scispace - formally typeset
Search or ask a question
Institution

Mitre Corporation

CompanyBedford, Massachusetts, United States
About: Mitre Corporation is a company organization based out in Bedford, Massachusetts, United States. It is known for research contribution in the topics: Air traffic control & National Airspace System. The organization has 4884 authors who have published 6053 publications receiving 124808 citations. The organization is also known as: Mitre & MITRE.


Papers
More filters
Journal ArticleDOI
TL;DR: The technique used to carry out the first step of the proof of the correctness of a security kernel on a PDP-11/45 is described: validating a formal specification of the program with respect to axioms for a secure system.
Abstract: A security kernel is a software and hardware mechanism that enforces access controls within a computer system. The correctness of a security kernel on a PDP-11/45 is being proved. This paper describes the technique used to carry out the first step of the proof: validating a formal specification of the program with respect to axioms for a secure system.

104 citations

Journal ArticleDOI
TL;DR: The terrestrial and oceanic sources of moisture that supply warm-season rainfall to the Mississippi River basin and its subbasins are examined over a 36-yr period (1963-98) using hourly observed precipitation, National Centers for Environmental Prediction (NCEP) reanalyses at 6-h intervals, and a back-trajectory algorithm.
Abstract: The terrestrial and oceanic sources of moisture that supply warm-season rainfall to the Mississippi River basin and its subbasins are examined over a 36-yr period (1963–98). Using hourly observed precipitation, National Centers for Environmental Prediction (NCEP) reanalyses at 6-h intervals, and a back-trajectory algorithm, the water falling during observed precipitation events is probabilistically traced to its most recent surface evaporative source, terrestrial or oceanic. Maps of these sources generally show dual maxima, one terrestrial and one oceanic, in spring and a dominance of terrestrial sources in summer. Pentad time series averaged over the 36 years show a late-summer maximum of precipitation recycling in all but the Missouri subbasin. During the 36 years analyzed, 32% of warm-season precipitation in the entire Mississippi basin originated as evaporation within the basin (recycled). About 20% of warm-season precipitation was contributed directly by evaporation from the Gulf of Mexico a...

104 citations

Journal ArticleDOI
TL;DR: This paper proposes a belief-based semantics for secure databases, which provides a semantics for databases that can “lie” about the state of the world, or about their knowledge about theState of the World, in order to preserve security.
Abstract: The addition of stringent security specifications to the list of requirements for an application poses many new problems in DBMS design and implementation, as well as database design, use, and maintenance. Tight security requirements, such as those that result in silent masking of witholding of true information from a user or the introduction of false information into query answers, also raise fundamental questions about the meaning of the database and the semantics of accompanying query languages. In this paper, we propose a belief-based semantics for secure databases, which provides a semantics for databases that can “lie” about the state of the world, or about their knowledge about the state of the world, in order to preserve security. This kind of semantics can be used as a helpful retrofit for the proposals for a “multilevel secure” database model (a particularly stringent form of security), and may be useful for less restrictive security policies as well. We also propose a family of query languages for multilevel secure relational database applications, and base the semantics of those languages on our semantics for secure databases. Our query languages are free of the semantic problems associated with use of ordinary SQL in a multilevel secure context, and should be easy for users to understand and employ.

104 citations

Book ChapterDOI
24 Mar 2007
TL;DR: A method for enumerating all essentially different executions possible for a cryptographic protocol, called the shapes of the protocol, and cpsa, the Cryptographic Protocol Shape Analyzer, implements the method.
Abstract: We describe a method for enumerating all essentially different executions possible for a cryptographic protocol. We call them the shapes of the protocol. Naturally occurring protocols have only finitely many, indeed very few shapes. Authentication and secrecy properties are easy to determine from them, as are attacks. cpsa, our Cryptographic Protocol Shape Analyzer, implements the method. In searching for shapes, cpsa starts with some initial behavior, and discovers what shapes are compatible with it. Normally, the initial behavior is the point of view of one participant. The analysis reveals what the other principals must have done, given this participant's view.

103 citations

Journal ArticleDOI
TL;DR: The program history is traced starting with the Army's Stand Off Target Acquisition System as it evolved through the Small Aerostat Surveillance System and the Assault Breaker/Pave Mover programs into the currently fielded Joint Surveillance and Target Attack System [JointSTARS], which more than proved its worth in the 1991 Gulf War.
Abstract: The concept of airborne surveillance of enemy ground forces with a Ground Moving Target Indicator [now called GMTI] radar capable of detecting moving ground vehicles and helicopters was proposed in 1968 and resulted in a DoD program to realize its potential. This article traces the program history starting with the Army's Stand Off Target Acquisition System [SOTAS] as it evolved through the Small Aerostat Surveillance System [SASS] and the Assault Breaker/Pave Mover programs into the currently fielded Joint Surveillance and Target Attack System [JointSTARS], which, in prototype form, more than proved its worth in the 1991 Gulf War. New developments and trends in GMTI radars are also discussed together with other potential platforms.

103 citations


Authors

Showing all 4896 results

NameH-indexPapersCitations
Sushil Jajodia10166435556
Myles R. Allen8229532668
Barbara Liskov7620425026
Alfred D. Steinberg7429520974
Peter T. Cummings6952118942
Vincent H. Crespi6328720347
Michael J. Pazzani6218328036
David Goldhaber-Gordon5819215709
Yeshaiahu Fainman5764814661
Jonathan Anderson5719510349
Limsoon Wong5536713524
Chris Clifton5416011501
Paul Ward5240812400
Richard M. Fujimoto5229013584
Bhavani Thuraisingham5256310562
Network Information
Related Institutions (5)
IBM
253.9K papers, 7.4M citations

83% related

Hewlett-Packard
59.8K papers, 1.4M citations

83% related

Carnegie Mellon University
104.3K papers, 5.9M citations

83% related

George Mason University
39.9K papers, 1.3M citations

83% related

Georgia Institute of Technology
119K papers, 4.6M citations

82% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20234
202210
202195
2020139
2019145
2018132