8,989 research outputs found

    Graduate Catalog of Studies, 2023-2024

    Get PDF

    Configuration Management of Distributed Systems over Unreliable and Hostile Networks

    Get PDF
    Economic incentives of large criminal profits and the threat of legal consequences have pushed criminals to continuously improve their malware, especially command and control channels. This thesis applied concepts from successful malware command and control to explore the survivability and resilience of benign configuration management systems. This work expands on existing stage models of malware life cycle to contribute a new model for identifying malware concepts applicable to benign configuration management. The Hidden Master architecture is a contribution to master-agent network communication. In the Hidden Master architecture, communication between master and agent is asynchronous and can operate trough intermediate nodes. This protects the master secret key, which gives full control of all computers participating in configuration management. Multiple improvements to idempotent configuration were proposed, including the definition of the minimal base resource dependency model, simplified resource revalidation and the use of imperative general purpose language for defining idempotent configuration. Following the constructive research approach, the improvements to configuration management were designed into two prototypes. This allowed validation in laboratory testing, in two case studies and in expert interviews. In laboratory testing, the Hidden Master prototype was more resilient than leading configuration management tools in high load and low memory conditions, and against packet loss and corruption. Only the research prototype was adaptable to a network without stable topology due to the asynchronous nature of the Hidden Master architecture. The main case study used the research prototype in a complex environment to deploy a multi-room, authenticated audiovisual system for a client of an organization deploying the configuration. The case studies indicated that imperative general purpose language can be used for idempotent configuration in real life, for defining new configurations in unexpected situations using the base resources, and abstracting those using standard language features; and that such a system seems easy to learn. Potential business benefits were identified and evaluated using individual semistructured expert interviews. Respondents agreed that the models and the Hidden Master architecture could reduce costs and risks, improve developer productivity and allow faster time-to-market. Protection of master secret keys and the reduced need for incident response were seen as key drivers for improved security. Low-cost geographic scaling and leveraging file serving capabilities of commodity servers were seen to improve scaling and resiliency. Respondents identified jurisdictional legal limitations to encryption and requirements for cloud operator auditing as factors potentially limiting the full use of some concepts

    Unleashing the power of artificial intelligence for climate action in industrial markets

    Get PDF
    Artificial Intelligence (AI) is a game-changing capability in industrial markets that can accelerate humanity's race against climate change. Positioned in a resource-hungry and pollution-intensive industry, this study explores AI-powered climate service innovation capabilities and their overall effects. The study develops and validates an AI model, identifying three primary dimensions and nine subdimensions. Based on a dataset in the fast fashion industry, the findings show that the AI-powered climate service innovation capabilities significantly influence both environmental and market performance, in which environmental performance acts as a partial mediator. Specifically, the results identify the key elements of an AI-informed framework for climate action and show how this can be used to develop a range of mitigation, adaptation and resilience initiatives in response to climate change

    Automation for network security configuration: state of the art and research trends

    Get PDF
    The size and complexity of modern computer networks are progressively increasing, as a consequence of novel architectural paradigms such as the Internet of Things and network virtualization. Consequently, a manual orchestration and configuration of network security functions is no more feasible, in an environment where cyber attacks can dramatically exploit breaches related to any minimum configuration error. A new frontier is then the introduction of automation in network security configuration, i.e., automatically designing the architecture of security services and the configurations of network security functions, such as firewalls, VPN gateways, etc. This opportunity has been enabled by modern computer networks technologies, such as virtualization. In view of these considerations, the motivations for the introduction of automation in network security configuration are first introduced, alongside with the key automation enablers. Then, the current state of the art in this context is surveyed, focusing on both the achieved improvements and the current limitations. Finally, possible future trends in the field are illustrated

    UMSL Bulletin 2023-2024

    Get PDF
    The 2023-2024 Bulletin and Course Catalog for the University of Missouri St. Louis.https://irl.umsl.edu/bulletin/1088/thumbnail.jp

    Graduate Catalog of Studies, 2023-2024

    Get PDF

    The value and structuring role of web APIs in digital innovation ecosystems: the case of the online travel ecosystem

