safety features that will be included into operation system. Selected security functions must ensure that the risk of a breach of confidentiality, integrity and availability of stored data in relation with the operating security threats is minimal. Expert knowledge of security consultant is very important, because many users and system administrators have a problem with the proper selection and use of safety features. In the event that the consultant is not available, it can cause serious threat of the security of operation system. So, we propose design of the expert system, which selects appropriate safety features into operation system. Features will be selected by user, based on vaguely defined security requirements. Using of expert system will minimize the role of the security consultant. (en)
|
Title
| - Methodology for design of safe operating systems
- Methodology for design of safe operating systems (en)
|
skos:prefLabel
| - Methodology for design of safe operating systems
- Methodology for design of safe operating systems (en)
|
skos:notation
| - RIV/61988987:17310/13:A14018FD!RIV14-MSM-17310___
|
http://linked.open...avai/predkladatel
| |
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...iv/cisloPeriodika
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/61988987:17310/13:A14018FD
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - safe operating systems; methodology; security consultant; expert system; safety features; security requirements (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...odStatuVydavatele
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...i/riv/nazevZdroje
| - Global Journal on Technology
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...v/svazekPeriodika
| |
http://linked.open...iv/tvurceVysledku
| - Walek, Bogdan
- MASÁR, Juraj
|
issn
| |
number of pages
| |
http://localhost/t...ganizacniJednotka
| |