Search For:

Displaying 1-20 out of 20 total
The Value of Capture-the-Flag Exercises in Education: An Interview with Chris Eagle
Found in: IEEE Security and Privacy
By Cynthia Irvine
Issue Date:November 2011
pp. 58-60
IEEE Security & Privacy talks with Chris Eagle of the US Naval Postgraduate School about capture-the-flag exercises and their applicability to high school and college computer science education.
 
Help! Is There a Trustworthy-Systems Doctor in the House?
Found in: IEEE Security & Privacy
By Alec Yasinsac,Cynthia Irvine
Issue Date:January 2013
pp. 73-77
A multidisciplinary PhD in trustworthy systems can combine knowledge and practices from computer science, information systems, software engineering, and information technology. Such a program will create individuals who can lead teams of specialists that c...
 
Educating the Systems Security Engineer's Apprentice
Found in: IEEE Security and Privacy
By Cynthia Irvine, Thuy D. Nguyen
Issue Date:July 2010
pp. 58-61
A series of specialized courses systematizes the knowledge and skills needed for those pursuing information systems security engineering.
 
A Cyberoperations Program
Found in: IEEE Security & Privacy
By Cynthia Irvine
Issue Date:September 2013
pp. 66-69
To conduct cyberoperations, not only must you understand computers, networks, and protocols, you must also determine what circumstances actions may be taken in and who can take them. In addition, you must consider strategies and policies as well as those a...
 
A Cyberoperations Program
Found in: IEEE Security & Privacy
By Cynthia Irvine
Issue Date:September 2013
pp. 66-69
To conduct cyberoperations, not only must you understand computers, networks, and protocols, you must also determine what circumstances actions may be taken in and who can take them. In addition, you must consider strategies and policies as well as those a...
 
Guest Editors' Introduction
Found in: IEEE Security and Privacy
By Shari Lawrence Pfleeger,Cynthia Irvine,Mischel Kwon
Issue Date:March 2012
pp. 19-23
From confusing online terms of use to changing forms of data collection, users must make difficult decisions about protecting their work and themselves online. The average citizen is repeatedly asked to make decisions at home and on the job for which answe...
 
Guest Editors' Introduction: Engineering Secure Systems
Found in: IEEE Security and Privacy
By Cynthia Irvine, J.R. Rao
Issue Date:January 2011
pp. 18-21
Construction of highly trustworthy systems is quite challengiwng and requires experienced leaders who can guide development teams through technical, political, and bureaucratic hurdles. Today's systems must be designed so that their security claims remain ...
 
Managing Security in FPGA-Based Embedded Systems
Found in: IEEE Design and Test of Computers
By Ted Huffmire, Brett Brotherton, Timothy Sherwood, Ryan Kastner, Timothy Levin, Thuy D. Nguyen, Cynthia Irvine
Issue Date:November 2008
pp. 590-598
FPGAs combine the programmability of processors with the performance of custom hardware, and they are becoming more common in critical embedded systems. This raises interesting security implications, and new techniques are needed to manage security in FPGA...
 
Extended abstract: Trustworthy system security through 3-D integrated hardware
Found in: Hardware-Oriented Security and Trust, IEEE International Workshop on
By Ted Huffmire, Jonathan Valamehr, Timothy Sherwood, Ryan Kastner, Timothy Levin, Thuy D. Nguyen, Cynthia Irvine
Issue Date:June 2008
pp. 91-92
No summary available.
 
Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems
Found in: Security and Privacy, IEEE Symposium on
By Ted Huffmire, Brett Brotherton, Gang Wang, Timothy Sherwood, Ryan Kastner, Timothy Levin, Thuy Nguyen, Cynthia Irvine
Issue Date:May 2007
pp. 281-295
Blurring the line between software and hardware, reconfigurable devices strike a balance between the raw high speed of custom silicon and the post-fabrication flexibility of general-purpose processors. While this flexibility is a boon for embedded system d...
 
MYSEA Technology Demonstration
Found in: DARPA Information Survivability Conference and Exposition,
By Cynthia Irvine, David Shifflett, Paul Clark, Timothy Levin, George Dinolt
Issue Date:April 2003
pp. 10
The MYSEA project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mechanisms for the protection of distributed multi-domain computing environments from...
 
