scispace - formally typeset
Search or ask a question
Topic

Systems architecture

About: Systems architecture is a research topic. Over the lifetime, 17612 publications have been published within this topic receiving 283719 citations. The topic is also known as: system architecture.


Papers
More filters
Proceedings ArticleDOI
05 Oct 2001
TL;DR: The proposed access control model preserves the advantages of scaleable security administration that RBAC-style models offer and yet offers the flexibility to specify complex access restrictions based on the semantic content of the images, the attributes of the user accessing the image, the relationship between the user and the patient whose images are to be accessed and the time.
Abstract: In many health care information systems medical images are an important part of the multimedia medical patient record. Most of the work on multimedia medical images security until now has focused on cryptographic approaches. While valuable, cryptography is not enough to control access to medical images. Therefore additional protection approaches should be applied at a higher level. Role-based access control (RBAC) is a good candidate to provide access control in a multimedia medical image database system. Roles accurately describe which types of people need to access to certain types of objects. However, in a multimedia medical image database system, specifications of image access rights are often content and context-dependent as well as time-dependent. Unfortunately, RBAC cannot be used to handle the above requirements. In this paper we describe an extended role-based access control model by considering, in the specification of the Role-Permission relationship phase, the constraints which must be satisfied in order for the holders of the permission to use those permissions. The use of constraints allows role-based access control to be tailored to specify very fine-grained, flexible, content, context and time-based access control policies. The proposed access control model preserves the advantages of scaleable security administration that RBAC-style models offer and yet offers the flexibility to specify complex access restrictions based on the semantic content of the images, the attributes of the user accessing the image, the relationship between the user and the patient whose images are to be accessed and the time. The description of an access control algorithm and a system architecture for a secure medical image DBMS are also presented.

59 citations

Journal ArticleDOI
TL;DR: The author presents a knowledge-based approach to enhance and support communication between humans and computers that has an explicit communication channel between the human and the hardware and an implicit communication channelBetween the human's knowledge base and the computer's stored knowledge.
Abstract: The author presents a knowledge-based approach to enhance and support communication between humans and computers. His system architecture has an explicit communication channel between the human and the hardware and an implicit communication channel between the human's knowledge base and the computer's stored knowledge. The author uses two intelligent support systems, Framer and Crack, to illustrate this concept. He concludes with a pragmatic description of lessons learned and problems ahead. >

59 citations

Proceedings ArticleDOI
01 Dec 2013
TL;DR: The technical feasibility of an alternative architecture that uses a combination of LTE cellular networks and servers near the edge of the LTE network to provide data freshness guarantees comparable to what can be achieved with DSRC for many applications is explored.
Abstract: Advanced Driving Assistance Systems (ADAS) for improving vehicular safety are increasingly network based, with approaches that use vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communication. Most current proposals for V2V and V2I use DSRC and a dedicated infrastructure of road side units (RSUs) for the V2I scenarios. Here, the technical feasibility of an alternative architecture is explored, one that uses a combination of LTE cellular networks and servers near the edge of the LTE network. Compared with approaches based on DSRC and RSUs, this architecture exploits an infrastructure that is already largely deployed, but requires that technical challenges related to latency and scalability be addressed. This paper outlines an architecture that addresses these challenges and shows experimental results that demonstrate its effectiveness for vehicular safety applications. The approach combines resources near the network edge with broadcast-based data distribution to provide data freshness guarantees comparable to what can be achieved with DSRC for many applications. Experiments from the deployed LTE network and NS-3 simulations demonstrate that this approach is feasible, and show the benefits and limitations of the architecture.

59 citations

Journal ArticleDOI
TL;DR: This paper explores global PD structures from process flow and system architecture perspectives, employing the design structure matrix method, and proposes a process for firms to follow as they pursue GPD, recognizing that modularity in design and development and modularness in manufacturing need not be the same.
Abstract: Recent advances in engineering collaboration tools and internet technology have enabled firms to distribute their product development (PD) tasks to offshore sites and global outsourcing partners while still maintaining a tightly connected process. In this paper, we explore such global PD structures from process flow and system architecture perspectives, employing the design structure matrix method. Through five case studies, spanning electronics, equipment, and aerospace industries, we observe the interaction complexity inherent in various global work distributions, the product and process structures, and their interplay with the speDA72-B1003-A011cific strategy used by the firm. Our observations lead to implications for organization forms and architecture decompositions for firms pursuing offshoring of engineering activities. Based on these implications, we propose a process for firms to follow as they pursue GPD, while recognizing that: first, modularity in design and development and modularity in manufacturing need not be the same, specially in complex engineered systems (CESs); and second, system architecture development is a core competence of the firm designing and developing CESs, and this activity should be retained at the home location. We conclude with potential research directions on the subject of global PD.

58 citations

Book ChapterDOI
29 Oct 2006
TL;DR: This research aims to find the right spot and the way to split off parts in organizations with redundancy in processes and ICT by applying action research to real-life cases in which ontology and architecture are used.
Abstract: Organizations increasingly split off parts and start cooperating with those parts, for instance in Shared Service Centers or by using in- or outsourcing Our research aims to find the right spot and the way to split off those parts: “Application of which organization-construction rules to organizations with redundancy in processes and ICT leads to adequate splitting of enterprises”? Architecture and ontology play a role in the construction of any system From organizational sciences we expect specific construction rules for splitting an enterprise, including criteria for “adequately” splitting an enterprise We intend to find and test those construction rules by applying action research to real-life cases in which ontology and architecture are used.

58 citations


Network Information
Related Topics (5)
Software
130.5K papers, 2M citations
90% related
Wireless sensor network
142K papers, 2.4M citations
86% related
Information system
107.5K papers, 1.8M citations
85% related
Wireless
133.4K papers, 1.9M citations
85% related
Network packet
159.7K papers, 2.2M citations
85% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202311
202227
2021405
2020555
2019638
2018572