Search For:

Displaying 1-17 out of 17 total
Atomic-Level Security for Web Applications in a Cloud Environment
Found in: Computer
By Arnold Brown,Benjamin Apple,James Bret Michael,Michael Schumann
Issue Date:December 2012
pp. 80-83
Adopting an atomic-separation paradigm for provisioning the level of control needed in a cloud-computing environment requires taking a holistic approach to security.
 
When Is a Cyberattack a Use of Force or an Armed Attack?
Found in: Computer
By William H. Boothby,Wolff Heintschel von Heinegg,James Bret Michael,Michael N. Schmitt,Thomas C. Wingfield
Issue Date:August 2012
pp. 82-84
A cyberattack involving military or intelligence operations might not rise to the level of a “use of force” under international law.
 
Does Security Trump Reliability?
Found in: Computer
By James Bret Michael,Phillip A. Laplante,Jeffery Payne,Paul E. Black,Jeffrey M. Voas
Issue Date:November 2013
pp. 84-86
A conference panel discussed security and reliability and which of these concerns outweighs the other. Although the panel didn't conclude that one is definitively more important than the other, it did open the discussion for further consideration.
 
Empowering Users through Secure On-Demand Data Provisioning
Found in: Computer
By James Bret Michael
Issue Date:June 2013
pp. 84-85
A virtualized on-demand infrastructure coupled with multidimensional encryption lets users retain control over their stored data and securely access that data from anywhere.
 
Securing the ZigBee Protocol in the Smart Grid
Found in: Computer
By Anthony Patrick Melaragno,Damindra Bandara,Duminda Wijesekera,James Bret Michael
Issue Date:April 2012
pp. 92-94
The design-implement-fix process is sufficient for previously unknown attack vectors. However, engineers should use established knowledge, such as known attack patterns, in the analysis of security protocols prior to their acceptance and implementation.
 
Verification and Validation for Trustworthy Software Systems
Found in: IEEE Software
By James Bret Michael,Doron Drusinsky,Thomas W. Otani,Man-Tak Shing
Issue Date:November 2011
pp. 86-92
A continuous and proactive process for conducting verification and validation of systems involves using scenario-based testing to validate whether formal assertions correctly capture the intent of the natural language requirements. The process is automated...
 
Cloud Computing Support for Collaboration and Communication in Enterprise-Wide Workflow Processes
Found in: Services, IEEE Congress on
By Jason S. Bolin,James Bret Michael,Man-Tak Shing
Issue Date:July 2011
pp. 589-593
This paper discusses the use of social media and cloud computing technologies to facilitate the collaboration and communication in enterprise-wide workflow processes. It presents a use case analysis of the US Army Test and Evaluation Command (ATEC) test pr...
 
Removing the Boundaries: Steps Toward a Cloud Nirvana
Found in: Granular Computing, IEEE International Conference on
By Kevin D. Foster, John J. Shea, Doron Drusinsky, James Bret Michael, Thomas W. Otani, Man-Tak Shing
Issue Date:August 2010
pp. 167-171
In this paper, we present our vision for moving toward an ideal state of cloud computing—a cloud Nirvana. In a cloud Nirvana, boundaries, both physically and artificially created by various types of constraints, imposed on the users would be removed. We pr...
 
Cloud Computing for Large-Scale Weapon Systems
Found in: Granular Computing, IEEE International Conference on
By Kevin D. Foster, John J. Shea, James Bret Michael, Thomas W. Otani, Loren Peitso, Man-Tak Shing
Issue Date:August 2010
pp. 161-166
Large-scale weapon systems employ distributed computing, but these systems typically do not have a services orientation as found in systems architected to leverage cloud computing. In this paper we describe some of the issues that need to be addressed to e...
 
Cube-Type Algebraic Attacks on Wireless Encryption Protocols
Found in: Computer
By Nikolaos Petrakos, George W. Dinolt, James Bret Michael, Pantelimon Stanica
Issue Date:October 2009
pp. 103-105
Formally evaluating the strengths of a given cryptosystem will ensure that no flaws have crept into the application.
 
Vulnerability Analysis of HD Photo Image Viewer Applications
Found in: Secure System Integration and Reliability Improvement
By Clifford C. Juan, James Bret Michael, Christopher S. Eagle
Issue Date:July 2008
pp. 1-7
We investigated whether some of the image viewer applications that render HD Photo image files are susceptible to compromise by opening a malformed HD Photo image file. We customized and used an automated toolset to conduct both mutation- and generation-ba...
 
Validating UML Statechart-Based Assertions Libraries for Improved Reliability and Assurance
Found in: Secure System Integration and Reliability Improvement
By Doron Drusinsky, James Bret Michael, Thomas W. Otani, Man-Tak Shing
Issue Date:July 2008
pp. 47-51
In this paper we present a new approach for developing libraries of temporal formal specifications. Our approach is novel in its use of UML statechart-based assertions for formal specifications and its emphasis on validation testing, including an emphasis ...
 
Test Automation and Safety Assessment in Rapid Systems Prototyping
Found in: Rapid System Prototyping, IEEE International Workshop on
By Mikhail Auguston, James Bret Michael, Man-Tak Shing
Issue Date:June 2005
pp. 188-194
This paper addresses the need for automatic generation of executable environment models to facilitate the testing of real-time reactive Systems Under Development (SUD) in rapid system prototyping. We present an approach that allows users to model the envir...
 
An Agent-Based Framework for Assessing Missile Defense Doctrine and Policy
Found in: Policies for Distributed Systems and Networks, IEEE International Workshop on
By Duminda Wijesekera, James Bret Michael, Anil Nerode
Issue Date:June 2005
pp. 115-118
BMD-agents (BMDA) is a framework for specifying entities and their interaction patterns used in the command and control (C2) of ballistic missile defense (BMD) systems. In BMDA, doctrine is encoded as rules of individual agents and C2 policies are encoded ...
 
On the Response Policy of Software Decoys: Conducting Software-Based Deception in the Cyber Battlespace
Found in: Computer Software and Applications Conference, Annual International
By James Bret Michael
Issue Date:August 2002
pp. 957
Intelligent software decoys employ deception techniques to maintain the interaction between themselves and calling processes or threads that violate the contracts of the software components that the decoys defend. The software decoy?s goal is to learn abou...
 
Natural-Language Processing Support for Developing Policy-Governed Software Systems
Found in: Technology of Object-Oriented Languages, International Conference on
By James Bret Michael, Vanessa L. Ong, Neil C. Rowe
Issue Date:August 2001
pp. 0263
Abstract: Organizations are policy-driven entities. Policy bases can be very large and the relation-ships between policies can be complex. In addition, policy can change on a frequent basis. Checking for gaps in policy or analyzing the ramifications of cha...
 
Environment behavior models for scenario generation and testing automation
Found in: Proceedings of the 2005 workshop on Advances in model-based testing (A-MOST '05)
By James Bret Michael, Man-Tak Shing, Mikhail Auguston
Issue Date:May 2005
pp. 105-110
This paper suggests an approach to automatic scenario generation from environment models for testing of real-time reactive systems. The behavior of the system is defined as a set of events (event trace) with two basic relations: precedence and inclusion. T...
     
 1