Institution
Mitre Corporation
Company•Bedford, Massachusetts, United States•
About: Mitre Corporation is a company organization based out in Bedford, Massachusetts, United States. It is known for research contribution in the topics: Air traffic control & National Airspace System. The organization has 4884 authors who have published 6053 publications receiving 124808 citations. The organization is also known as: Mitre & MITRE.
Papers published on a yearly basis
Papers
More filters
01 Jan 2003
TL;DR: In the 1980s, most of the rigorous work in information security was focused on operating systems, but the 1990s saw a strong trend toward network and distributed system security, and a less stringent model of security, not focused on covert channels, is now relevant.
Abstract: In the 1980s, most of the rigorous work in information security was focused on operating systems, but the 1990s saw a strong trend toward network and distributed system security. The difficulty of having an impact in securing operating systems was part of the motivation for this trend. There were two major obstacles. First, the only operating systems with significant deployment were large proprietary systems. Superimposing a security model and gaining assurance that the implementation enforced the model seemed intractable [6]. Second, the prime security model [2] was oriented toward preventing disclosure in multi-level secure systems [1], and this required ensuring that even Trojan horse software exploiting covert channels in the system’s implementation could compromise information only at a negligible rate. This was ultimately found to be unachievable [10]. These obstacles seem more tractable now. Open-source secure operating systems are now available, which are compatible with existing applications software, and hence attractive for organizations wanting more secure platforms for publicly accessible servers. Security Enhanced Linux (SELinux) in particular offers well thought out security services [4, 5]. Moreover, a less stringent model of security, not focused on covert channels, is now relevant. Commonly, a network server must service unauthenticated clients (as in retail electronic commerce), or must provide its own authentication and access control for its clients (as in a database server). Sensitive resources must reside on the same server so that transactions can complete. The programs manipulating the resources directly must be trustworthy; direct manipulation by Trojan horses is not our concern. The core goals are protecting the confidentiality and integrity of these resources. To preserve integrity, each causal chain of interactions leading from untrusted sources to sensitive destinations must traverse a program considered trusted to filter transactions. Dually, to preserve confidentiality, causal chains leading from sensitive sources to untrusted destinations must traverse a program trusted to filter outbound data. The trustworthy program determines what data can be released to the untrusted destination. In both cases, the security goal is an information flow goal. Each says that information flowing between particular
39 citations
••
TL;DR: This paper describes two steps in the evolution of human‐robot interaction designs developed by the University of Massachusetts Lowell (UML) and the Idaho National Laboratory to support urban search and rescue tasks and suggests that performance is better with the new interaction techniques.
Abstract: This paper describes two steps in the evolution of human-robot interaction designs developed by the University of Massachusetts Lowell (UML) and the Idaho National Laboratory to support urban search and rescue tasks. Usability tests were conducted to compare the two interfaces, one of which emphasized three-dimensional mapping while the other design emphasized the video feed. We found that participants desired a combination of the interface design approaches. As a result, the UML system was changed to augment its heavy emphasis on video with a map view of the area immediately around the robot. The changes were tested in a follow-up user study and the results from that experiment suggest that performance, as measured by the number of collisions with objects in the environment and time on task, is better with the new interaction techniques. Throughout the paper, we describe how we applied human-computer interaction principles and techniques to benefit the evolution of the human-robot interaction designs. While the design work is situated in the urban search and rescue domain, the results can be generalized to domains that involve other search or monitoring tasks using remotely located robots. © 2007 Wiley Periodicals, Inc.
