Help: This page shows how the referencing vocabulary definitions are maintained and interlinked for controlled consistency of documentation. Click on the hyperlinks to see how the terms are defined within the Askemos architecture. moreā€¦ Tip: Remember the back-button!

This page has three main sections. (Note that the listings could be empty.)

  1. The first item displays a term, URL, text or picture.
  2. Followed by a (still unordered) listing of statements about this subject. (for details follow ">"-link)
  3. Separated by a horizontal rule a "reverse" listing of statements referring to this item in object position.
661 is a > wiki page
663 description >

A system is called "intrusion resistant", if it, as a whole, continues to adhere to it's predefined rules even in case of a part of the system components violate these rules (accidentally or by malicious intent).

The aim of intrusion resistance is to counter-balance for the consequences of continued operation of an embraced device under violation of normaly system-guaranted assumptions (e.g., forged data, access rights).

more details...

1502 adheres to > General will

Non-Repudiation subject (keyword)
Mission-oriented Resilient Cloud subject (keyword)
Heterogeneous Security subject (keyword)
keywords&details subject (keyword)
Objective truth (Evidential or Agreement) alternative