Issue 10 Volume 41 May 16, 2003
Issue 10 Volume 41 May 16, 2003
Issue 10 Volume 41 May 16, 2003
- TAGS
- volume
- 202.118.250.135
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
The objective of this effort is to design, develop, document, demonstrate, evaluate, and deliver science-based methods for<br />
information assurance (IA) design and assessment. The ultimate goal of the proposed research is to improve the IA reliability<br />
and robustness of systems overall and their ability to withstand asymmetric attacks. This can be achieved by means of<br />
scientific methods and modeling techniques that assist in specifying requisite IA protection of a system, and in measuring the<br />
ability of a design or implementation of a system to meet that specification. The results of IARM research during its two phases<br />
demonstrate that a reliability approach to IA of systems shows a lot of promise, and can contribute to more rapid maturation<br />
of the field and increased reliability of systems against IA attacks. The current predominance of IA research into defense<br />
against specific attacks, and the lack of useful metrics collection are ignoring this promising direction for research and systems<br />
engineering. IARM researchers have observed that too little thought is being given to useful metrics to collect during system<br />
operation, and in the course of other IA research. For example, currently, it is common to measure the amount of time it takes<br />
a Red Team to attack a given system. However, metrics and observations related to the effect of various Red Team or hacker<br />
actions on a system would contribute significantly to the growth of IA reliability and the ability to integrate IA approaches<br />
within the system engineering process. The article reviews phase 1 of the project, which included mathematical modeling<br />
using continuous time Markov chains and computing state transition diagram transition probabilities and transition rates, and<br />
phase 2 of the project, which included real time reliability monitoring, top level architecture, and human behavioral modeling<br />
of attackers and security system administrators using variations of game theory. (13 refs.)<br />
DTIC<br />
Mathematical Models; Systems Engineering; Reliability Analysis; Information Systems<br />
<strong>2003</strong>0037015 Pacific Northwest National Lab., Richland, WA<br />
PNNL Information Technology Benchmarking<br />
Hostetler, D. D.; Goolsbey, J. E.; Niesen, D. A.; Phillips, A. C.; Aug. 1999; 14 pp.<br />
Report No.(s): DE2002-15001473; No Copyright; Avail: Department of Energy Information Bridge<br />
Benchmarking is a methodology for searching out industry best practices that lead to superior performance. It is<br />
exchanging information, not just with any organization, but with organizations known to be the best within PNNL, in industry,<br />
or in dissimilar industries with equivalent functions. It is used as a continuous improvement tool for business and technical<br />
processes, products, and services. Information technology comprising all computer and electronic communication products<br />
and services underpins the development and/or delivery of many PNNL products and services. The purpose is to engage other<br />
organizations in the collaborative process of benchmarking in order to improve the value of IT services provided to customers.<br />
TM documents intended audience consists of other U. S. Department of Energy (DOE) national laboratories and their IT staff.<br />
Although the individual participants must define the scope of collaborative benchmarking, an outline of IT service areas for<br />
possible benchmarking is described.<br />
NTIS<br />
Laboratories; Information Dissemination; Information Systems<br />
84<br />
LAW, POLITICAL SCIENCE AND SPACE POLICY<br />
Includes aviation law; space law and policy; international law; international cooperation; and patent policy.<br />
<strong>2003</strong>0036983 Bureau of International Labor Affairs, Washington, DC<br />
Advancing the Campaign Against Child Labor. <strong>Volume</strong> 2: Addressing the Worst Forms of Child Labor<br />
2002; 54 pp.; In English<br />
Report No.(s): PB<strong>2003</strong>-<strong>10</strong>2671; No Copyright; Avail: CASI; A04, Hardcopy<br />
This report examines some action strategies related to efforts to eliminate the worst forms of child labor, some issues in<br />
developing these strategies, and some examples of how strategies have been implemented in actual projects. The report<br />
suggests that there is no one strategy or mix of strategies that can be isolated as appropriate or most cost-effective for<br />
addressing all cases of the worst forms of child labor. Actions taken need to be designed according to the context in which<br />
child labor is found.<br />
NTIS<br />
Cost Effectiveness; Labor; Children<br />
222