Category Archives: Cloud Computing

Posts related to Cloud computing paradigm will be classified under this category.

Design Space for Cyber Security Analytical Systems

Cyber Security infrastructures are increasingly relying on big data technologies for capturing, storing, and analyzing huge amount of security events data. Designing and evolving systems that can effectively and efficiently combine big data technologies and cybersecurity are hugely challenging undertakings. … Continue reading

Posted in Big Data, Cloud Computing, Connected Cities, Cyber Security, Data Exfiltration, Security, Security Analytics, Uncategorized | Leave a comment

Adaptive Architectures for Cyber Security Analytics Systems

It is becoming quite hard to imagine software systems that wouldn’t need adaptation as part of their runtime requirements. With the increasing demand for adaptivity by design, the knowledge and skills in this area are lagging far behind. Cyber Analytics … Continue reading

Posted in Big Data, Cloud Computing, Cyber Security, Data Exfiltration, Security, Security Analytics, Security Orchestration, Uncategorized | Leave a comment

Our New Work on Self-Adaptive Security for large-scale Open Environments

We are continuously progressing on the plan for strengthening our capabilities in Cyber Security. To achieve this goal, we have been not only building internal capabilities but also forming and leveraging strategic collaborations. Out of one of our recent collaborations, … Continue reading

Posted in Architectural knowledge, Cloud Computing, Cyber Security, Data Exfiltration, Design patterns, Design rationale, Security, Service Oriented Computing, Service-Oriented Architecture, Software Architecture, Software Engineering, Uncategorized | Leave a comment

Data Exfiltration: External Attack Vectors and Countermeasures

With regards to our work on Cyber Security, we have recently successfully completed a collaborative piece fo work with researchers from Security Lancaster, University of Lancaster, UK. Our collaborative work was focused on identifying and understanding Data Exfiltration: External Vectors … Continue reading

Posted in Big Data, Cloud Computing, Cyber Security, Data Exfiltration, Knowledge Sharing, Security, Service Oriented Computing | Leave a comment

Evaluating Docker for Secure and Scalable Private Cloud with Container Technologies

The ongoing collaboration with the Maritime Division of Defence and Science Technology Group (DST) has resulted in another very useful piece of work that we are very glad to share through this blog. We have been conducting a series of … Continue reading

Posted in Cloud Computing, Combat Systems, Container Technologies, Cyber Security, Defence Systems, Private Cloud, Scalable, Security, Service Oriented Computing, Submarine Systems | Leave a comment

Understanding Container Isolation Mechanisms for Security-Sensitive Private Cloud

With the increasing trend of adopting containerised solution for cloud-based infrastructures, it is becoming increasingly important to pay appropriate attention to the security risks that usually characterise virtualised solutions using container technologies such as Docker. We have recently finished another … Continue reading

Posted in Cloud Computing, Combat Systems, Container Technologies, Defence Systems, DevOps, Private Cloud, Submarine Systems | Leave a comment

An Approach to Designing and Evaluating Web of Things (WoT) Systems

Internet of Things (IoT) have emerged a popular technology that underpinning several innovative products and services. Internet of Everything (IoE) or Web of Things (WoT) are real or virtual networks of things (or services) that can be meaningfully quarried or … Continue reading

Posted in Architectural knowledge, Big Data, Cloud Computing, Container Technologies, Cyber Security, Data Exfiltration, Design patterns, Design rationale, Internet of Everything, Internet of Things (IoTs), Private Cloud, Scalable, Security, Service Oriented Computing, Service-Oriented Architecture, Software Architecture, Software Engineering, Web of Things (WoTs) | Leave a comment