39 citations
•
08 Oct 2012TL;DR: Engineering Risk Management Introduction Objectives and Practices New Challenges New Challenges Perspectives on Theories of Systems and Risk
Abstract: Engineering Risk Management Introduction Objectives and Practices New Challenges Perspectives on Theories of Systems and Risk Introduction General Systems Theory Risk and Decision Theory Engineering Risk Management Foundations of Risk and Decision Theory Introduction Elements of Probability Theory The Value Function Risk and Utility Functions Multiattribute Utility-The Power Additive Utility Function Applications to Engineering Risk Management A Concluding Thought A Risk Analysis Framework in Engineering Enterprise Systems Introduction Perspectives on Engineering Enterprise Systems A Framework for Measuring Enterprise Capability Risk A Risk Analysis Algebra Information Needs for Portfolio Risk Analysis The "Cutting Edge" An Index to Measure Risk Co-Relationships Introduction RCR Postulates, Definitions, and Theory Computing the RCR Index Applying the RCR Index: A Resource Allocation Example Summary Functional Dependency Network Analysis Introduction FDNA Fundamentals Weakest Link Formulations FDNA (alpha, ss) Weakest Link Rule Network Operability and Tolerance Analyses Special Topics Summary A Decision-Theoretic Algorithm for Ranking Risk Criticality Introduction A Prioritization Algorithm A Model for Measuring Risk in Engineering Enterprise Systems A Unifying Risk Analytic Framework and Process Summary Random Processes and Queuing Theory Introduction Deterministic Process Random Process Markov Process Queuing Theory Basic Queuing Models Applications to Engineering Systems Summary Extreme Event Theory Introduction to Extreme and Rare Events Extreme and Rare Events and Engineering Systems Traditional Data Analysis Extreme Value Analysis Extreme Event Probability Distributions Limit Distributions Determining Domain of Attraction Using Inverse Function Determining Domain of Attraction Using Graphical Method Complex Systems and Extreme and Rare Events Summary Prioritization Systems in Highly Networked Environments Introduction Priority Systems Types of Priority Systems Summary Risks of Extreme Events in Complex Queuing Systems Introduction Risk of Extreme Latency Conditions for Unbounded Latency Conditions for Bounded Latency Derived Performance Measures Optimization of PS Summary Appendix: Bernoulli Utility and the St. Petersburg Paradox References Index Questions and Exercises appear at the end of each chapter.
39 citations
••
07 Apr 2008TL;DR: Several research questions are addressed in this thought piece on the need for research in the engineering of complex systems.
Abstract: Several research questions are addressed in this thought piece on the need for research in the engineering of complex systems. What are the classes of problems for which complexity science and the engineering of complex systems represents the best solution? What are the classes of problems for which this is not the case? What elements of complexity science (and the associated mathematics) can be applied to the engineering of complex systems? What elements of the science are missing and need to be developed? How do we use the science to develop engineering tools and deliver effective and efficient solutions for our clients?
39 citations
••
TL;DR: Research is beginning to show that providing patients with their complete health data may help improve their health, and patients who are more informed may better adhere to treatment plans and hence may improve clinician performance.
Abstract: Digital health data are rapidly expanding to include patient-reported outcomes, patient-generated health data, and social determinants of health. Measurements collected in clinical settings are being supplemented by data collected in daily life, such as data derived from wearable sensors and smartphone apps, and access to other data, such as genomic data, is rapidly increasing. One projection suggests that a billion individuals will have their whole genome sequenced in the next several years.1 These additional sources of data, whether patientgenerated, genomic, or other, are critical for a comprehensive picture of an individual’s health. Enabling access to personal health data, clinical or patient-generated, may benefit patients and health care professionals. Research is beginning to show that providing patients with their complete health data may help improve their health. For example, timely access to laboratory results can increase patient engagement.2 Access to physician notes after appointments appears to encourage individuals to improve their health and participate in decision-making, with electronically engaged patients demonstrating more successful medication adherence, quality outcomes, and symptom management.3 Economic benefits may include the avoidance of duplicative imaging or laboratory tests.4 Clinicians may also benefit from more informed patients. For example, they may score higher in quality performance programs because patients who are more informed may better adhere to treatment plans and hence may improve clinician
39 citations
Authors
Showing all 4896 results
Name | H-index | Papers | Citations |
---|---|---|---|
Sushil Jajodia | 101 | 664 | 35556 |
Myles R. Allen | 82 | 295 | 32668 |
Barbara Liskov | 76 | 204 | 25026 |
Alfred D. Steinberg | 74 | 295 | 20974 |
Peter T. Cummings | 69 | 521 | 18942 |
Vincent H. Crespi | 63 | 287 | 20347 |
Michael J. Pazzani | 62 | 183 | 28036 |
David Goldhaber-Gordon | 58 | 192 | 15709 |
Yeshaiahu Fainman | 57 | 648 | 14661 |
Jonathan Anderson | 57 | 195 | 10349 |
Limsoon Wong | 55 | 367 | 13524 |
Chris Clifton | 54 | 160 | 11501 |
Paul Ward | 52 | 408 | 12400 |
Richard M. Fujimoto | 52 | 290 | 13584 |
Bhavani Thuraisingham | 52 | 563 | 10562 |