INCREASING SECURITY IN MILITARY SELF-PROTECTED SOFTWARE

被引:1
|
作者
Gonzalez, Carlos [1 ]
机构
[1] Univ Autonoma Coahuila, Fac Sistemas, Saltillo, Coahuila, Mexico
关键词
User detection; Secure military software; Secure self-protected software; Covert actions; International law; INTRUSION DETECTION;
D O I
10.5455/jjcit.71-1620148110
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The objective of this article is to describe a process methodology to increase security inside secure military selfprotected software. Self-protected software is vulnerable to threats, most dependant on the software user. Therefore, detection by self-protected software of the current user is very important. The methodology includes three phases: detection of user, analysis of current state and reaction actions. The detection phase is comprised of assessing geographic location, time at present location and determining user kind (friend or foe). Analysis phase consists of analysing if self-protected software should be at present location, predicting future locations and assessing the location level of threat. Reaction phase includes determining immediate and delay actions if any and perform actions accordingly. Legal concerns are explained, countermeasures and covert actions are proposed and described. An analytical model shows that self-protected software that includes user detection provides more protection than self-protected software without user detection.
引用
收藏
页码:253 / 267
页数:15
相关论文
共 50 条
  • [11] Lantibiotics: How do producers become self-protected?
    Alkhatib, Zainab
    Abts, Andre
    Mavaro, Antonino
    Schmitt, Lutz
    Smits, Sander H. J.
    JOURNAL OF BIOTECHNOLOGY, 2012, 159 (03) : 145 - 154
  • [12] ESD scalability of LDMOS devices for self-protected output drivers
    Chung, Y
    Xu, HZ
    Ida, R
    Min, WG
    Baird, B
    PROCEEDINGS OF THE 17TH INTERNATIONAL SYMPOSIUM ON POWER SEMICONDUCTOR DEVICES & ICS, 2005, : 351 - 354
  • [13] Self-protected quantum algorithms based on quantum state tomography
    Wu, Lian-Ao
    Byrd, Mark S.
    QUANTUM INFORMATION PROCESSING, 2009, 8 (01) : 1 - 12
  • [14] A Self-Protected Single-Stage LLC Resonant Rectifier
    Zhang, Guidong
    Zeng, Junming
    Xiao, Wenxun
    Yu, Samson Shenglong
    Zhang, Bo
    Zhang, Yun
    IEEE JOURNAL OF EMERGING AND SELECTED TOPICS IN POWER ELECTRONICS, 2021, 9 (03) : 3361 - 3372
  • [15] HYBRIDS FOR DIRECT ENRICHMENT AND SELF-PROTECTED FISSILE FUEL PRODUCTION
    CONN, RW
    KANTROWITZ, F
    VOGELSANG, WF
    NUCLEAR TECHNOLOGY, 1980, 49 (03) : 458 - 468
  • [16] Self-protected quantum algorithms based on quantum state tomography
    Lian-Ao Wu
    Mark S. Byrd
    Quantum Information Processing, 2009, 8
  • [17] Self-Protected Virtual Sensor Network for Microcontroller Fault Detection
    Sternharz, German
    Skackauskas, Jonas
    Elhalwagy, Ayman
    Grichnik, Anthony J.
    Kalganova, Tatiana
    Huda, Md Nazmul
    SENSORS, 2022, 22 (02)
  • [18] Washout resistance of self-protected underwater concrete in freshwater and seawater
    Nasr, Ahmed A.
    Chen, Songgui
    Jin, Feng
    CONSTRUCTION AND BUILDING MATERIALS, 2021, 289
  • [19] AN OVERVOLTAGE, SELF-PROTECTED THYRISTOR WITH HIGH BREAKOVER POWER ENDURANCE
    SHIMIZU, Y
    IYOTANI, R
    YATSUO, T
    YOKOTA, Y
    IEEE TRANSACTIONS ON ELECTRON DEVICES, 1991, 38 (04) : 913 - 916
  • [20] New self-controlled and self-protected IGBT based integrated switch
    Capy, F.
    Laur, J. P.
    Breil, M.
    Richardeau, F.
    Brunet, M.
    Imbernon, E.
    Bourennane, A.
    Caramel, C.
    Austin, P.
    Sanchez, J. L.
    2009 21ST INTERNATIONAL SYMPOSIUM ON POWER SEMICONDUCTOR DEVICES & ICS, 2009, : 243 - +