07.02.2013 Views

Issue 10 Volume 41 May 16, 2003

Issue 10 Volume 41 May 16, 2003

Issue 10 Volume 41 May 16, 2003

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The objective of this effort is to design, develop, document, demonstrate, evaluate, and deliver science-based methods for<br />

information assurance (IA) design and assessment. The ultimate goal of the proposed research is to improve the IA reliability<br />

and robustness of systems overall and their ability to withstand asymmetric attacks. This can be achieved by means of<br />

scientific methods and modeling techniques that assist in specifying requisite IA protection of a system, and in measuring the<br />

ability of a design or implementation of a system to meet that specification. The results of IARM research during its two phases<br />

demonstrate that a reliability approach to IA of systems shows a lot of promise, and can contribute to more rapid maturation<br />

of the field and increased reliability of systems against IA attacks. The current predominance of IA research into defense<br />

against specific attacks, and the lack of useful metrics collection are ignoring this promising direction for research and systems<br />

engineering. IARM researchers have observed that too little thought is being given to useful metrics to collect during system<br />

operation, and in the course of other IA research. For example, currently, it is common to measure the amount of time it takes<br />

a Red Team to attack a given system. However, metrics and observations related to the effect of various Red Team or hacker<br />

actions on a system would contribute significantly to the growth of IA reliability and the ability to integrate IA approaches<br />

within the system engineering process. The article reviews phase 1 of the project, which included mathematical modeling<br />

using continuous time Markov chains and computing state transition diagram transition probabilities and transition rates, and<br />

phase 2 of the project, which included real time reliability monitoring, top level architecture, and human behavioral modeling<br />

of attackers and security system administrators using variations of game theory. (13 refs.)<br />

DTIC<br />

Mathematical Models; Systems Engineering; Reliability Analysis; Information Systems<br />

<strong>2003</strong>0037015 Pacific Northwest National Lab., Richland, WA<br />

PNNL Information Technology Benchmarking<br />

Hostetler, D. D.; Goolsbey, J. E.; Niesen, D. A.; Phillips, A. C.; Aug. 1999; 14 pp.<br />

Report No.(s): DE2002-15001473; No Copyright; Avail: Department of Energy Information Bridge<br />

Benchmarking is a methodology for searching out industry best practices that lead to superior performance. It is<br />

exchanging information, not just with any organization, but with organizations known to be the best within PNNL, in industry,<br />

or in dissimilar industries with equivalent functions. It is used as a continuous improvement tool for business and technical<br />

processes, products, and services. Information technology comprising all computer and electronic communication products<br />

and services underpins the development and/or delivery of many PNNL products and services. The purpose is to engage other<br />

organizations in the collaborative process of benchmarking in order to improve the value of IT services provided to customers.<br />

TM documents intended audience consists of other U. S. Department of Energy (DOE) national laboratories and their IT staff.<br />

Although the individual participants must define the scope of collaborative benchmarking, an outline of IT service areas for<br />

possible benchmarking is described.<br />

NTIS<br />

Laboratories; Information Dissemination; Information Systems<br />

84<br />

LAW, POLITICAL SCIENCE AND SPACE POLICY<br />

Includes aviation law; space law and policy; international law; international cooperation; and patent policy.<br />

<strong>2003</strong>0036983 Bureau of International Labor Affairs, Washington, DC<br />

Advancing the Campaign Against Child Labor. <strong>Volume</strong> 2: Addressing the Worst Forms of Child Labor<br />

2002; 54 pp.; In English<br />

Report No.(s): PB<strong>2003</strong>-<strong>10</strong>2671; No Copyright; Avail: CASI; A04, Hardcopy<br />

This report examines some action strategies related to efforts to eliminate the worst forms of child labor, some issues in<br />

developing these strategies, and some examples of how strategies have been implemented in actual projects. The report<br />

suggests that there is no one strategy or mix of strategies that can be isolated as appropriate or most cost-effective for<br />

addressing all cases of the worst forms of child labor. Actions taken need to be designed according to the context in which<br />

child labor is found.<br />

NTIS<br />

Cost Effectiveness; Labor; Children<br />

222

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!