702 research outputs found
Supply Chain Threats and Countermeasures: From Elicitation through Optimization
There are many checklists for improving supply chain resilience under different threats, but a lack of concrete procedures to rigorously assess and select among countermeasures (CMs). We present a novel process and method to elicit the needed information to identify CMs and assess their ability to reduce risk. We report on the fine-grained analysis underlying an effective simulation developed to model both the impact of threats and the impact of alternative CMs in the information and communication technology supply chain subject to disruptions due to natural hazards. We also describe the coarse-grained descriptions needed to elicit risk reduction estimates from subject matter experts, and the problems of integrating these two approaches, bottom up, and top down, to support management decisions to choose an optimal set of CMs given a limited budget
Separability of State Trajectories and its Applications to Security of Cyber-Physical Systems
This article studies a fundamental problem of security of cyber-physical
systems (CPSs). We focus on a class of attacks where some of the actuators
could be malicious while all the sensors are considered to be honest. We
introduce a novel idea of separability of state trajectories that are generated
by the honest and corrupt actuators, and establish its connection to the
security of CPSs in the context of detecting the presence of malicious
actuators (if any,) in the system. As a defense strategy to guard the CPS
against malicious attacks, we focus on the mechanism of perturbing the
pre-determined control action by injecting a certain class of random process by
the honest actuators called private excitation, which is assumed to have a
known distribution. As primary contributions we give sufficient conditions for
the existence and non-existence of a separator for linear time-invariant
stochastic systems, under the assumption that the policies are
randomized-Markovian and randomized history dependent. Several technical
aspects of the established results are discussed extensively.Comment: 26 page
Publicly Detectable Watermarking for Language Models
We construct the first provable watermarking scheme for language models with
public detectability or verifiability: we use a private key for watermarking
and a public key for watermark detection. Our protocol is the first
watermarking scheme that does not embed a statistical signal in generated text.
Rather, we directly embed a publicly-verifiable cryptographic signature using a
form of rejection sampling. We show that our construction meets strong formal
security guarantees and preserves many desirable properties found in schemes in
the private-key watermarking setting. In particular, our watermarking scheme
retains distortion-freeness and model agnosticity. We implement our scheme and
make empirical measurements over open models in the 7B parameter range. Our
experiments suggest that our watermarking scheme meets our formal claims while
preserving text quality
2007 Annual Report of the Graduate School of Engineering and Management, Air Force Institute of Technology
The Graduate School\u27s Annual Report highlights research focus areas, new academic programs, faculty accomplishments and news, and provides top-level sponsor-funded research data and information
SciTech News Volume 71, No. 1 (2017)
Columns and Reports From the Editor 3
