11.12.2012 Views

NASA Scientific and Technical Aerospace Reports

NASA Scientific and Technical Aerospace Reports

NASA Scientific and Technical Aerospace Reports

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

the information exchange at the interface between nodes, the transient behavior of protocols under failure, the placement of<br />

enforcement functionality at the edges or inside the network, <strong>and</strong> the detailed control over resource allocation inside of routers.<br />

We will deliver a suite of network protocols - for routing, transport, multicast, <strong>and</strong> real -time - which have enforceable<br />

behavior without trust.<br />

DTIC<br />

Protocol (Computers); Wide Area Networks<br />

20040111588 Air Force Inst. of Tech., Wright-Patterson AFB, OH<br />

Fault Tolerance in Networked Control Systems Through Real-Time Restarts<br />

Graham, Scott R.; Jul. 22, 2004; 22 pp.; In English<br />

Report No.(s): AD-A425652; AFIT-CI04-491; No Copyright; Avail: CASI; A03, Hardcopy<br />

Networked control consists of sensors <strong>and</strong> actuators that interact with the ‘real world’ environment (plant), which are<br />

connected to each other <strong>and</strong> to with controllers over digital networks. Such systems are long- running, have real-time<br />

requirements, <strong>and</strong> should function in a correct <strong>and</strong> timely manner even in the presence of failures <strong>and</strong> software upgrades.<br />

Arguably, the growth <strong>and</strong> the widespread use of the Internet, the largest operational distributed system today, has been enabled<br />

by its fault-tolerant properties such as robustness to router <strong>and</strong> link failures. As such systems take on an increasingly critical<br />

role, supporting local <strong>and</strong> national infrastructures, homes <strong>and</strong> industries, the importance of reliability <strong>and</strong> availability issues<br />

grows.<br />

DTIC<br />

Actuators; Fault Tolerance; Real Time Operation<br />

20040111614 Department of Defense, Fort Meade, MD<br />

Department of Defense Password Management Guideline<br />

Apr. 12, 1985; 38 pp.; In English<br />

Report No.(s): AD-A425705; CSC-STD-002-85; No Copyright; Avail: CASI; A03, Hardcopy<br />

The DoD Password Management Guideline provides a set of good practices directed toward preventing password<br />

compromise. Large numbers of ADP systems require identification <strong>and</strong> authentication of a system user. Of ten, the<br />

authentication mechanism implemented is a password--a ‘symbol’ that should be known only by its owner. Since a user’s<br />

identification is often a compaction of the individual’s name <strong>and</strong> thus easily guessed, the password must provide the requisite<br />

protection. Measures suggested for password protection include: a. Use of machine-generated pronounceable passwords<br />

(pass-phrases). b. Maximum length of time for password retention. c. Capability to change a password. d. Personal password<br />

protection (e.g., not written down).<br />

DTIC<br />

Computer Information Security; Defense Program<br />

20040112038 <strong>NASA</strong> Glenn Research Center, Clevel<strong>and</strong>, OH, USA<br />

Securing Sensitive Flight <strong>and</strong> Engine Simulation Data Using Smart Card Technology<br />

Blaser, Tammy M.; [2003]; 15 pp.; In English; 2003 Super Computing Conference, 17-20 Nov. 2003, Phoenix, AZ, USA<br />

Contract(s)/Grant(s): 302-15-20; No Copyright; Avail: CASI; A03, Hardcopy<br />

<strong>NASA</strong> Glenn Research Center has developed a smart card prototype capable of encrypting <strong>and</strong> decrypting disk files<br />

required to run a distributed aerospace propulsion simulation. Triple Data Encryption St<strong>and</strong>ard (3DES) encryption is used to<br />

secure the sensitive intellectual property on disk pre, during, <strong>and</strong> post simulation execution. The prototype operates as a secure<br />

system <strong>and</strong> maintains its authorized state by safely storing <strong>and</strong> permanently retaining the encryption keys only on the smart<br />

card. The prototype is capable of authenticating a single smart card user <strong>and</strong> includes pre simulation <strong>and</strong> post simulation tools<br />

for analysis <strong>and</strong> training purposes. The prototype’s design is highly generic <strong>and</strong> can be used to protect any sensitive disk files<br />

with growth capability to urn multiple simulations. The <strong>NASA</strong> computer engineer developed the prototype on an interoperable<br />

programming environment to enable porting to other Numerical Propulsion System Simulation (NPSS) capable operating<br />

system environments.<br />

Author<br />

Computerized Simulation; Flight Simulation; Prototypes; Coding; Simulation; Supercomputers<br />

20040121017 <strong>NASA</strong> Langley Research Center, Hampton, VA, USA<br />

Design <strong>and</strong> Analysis Tools for Concurrent Blackboard Systems<br />

McManus, John W.; [1991]; 9 pp.; In English; No Copyright; Avail: CASI; A02, Hardcopy<br />

249

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!