scispace - formally typeset
Search or ask a question
Institution

Mitre Corporation

CompanyBedford, Massachusetts, United States
About: Mitre Corporation is a company organization based out in Bedford, Massachusetts, United States. It is known for research contribution in the topics: Air traffic control & National Airspace System. The organization has 4884 authors who have published 6053 publications receiving 124808 citations. The organization is also known as: Mitre & MITRE.


Papers
More filters
01 Jan 2003
TL;DR: In the 1980s, most of the rigorous work in information security was focused on operating systems, but the 1990s saw a strong trend toward network and distributed system security, and a less stringent model of security, not focused on covert channels, is now relevant.
Abstract: In the 1980s, most of the rigorous work in information security was focused on operating systems, but the 1990s saw a strong trend toward network and distributed system security. The difficulty of having an impact in securing operating systems was part of the motivation for this trend. There were two major obstacles. First, the only operating systems with significant deployment were large proprietary systems. Superimposing a security model and gaining assurance that the implementation enforced the model seemed intractable [6]. Second, the prime security model [2] was oriented toward preventing disclosure in multi-level secure systems [1], and this required ensuring that even Trojan horse software exploiting covert channels in the system’s implementation could compromise information only at a negligible rate. This was ultimately found to be unachievable [10]. These obstacles seem more tractable now. Open-source secure operating systems are now available, which are compatible with existing applications software, and hence attractive for organizations wanting more secure platforms for publicly accessible servers. Security Enhanced Linux (SELinux) in particular offers well thought out security services [4, 5]. Moreover, a less stringent model of security, not focused on covert channels, is now relevant. Commonly, a network server must service unauthenticated clients (as in retail electronic commerce), or must provide its own authentication and access control for its clients (as in a database server). Sensitive resources must reside on the same server so that transactions can complete. The programs manipulating the resources directly must be trustworthy; direct manipulation by Trojan horses is not our concern. The core goals are protecting the confidentiality and integrity of these resources. To preserve integrity, each causal chain of interactions leading from untrusted sources to sensitive destinations must traverse a program considered trusted to filter transactions. Dually, to preserve confidentiality, causal chains leading from sensitive sources to untrusted destinations must traverse a program trusted to filter outbound data. The trustworthy program determines what data can be released to the untrusted destination. In both cases, the security goal is an information flow goal. Each says that information flowing between particular

39 citations

Journal ArticleDOI
TL;DR: This paper describes two steps in the evolution of human‐robot interaction designs developed by the University of Massachusetts Lowell (UML) and the Idaho National Laboratory to support urban search and rescue tasks and suggests that performance is better with the new interaction techniques.
Abstract: This paper describes two steps in the evolution of human-robot interaction designs developed by the University of Massachusetts Lowell (UML) and the Idaho National Laboratory to support urban search and rescue tasks. Usability tests were conducted to compare the two interfaces, one of which emphasized three-dimensional mapping while the other design emphasized the video feed. We found that participants desired a combination of the interface design approaches. As a result, the UML system was changed to augment its heavy emphasis on video with a map view of the area immediately around the robot. The changes were tested in a follow-up user study and the results from that experiment suggest that performance, as measured by the number of collisions with objects in the environment and time on task, is better with the new interaction techniques. Throughout the paper, we describe how we applied human-computer interaction principles and techniques to benefit the evolution of the human-robot interaction designs. While the design work is situated in the urban search and rescue domain, the results can be generalized to domains that involve other search or monitoring tasks using remotely located robots. © 2007 Wiley Periodicals, Inc.

