-
Recent Posts
- Engineering Data-Driven Secure Software Services
- Design Space for Cyber Security Analytical Systems
- Adaptive Architectures for Cyber Security Analytics Systems
- A Systematic Horizon Scan of Security Orchestration Approaches and Tools
- Internet of Things Search Engine: Concepts, Classification, and Open Issues
Recent Comments
Cap Table on Unique Challenges of Global So… Archives
- March 2019
- January 2019
- October 2018
- August 2018
- July 2018
- November 2017
- June 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- August 2014
- April 2014
- March 2014
- February 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- May 2013
- April 2013
- November 2012
- September 2012
- August 2012
- July 2012
- May 2012
- April 2012
- March 2012
- December 2011
- September 2011
- August 2011
- July 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
Categories
- Activity Based Computing
- Adelaide Smart City
- Agile Approaches
- Architectural knowledge
- Australian Software Factory
- Australian Software Factory
- Big Data
- Cloud Computing
- Combat Systems
- Computer Science Degree Programs
- Connected Cities
- Container Technologies
- Continuous Development
- Continuous Software Engineering
- Curriculum
- Cyber Security
- Data Exfiltration
- Defence Systems
- Delegate
- Design patterns
- Design rationale
- DevOps
- Education
- Entrepreneurs
- Evidence-Based Software Engineering
- Extreme Programming
- Gamification
- Global Software Engineering (GSE)
- Green ICT
- Green Software
- Human-Centric Software Engineering
- Inner Source Software
- Innovation
- Internet of Everything
- Internet of Things (IoTs)
- Knowledge Sharing
- Massive Open Online Courses
- Microgrid
- Model Driven Engineering (MDE)
- MOOCs
- Open Source Software
- Privacy
- Private Cloud
- Requirements Engineering
- Research Methods
- Scalable
- Scrum
- SE Curriculum
- Security
- Security Analytics
- Security Orchestration
- Service Oriented Computing
- Service-Oriented Architecture
- Small Private Online Courses
- Smart Campus
- Smart Campus
- Smart Cities
- Smart Energy Systems
- Smart Environment
- Smart Grid
- Smart Mobility
- Smart People
- Social Computing
- Social Structure
- Software Architecture
- Software Engineering
- Software Engineering Programs
- Software Product Lines
- SPOCs
- Submarine Systems
- Sustainability
- Uncategorized
- Variability management
- Web of Things (WoTs)
Meta
Category Archives: Defence Systems
Evaluating Docker for Secure and Scalable Private Cloud with Container Technologies
The ongoing collaboration with the Maritime Division of Defence and Science Technology Group (DST) has resulted in another very useful piece of work that we are very glad to share through this blog. We have been conducting a series of … Continue reading
Understanding Container Isolation Mechanisms for Security-Sensitive Private Cloud
With the increasing trend of adopting containerised solution for cloud-based infrastructures, it is becoming increasingly important to pay appropriate attention to the security risks that usually characterise virtualised solutions using container technologies such as Docker. We have recently finished another … Continue reading
Learning from a Detailed Security Analysis of Containerised Technologies
Container technologies, particularly Docker Engine, have been gaining significant popularity and adoption for building development and operational virtualised infrastructures. An increasing number of cloud technologies have started integrating container technologies into their platforms. While the performance and scalability advantages of … Continue reading
Modeling Security-Sensitive Architecture of Systems-of-Systems
An increasing number of software systems are considered Software Intensive Systems of Systems (SiSoS), which consist of dozens of constituent systems. Systems are interconnected using private or public networks, which can be prime target for security attacks. Hence, securing SiSoS … Continue reading
Secure and Scalable Private Cloud for Defence Systems
Following on the successful completion of our collaborative project on building and evaluating private cloud for defence systems, our second project is on building and evaluating secure and scalable private cloud using container technologies. For our projects, we use Openstack … Continue reading
Private Cloud for Defence Systems
Defence Science and Technology Group (DSTG), An Australian Defence’s R&D organisation, recognises that Cloud Computing presents new opportunities for more flexible and efficient utilisation of computing resources. We have teamed up with DST’s submarine division’s researchers to build and apply … Continue reading