Help: This page shows how the referencing vocabulary definitions are maintained and interlinked for controlled consistency of documentation. Click on the hyperlinks to see how the terms are defined within the Askemos architecture. moreā€¦ Tip: Remember the back-button!

This page has three main sections. (Note that the listings could be empty.)

  1. The first item displays a term, URL, text or picture.
  2. Followed by a (still unordered) listing of statements about this subject. (for details follow ">"-link)
  3. Separated by a horizontal rule a "reverse" listing of statements referring to this item in object position.
Heterogeneous Security
1466 comment > loosely defined term; Recommends to use different trusted systems to communicate among various replica of a common logical process.
1464 is a > programming paradigm
1468 subject (keyword) > Trusted system
1473 subject (keyword) > intrusion-resistant
1470 description >

Examples would include:

  • different encryption techniques to communicate among peers of a network
  • different means authentication for different links
  • use of various combinations of hardware, operating system, compilers and "Askemos compliant" implementations for peers commissioned to a process (example)
  • commissioning/distribution of data to peers under control persons trusted wrt. the information (anyway)