39 citations

Book
08 Oct 2012
TL;DR: Engineering Risk Management Introduction Objectives and Practices New Challenges New Challenges Perspectives on Theories of Systems and Risk
Abstract: Engineering Risk Management Introduction Objectives and Practices New Challenges Perspectives on Theories of Systems and Risk Introduction General Systems Theory Risk and Decision Theory Engineering Risk Management Foundations of Risk and Decision Theory Introduction Elements of Probability Theory The Value Function Risk and Utility Functions Multiattribute Utility-The Power Additive Utility Function Applications to Engineering Risk Management A Concluding Thought A Risk Analysis Framework in Engineering Enterprise Systems Introduction Perspectives on Engineering Enterprise Systems A Framework for Measuring Enterprise Capability Risk A Risk Analysis Algebra Information Needs for Portfolio Risk Analysis The "Cutting Edge" An Index to Measure Risk Co-Relationships Introduction RCR Postulates, Definitions, and Theory Computing the RCR Index Applying the RCR Index: A Resource Allocation Example Summary Functional Dependency Network Analysis Introduction FDNA Fundamentals Weakest Link Formulations FDNA (alpha, ss) Weakest Link Rule Network Operability and Tolerance Analyses Special Topics Summary A Decision-Theoretic Algorithm for Ranking Risk Criticality Introduction A Prioritization Algorithm A Model for Measuring Risk in Engineering Enterprise Systems A Unifying Risk Analytic Framework and Process Summary Random Processes and Queuing Theory Introduction Deterministic Process Random Process Markov Process Queuing Theory Basic Queuing Models Applications to Engineering Systems Summary Extreme Event Theory Introduction to Extreme and Rare Events Extreme and Rare Events and Engineering Systems Traditional Data Analysis Extreme Value Analysis Extreme Event Probability Distributions Limit Distributions Determining Domain of Attraction Using Inverse Function Determining Domain of Attraction Using Graphical Method Complex Systems and Extreme and Rare Events Summary Prioritization Systems in Highly Networked Environments Introduction Priority Systems Types of Priority Systems Summary Risks of Extreme Events in Complex Queuing Systems Introduction Risk of Extreme Latency Conditions for Unbounded Latency Conditions for Bounded Latency Derived Performance Measures Optimization of PS Summary Appendix: Bernoulli Utility and the St. Petersburg Paradox References Index Questions and Exercises appear at the end of each chapter.

39 citations

Proceedings ArticleDOI
07 Apr 2008
TL;DR: Several research questions are addressed in this thought piece on the need for research in the engineering of complex systems.
Abstract: Several research questions are addressed in this thought piece on the need for research in the engineering of complex systems. What are the classes of problems for which complexity science and the engineering of complex systems represents the best solution? What are the classes of problems for which this is not the case? What elements of complexity science (and the associated mathematics) can be applied to the engineering of complex systems? What elements of the science are missing and need to be developed? How do we use the science to develop engineering tools and deliver effective and efficient solutions for our clients?

39 citations

Journal ArticleDOI
17 Oct 2017-JAMA
TL;DR: Research is beginning to show that providing patients with their complete health data may help improve their health, and patients who are more informed may better adhere to treatment plans and hence may improve clinician performance.
Abstract: Digital health data are rapidly expanding to include patient-reported outcomes, patient-generated health data, and social determinants of health. Measurements collected in clinical settings are being supplemented by data collected in daily life, such as data derived from wearable sensors and smartphone apps, and access to other data, such as genomic data, is rapidly increasing. One projection suggests that a billion individuals will have their whole genome sequenced in the next several years.1 These additional sources of data, whether patientgenerated, genomic, or other, are critical for a comprehensive picture of an individual’s health. Enabling access to personal health data, clinical or patient-generated, may benefit patients and health care professionals. Research is beginning to show that providing patients with their complete health data may help improve their health. For example, timely access to laboratory results can increase patient engagement.2 Access to physician notes after appointments appears to encourage individuals to improve their health and participate in decision-making, with electronically engaged patients demonstrating more successful medication adherence, quality outcomes, and symptom management.3 Economic benefits may include the avoidance of duplicative imaging or laboratory tests.4 Clinicians may also benefit from more informed patients. For example, they may score higher in quality performance programs because patients who are more informed may better adhere to treatment plans and hence may improve clinician

39 citations


Authors

Showing all 4896 results

NameH-indexPapersCitations
Sushil Jajodia10166435556
Myles R. Allen8229532668
Barbara Liskov7620425026
Alfred D. Steinberg7429520974
Peter T. Cummings6952118942
Vincent H. Crespi6328720347
Michael J. Pazzani6218328036
David Goldhaber-Gordon5819215709
Yeshaiahu Fainman5764814661
Jonathan Anderson5719510349
Limsoon Wong5536713524
Chris Clifton5416011501
Paul Ward5240812400
Richard M. Fujimoto5229013584
Bhavani Thuraisingham5256310562
Network Information
Related Institutions (5)
IBM
253.9K papers, 7.4M citations

83% related

Hewlett-Packard
59.8K papers, 1.4M citations

83% related

Carnegie Mellon University
104.3K papers, 5.9M citations

83% related

George Mason University
39.9K papers, 1.3M citations

83% related

Georgia Institute of Technology
119K papers, 4.6M citations

82% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20234
202210
202195
2020139
2019145
2018132