6,969 research outputs found

    MSFC evaluation of the space fabrication demonstration system (beam builder)

    Get PDF
    The beam builder, designed and manufactured as a ground demonstration model, is a precursor to a machine for use in the space environment, transportable by the space shuttle. The beam builder has the capability to automatically fabricate triangular truss beams in low Earth orbit with a highly reliable machine that requires a minimum of in-space maintenance and repair. A performance assessment of the beam builder, which was fabricated from commercial hardware is given

    A Multilevel File System for High Assurance

    Get PDF
    The designs of applications for multilevel systems cannot merely duplicate those of the untrusted world. When applications are built on a high assurance base they will be constrained by the underlying policy enforcement mechanism_ Consideration must be given to the creation and management of multilevel data structures by untrusted subjects_ Applications should be designed to rely upon the TCB s security policy enforcement services rather than build new access control services beyond the TCB perimeter The results of an analysis of the design of a general purpose le system developed to execute as an untrusted application on a high assurance TCB are presented. The design illustrates a number of solutions to problems resulting from a high assurance environment.Approved for public release; distribution is unlimited

    Alien Registration- Irvine, Edith E. (Fort Fairfield, Aroostook County)

    Get PDF
    https://digitalmaine.com/alien_docs/35951/thumbnail.jp

    Emergency response for cyber infrastructure management

    Get PDF
    The objective of this research is to investigate architectural mechanisms to provide an emergency response capability for Cyber Infrastructure management through the use of distributed, highly secure, protected domains. Instead of creating a costly physically separate cyber domain, logical separation is used. This work developed an architecture and prototype demonstration in the context of an open source operating system.Approved for public release; distribution is unlimited

    An introduction to Quality of Security Services

    Get PDF
    We examine the concept of security as a dimension of Quality of Service in distributed systems. We provide a discussion and examples of user- specified security variables and show how the range of service levels associated with these variables can support the provision of Quality of Security Service. We also discuss various design implications regarding security ranges provided in a QoS-aware distributed system. Our goal has been to provide an understanding of QoSS and variant security, and to determine whether these concepts can be useful in improving security service and system performance in QoS-aware distributed systems. We described the general requirements for system attributes to participate in the provision of Quality of Service, and described how certain security attributes might meet these requirements. We then described various forms of user and application security "ranges "and showed how these ranges can make sense in relation to existing security policies, when those ranges are presented as user choices. Finally we described security ranges as forming a coherent system of relationships in a distributed multi-tiered system. Our conclusion is that it may be possible for security to be a semantically meaningful dimension of Quality of Service without compromising existing security policies. Further study is needed to understand the effectiveness of QoSS in improving system performance in QoS-aware systems.Approved for public release; distribution is unlimited

    College Student Behavior as an Evaluation of the Iowa Home Adjustment Inventory

    Get PDF
    One hundred forty freshman students, 56 women and 84 men, were given the Iowa Home Adjustment Inventory. Confidential information was then obtained on thirty out-of-town students. Raters reported on only those whose student behavior was specifically known to them. Ten freshman women live in the Women\u27s Dormitory. There is no men\u27s dormitory, and all the men live either at their own homes or in private homes. This made the desired information not as easily obtainable as on a campus where more students live in dormitories. Furthermore, the conduct of the student who is living at home does not so easily reveal confirmation or rejection or an intense affection score. Thus the results do not pile up in a quantitative way as they would in an effective dormitory system. But only the positive objective behavior data are here presented. The present study was conducted to evaluate the Iowa Home Adjustment Inventory by comparing student test scores with actual behavior in college

    Multi-level study of C3H2: The first interstellar hydrocarbon ring

    Get PDF
    Cyclic species in the interstellar medium have been searched for almost since the first detection of interstellar polyatomic molecules. Eleven different C3H2 rotational transitions were detected; 9 of which were studied in TMC-1, a nearby dark dust cloud, are shown. The 1 sub 10 yields 1 sub 01 and 2 sub 20 yields 2 sub 11 transitions were observed with the 43 m NRAO telescope, while the remaining transitions were detected with the 14 m antenna of the Five College Radio Observatory (FCRAO). The lines detected in TMC-1 have energies above the ground state ranging from 0.9 to 17.1 K and consist of both ortho and para species. Limited maps were made along the ridge for several of the transitions. The HC3N J = 2 yields 1 transition were mapped simultaneously with the C3H2 1 sub 10 yields 1 sub 01 line and therefore can compare the distribution of this ring with a carbon chain in TMC-1. C3H2 is distributed along a narrow ridge with a SE - NW extension which is slightly more extended than the HC2N J = 2 yields 1. Gaussian fits gives a FWHP extension of 8'5 for C3H2 while HC3N has a FWHP of 7'. The data show variations of the two velocity components along the ridge as a function of transition. Most of the transitions show a peak at the position of strongest HC3N emission while the 2 sub 21 yields 2 sub 10 transition shows a peak at the NH3 position

    Jumble Java Byte Code to Measure the Effectiveness of Unit Tests

    Get PDF
    Jumble is a byte code level mutation testing tool for Java which inter-operates with JUnit. It has been designed to operate in an industrial setting with large projects. Heuristics have been included to speed the checking of mutations, for example, noting which test fails for each mutation and running this first in subsequent mutation checks. Significant effort has been put into ensuring that it can test code which uses custom class loading and reflection. This requires careful attention to class path handling and coexistence with foreign class-loaders. Jumble is currently used on a continuous basis within an agile programming environment with approximately 370,000 lines of Java code under source control. This checks out project code every fifteen minutes and runs an incremental set of unit tests and mutation tests for modified classes. Jumble is being made available as open source
    corecore