Division News Science-Technology Division 5 Chemistry Division 8 Engineering Division Aerospace Section of the Engineering Division 9 Architecture, Building Engineering, Construction and Design Section of the Engineering Division 11
Reviews Sci-Tech Book News Reviews 12
Advertisements IEEE
A Property Rights Enforcement and Pricing Model for IIoT Data Marketplaces
ํ์๋
ผ๋ฌธ(์์ฌ)--์์ธ๋ํ๊ต ๋ํ์ :๊ณต๊ณผ๋ํ ํ๋๊ณผ์ ๊ธฐ์ ๊ฒฝ์ยท๊ฒฝ์ ยท์ ์ฑ
์ ๊ณต,2019. 8. Jรถrn Altmann.The Industrial Internet of Things (IIoT) has become a valuable data source for products and services based on advanced data analytics. However, evidence suggests that industries are suffering a significant loss of value creation from insufficient IIoT data sharing. We argue that the limited utilization of the Sensing as a Service business model is caused by the economic and technological characteristics of sensor data, and the corresponding absence of applicable digital rights management models. Therefore, we propose a combined property rights enforcement and pricing model to solve the IIoT data sharing incentive problem.์ฐ์
์ฉ ์ฌ๋ฌผ ์ธํฐ๋ท (IIoT) ๋ฐ์ดํฐ๊ฐ ์ ํ๊ณผ ์๋น์ค๋ฅผ ์ํ ์ค์ํ ๊ณ ๊ธ ๋ฐ์ดํฐ ์์ค๋ก ์ฌ๊ฒจ์ง๊ณ ์์ง๋ง, ์ฌ์ ํ ์ ๋ง์ ๊ธฐ์
๋ค์ ๋ถ์ถฉ๋ถํ ์ฐ์
์ฉ ์ฌ๋ฌผ ์ธํฐ๋ท ๋ฐ์ดํฐ ๊ณต์ ์์คํ
์ผ๋ก ์ธํ์ฌ ๊ณ ์ถฉ์ ๊ฒช๊ณ ์๋ค. ๋ฐฉ๋ํ ๋ถ๋์ ์ฐ์
์ฉ ๋ฐ์ดํฐ๊ฐ ์ ๋๋ก ๊ฑฐ๋๋์ง ๋ชปํ๊ณ ์์ผ๋ฉฐ, ์ด๋ ๋ฐ์ดํฐ์ ์ปค๋ค๋ ๊ฐ์น ์์ค๋ก ์ด์ด์ง๊ณ ์๋ค. ๋ณธ ์ฐ๊ตฌ์์๋ ์๋น์ค๋ก์์ ์ผ์ฑ (Sensing as a Service) ๋น์ง๋์ค ๋ชจ๋ธ์ด ํ์ ์ ์ผ๋ก ์ ์ฉ๋๊ณ ์๋ ์์ธ์ด ํด๋น ์ ๋ณด์ ๊ฒฝ์ ์ , ๊ธฐ์ ์ ํน์ง๋ค์ ๋ฐ์ํ๋ ๋์งํธ ๊ถ๋ฆฌ ์์คํ
์ ๋ถ์ฌ์ ๊ธฐ์ธํ๋ค๊ณ ๋ณด๊ณ ์๋ค. ๋ฐ๋ผ์ ๋ณธ ์ฐ๊ตฌ์์๋ ์ฐ์
์ฉ ์ฌ๋ฌผ ์ธํฐ๋ท ๋ฐ์ดํฐ์ ๋ํ ์ง์ ์ฌ์ฐ๊ถ ์งํ ์์คํ
๊ณผ ๋ฐ์ดํฐ ๊ฐ๊ฒฉ์ฐ์ ๋ชจ๋ธ์ ์ ์ํ์ฌ ์ฐ์
์ฉ ์ฌ๋ฌผ ์ธํฐ๋ท ๋ฐ์ดํฐ ๊ณต์ ์ธ์ผํฐ๋ธ ๋ฌธ์ ๋ฅผ ํด๊ฒฐํ๊ณ ์ ํ๋ค.1 Introduction 1
1.1 Background 1
1.2 Problem Description 6
1.3 Research Objective and Question 8
1.4 Methodology 8
1.5 Contributions 9
1.6 Structure 10
2 Literature Review 11
2.1 Sensing as a Service 11
2.2 Economic Characteristics of IIoT Data 14
2.2.1 Property Rights of Data 18
2.2.2 Licensing of IIoT Data 23
2.3 IIoT Data Marketplaces 25
2.3.1 Use-cases and Value Propositions 30
2.3.2 Market Structures and Pricing Models 34
2.4 Digital Rights Management for IIoT 36
3 Model 44
3.1 Assumptions 45
3.2 Watermarking Technique 47
3.2.1 Function 48
3.2.2 Example 50
3.2.3 Robustness 51
3.3 Economic Reasoning 54
3.3.1 The Quality Gap 55
3.3.2 Cost of Watermarking (CoW) 57
3.3.3 Cost of Attacking (CoA) 58
4 Analytical Analysis 60
4.1 Equilibrium Between CoW and CoA 60
4.2 Determining the Optimal Quality Gap 62
4.3 Applicability of the Quality Gap Function 64
5 Conclusion 66
5.1 Summary 66
5.2 Discussion 66
6 Limitations and Future Research 68
References 70
Abstract (Korean) 79Maste
On an Information and Control Architecture for Future Electric Energy Systems
This paper presents considerations towards an information and control
architecture for future electric energy systems driven by massive changes
resulting from the societal goals of decarbonization and electrification. This
paper describes the new requirements and challenges of an extended information
and control architecture that need to be addressed for continued reliable
delivery of electricity. It identifies several new actionable information and
control loops, along with their spatial and temporal scales of operation, which
can together meet the needs of future grids and enable deep decarbonization of
the electricity sector. The present architecture of electric power grids
designed in a different era is thereby extensible to allow the incorporation of
increased renewables and other emerging electric loads.Comment: This paper is accepted, to appear in the Proceedings of the IEE
- โฆ