    Get PDF
    Interfaces play a key role in facilitating the integration of external sources of innovation and structuring ecosystems. They have been conceptualized as design rules that ensure the interoperability of independently produced modules, with important strategic value for lead firms to attract and control access to complementary assets in platform ecosystems. While meaningful, these theorizations do not fully capture the value and structuring role of web APIs in digital innovation ecosystems. We show this with an empirical study of the online travel ecosystem in the 26 years (1995–2021) after the first Online Travel Agencies (OTAs) were launched. Our findings reveal that web APIs foster a dynamic digital innovation ecosystem with a distributed networked structure in which multiple actors design and use them. We provide evidence of an ecosystem where decentralized interfaces enable decentralized governance and where interfaces establish not only cooperative relationships, but also competitive ones. Instead of locking in complementors, web APIs enable the integration of capabilities from multiple organizations for the co-production of services and products, by interfacing their information systems. Web APIs are important sources of value creation and capture, increasingly being used to offer or sell services, constituting important sources of revenue

    Design and Validation of Cyber-Physical Systems Through Co-Simulation: The Voronoi Tessellation Use Case

    Get PDF
    This paper reports on the use of co-simulation techniques to build prototypes of co-operative autonomous robotic cyber-physical systems. Designing such systems involves a mission-specific planner algorithm, a control algorithm to drive an agent performing its task; and the plant model to simulate the agent dynamics. An application aimed at positioning a swarm of unmanned aerial vehicles (drones) in a bounded area, exploiting a Voronoi tessellation algorithm developed in this work, is taken as a case study. The paper shows how co-simulation allows testing the complex system at the design phase using models created with different languages and tools. The paper then reports on how the adopted co-simulation platform enables control parameters calibration, by exploiting design space exploration technology. The INTO-CPS co-simulation platform, compliant with the Functional Mock-up Interface standard to exchange dynamic simulation models using various languages, was used in this work. The different software modules were written in Modelica, C, and Python. In particular, the latter was used to implement an original variant of the Voronoi algorithm to tesselate a convex polygonal region, by means of dummy points added at appropriate positions outside the bounding polygon. A key contribution of this case study is that it demonstrates how an accurate simulation of a cooperative drone swarm requires modeling the physical plant together with the high-level coordination algorithm. The coupling of co-simulation and design space exploration has been demonstrated to support control parameter calibration to optimize energy consumption and convergence time to the target positions of the drone swarm. From a practical point of view, this makes it possible to test the ability of the swarm to self-deploy in space in order to achieve optimal detection coverage and allow unmanned aerial vehicles in a swarm to coordinate with each other

    The effect of audit partner digitalization expertise on audit fees

    Get PDF
    This study focuses on the effects of digitalization on the auditing industry and the impact of audit partner expertise in digitalization on audit fees. Using data from listed U.S. companies between 2016 and 2021, we document a statistically and economically significant audit fee premium for audit partners who specialize in digitalization. This premium is separate from the partner’s industry specialization and is strongest in industries with a high level of digitalization, especially during the first half of the sample period. Our subsample analysis shows that, while the premium appears to be diminishing in less digitalized industries, it remains significant in highly digitalized industries. This change may be due to the general increase in digitalization expertise among audit partners, leading to diminishing returns to specialization for less digitalized audits

    Visual Programming Paradigm for Organizations in Multi-Agent Systems

    Get PDF
    Over the past few years, due to a fast digitalization process, business activities witnessed the adoption of new technologies, such as Multi-Agent Systems, to increase the autonomy of their activities. However, the complexity of these technologies often hinders the capability of domain experts, who do not possess coding skills, to exploit them directly. To take advantage of these individuals' expertise in their field, the idea of a user-friendly and accessible Integrated Development Environment arose. Indeed, efforts have already been made to develop a block-based visual programming language for software agents. Although the latter project represents a huge step forward, it does not provide a solution for addressing complex, real-world use cases where interactions and coordination among single entities are crucial. To address this problem, Multi-Agent Oriented Programming introduces organization as a first-class abstraction for designing and implementing Multi-Agent Systems. Therefore, this thesis aims to provide a solution allowing users to impose an organization on top of the agents easily. Since ease of use and intuitiveness remain the key points for this project, users will be able to define organizations through visual language and an intuitive development environment
    • …
    corecore