Monterey Security Enhanced Architecture Project
Found in: DARPA Information Survivability Conference and Exposition,
By Cynthia Irvine, David Shifflett, Paul Clark, Timothy Levin, George Dinolt
Issue Date:April 2003
pp. 176
This research project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mechanisms for the protection of distributed multi-domain computing environments ...
 
Quantifying Effect of Network Latency and Clock Drift on Time-Driven Key Sequencing
Found in: Distributed Computing Systems Workshops, International Conference on
By Geoffrey G. Xie, Cynthia Irvine, Tim Levin
Issue Date:July 2002
pp. 35
<p>Time-driven Key Sequencing (TKS) is a key management technique that synchronizes the session key used by a set of communicating principals based on time of day. This relatively low cost method of session key synchronization has been used in specia...
 
A QoS Performance Measure Framework for Distributed Heterogeneous Networks
Found in: Parallel, Distributed, and Network-Based Processing, Euromicro Conference on
By Jong-Kook Kim, Howard Jay Siegel, Debra A. Hensgen, Taylor Kidd, Cynthia Irvine, N. Wayne Porter, David St. John, Tim Levin, Viktor K. Prasanna, Richard F. Freund
Issue Date:January 2000
pp. 18
In a distributed heterogeneous computing environment, users' tasks are allocated resources to simultaneously satisfy, to varying degrees, the tasks' different, and possibly conflicting, quality of service (QoS) requirements. When the total demand placed on...
 
Toward a Taxonomy and Costing Method for Security Services
Found in: Computer Security Applications Conference, Annual
By Cynthia Irvine, Tim Levin
Issue Date:December 1999
pp. 183
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning computing and network resources to tasks need to know the resource-utilization ...
 
An Overview of MSHN: The Management System for Heterogeneous Networks
Found in: Heterogeneous Computing Workshop
By Debra A. Hensgen, Taylor Kidd, David St. John, Matthew C. Schnaidt, Howard Jay Siegel, Tracy D. Braun, Muthucumaru Maheswaran, Shoukat Ali, Jong-Kook Kim, Cynthia Irvine, Tim Levin, Richard F. Freund, Matt Kussow, Michael Godfrey, Alpay Duman, Paul Carff,
Issue Date:April 1999
pp. 184
The Management System for Heterogeneous Networks (MSHN) is a resource management system for use in heterogeneous environments. This paper describes the goals of MSHN, its architecture, and both completed and ongoing research experiments. MSHN's main goal i...
 
Information Security Education for the Next Millennium: Building the Next Generation of Practitioners
Found in: Computer Security Applications Conference, Annual
By Ron Ross, Cynthia Irvine, Charles Reynolds, Ravi Sandhu, Blaine Burnham, Rayford Vaughn
Issue Date:December 1999
pp. 265
No summary available.
 
Hardware assistance for trustworthy systems through 3-D integration
Found in: Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC '10)
By Cynthia Irvine, Jonathan Valamehr, Mohit Tiwari, Ryan Kastner, Ted Huffmire, Timothy Levin, Timothy Sherwood
Issue Date:December 2010
pp. 199-210
Hardware resources are abundant; state-of-the-art processors have over one billion transistors. Yet for a variety of reasons, specialized hardware functions for high assurance processing are seldom (i.e., a couple of features per vendor over twenty years) ...
     
Cool security trends
Found in: Proceedings of the seventh ACM symposium on Access control models and technologies (SACMAT '02)
By Cynthia Irvine, David Wagner, Dawson Engler, Trent Jaegar
Issue Date:June 2002
pp. 53-53
Trent Jarger will discuss ongoing work in the verification of authorization hook placement in Linux. The idea is that we can develop tools to check that all security-sensitive kernel operations can be mediated properly. Dawson Engler will discuss ongoing w...
     
Quality of security service
Found in: Proceedings of the 2000 workshop on New security paradigms (NSPW '00)
By Cynthia Irvine, Timothy Levin
Issue Date:September 2000
pp. 91-99
Virtual Environments (VEs) have the potential to revolutionize traditional product design by enabling the transition from conventional CAD to fully digital product development The presented prototype system targets closing the **digital gap” as intro...
     
 1