7,046 research outputs found

    MSFC evaluation of the space fabrication demonstration system (beam builder)

    Get PDF
    The beam builder, designed and manufactured as a ground demonstration model, is a precursor to a machine for use in the space environment, transportable by the space shuttle. The beam builder has the capability to automatically fabricate triangular truss beams in low Earth orbit with a highly reliable machine that requires a minimum of in-space maintenance and repair. A performance assessment of the beam builder, which was fabricated from commercial hardware is given

    A Multilevel File System for High Assurance

    Get PDF
    The designs of applications for multilevel systems cannot merely duplicate those of the untrusted world. When applications are built on a high assurance base they will be constrained by the underlying policy enforcement mechanism_ Consideration must be given to the creation and management of multilevel data structures by untrusted subjects_ Applications should be designed to rely upon the TCB s security policy enforcement services rather than build new access control services beyond the TCB perimeter The results of an analysis of the design of a general purpose le system developed to execute as an untrusted application on a high assurance TCB are presented. The design illustrates a number of solutions to problems resulting from a high assurance environment.Approved for public release; distribution is unlimited

    Alien Registration- Irvine, Edith E. (Fort Fairfield, Aroostook County)

    Get PDF
    https://digitalmaine.com/alien_docs/35951/thumbnail.jp

    Emergency response for cyber infrastructure management

    Get PDF
    The objective of this research is to investigate architectural mechanisms to provide an emergency response capability for Cyber Infrastructure management through the use of distributed, highly secure, protected domains. Instead of creating a costly physically separate cyber domain, logical separation is used. This work developed an architecture and prototype demonstration in the context of an open source operating system.Approved for public release; distribution is unlimited

    An introduction to Quality of Security Services

    Get PDF
    We examine the concept of security as a dimension of Quality of Service in distributed systems. We provide a discussion and examples of user- specified security variables and show how the range of service levels associated with these variables can support the provision of Quality of Security Service. We also discuss various design implications regarding security ranges provided in a QoS-aware distributed system. Our goal has been to provide an understanding of QoSS and variant security, and to determine whether these concepts can be useful in improving security service and system performance in QoS-aware distributed systems. We described the general requirements for system attributes to participate in the provision of Quality of Service, and described how certain security attributes might meet these requirements. We then described various forms of user and application security "ranges "and showed how these ranges can make sense in relation to existing security policies, when those ranges are presented as user choices. Finally we described security ranges as forming a coherent system of relationships in a distributed multi-tiered system. Our conclusion is that it may be possible for security to be a semantically meaningful dimension of Quality of Service without compromising existing security policies. Further study is needed to understand the effectiveness of QoSS in improving system performance in QoS-aware systems.Approved for public release; distribution is unlimited

    College Student Behavior as an Evaluation of the Iowa Home Adjustment Inventory

    Get PDF
    One hundred forty freshman students, 56 women and 84 men, were given the Iowa Home Adjustment Inventory. Confidential information was then obtained on thirty out-of-town students. Raters reported on only those whose student behavior was specifically known to them. Ten freshman women live in the Women\u27s Dormitory. There is no men\u27s dormitory, and all the men live either at their own homes or in private homes. This made the desired information not as easily obtainable as on a campus where more students live in dormitories. Furthermore, the conduct of the student who is living at home does not so easily reveal confirmation or rejection or an intense affection score. Thus the results do not pile up in a quantitative way as they would in an effective dormitory system. But only the positive objective behavior data are here presented. The present study was conducted to evaluate the Iowa Home Adjustment Inventory by comparing student test scores with actual behavior in college

    Simulation of PKI-Enabled Communication for Identity Management Using CyberCIEGE

    Get PDF
    CyberCIEGE is a sophisticated network security simulation packaged as a video game and used by educators around the world to enhance information assurance education and training at universities, community colleges, within the DoD, and in other government agencies. The CyberCIEGE game engine was recently expanded to include Public Key Infrastructure (PKI) features including certification authorities, selection of installed roots and cross certification. CyberCIEGE Virtual Private Network (VPN) gateways, VPN clients and email clients were then extended to incorporate the new PKI features. CyberCIEGE PKI abstractions are described in terms of player configuration choices and the consequences of these choices on network management and vulnerabilities. The CyberCIEGE game engine modifications include modeling of chains of trust and risks of cross certification schemes. The benefits of these enhancements include coherent integration of identity management technologies, ranging from the human interface through to the supporting distributed infrastructure, into scenarios. Benefits also include support for recent new scenarios focused on the PKI infrastructure, identity management, or both; and the ability to tie both identity management and PKI to concepts of identification, authentication, provenance, and access control.These CyberCIEGE extensions were sponsored by the Biometrics Task Force.Approved for public release; distribution is unlimited
    corecore