scispace - formally typeset
Search or ask a question

Showing papers by "National Security Agency published in 1995"


Journal ArticleDOI
17 Sep 1995
TL;DR: It is shown that if only the sender can transmit, the number of bits required is a conditional entropy of a naturally defined graph.
Abstract: A sender communicates with a receiver who wishes to reliably evaluate a function of their combined data. We show that if only the sender can transmit, the number of bits required is a conditional entropy of a naturally defined graph. We also determine the number of bits needed when the communicators exchange two messages. Reference is made to the results of rate distortion in evaluating the function of two random variables.

455 citations


Proceedings ArticleDOI
23 Oct 1995
TL;DR: It is shown that if only the sender can transmit, the number of bits required is a conditional entropy of a naturally defined graph.
Abstract: A sender communicates with a receiver who wishes to reliably evaluate a function of their combined data. We show that if only the sender can transmit, the number of bits required is a conditional entropy of a naturally defined graph. We also determine the number of bits needed when the communicators exchange two messages.

280 citations


Proceedings ArticleDOI
08 May 1995
TL;DR: The approach separates the equivalence relation arguments from the non-interference properties, and as a by product, an upper bound on the number of iterations needed for termination of the procedure is provided.
Abstract: The paper gives necessary and sufficient conditions for a system to satisfy intransitive non-interference. Security is defined in terms of allowable flows of information among action domains as represented by an interferes relation /spl sim/>. We examine properties of special sets called basis elements generated from the relation /spl sim/> and introduce the notion of absorbing covers which is associated with the standard unwinding theorems for non-interference. Our approach separates the equivalence relation arguments from the non-interference properties, and as a by product, we develop a decision procedure for non-interference. An upper bound on the number of iterations needed for termination of the procedure is provided. >

70 citations


Journal ArticleDOI
TL;DR: Those Singer difference sets D(d, q) which admit a “Waterloo decomposition” D = A ∪ B such that (A − B) · (A + B)(−1) = k in Z G are characterized.

45 citations


Journal ArticleDOI
TL;DR: If C is a binary code with n odd and the words of weights n - 1 and n + 1 hold complementary t -designs, then it is shown that the vectors of weight n in a coset of weight 1 also hold a t-design.

35 citations


Journal ArticleDOI
30 Apr 1995
TL;DR: This paper looks at the basis of unreliability for name servers and proposes a scalable-cost solution for addressing the reliability problem.
Abstract: A Uniform Resource Name (URN) capability is being developed for the WWW. While this will provide important new capabilities for the WWW, the reliability of name servers in which a URN will be used is questionable. This paper looks at the basis of unreliability for name servers and proposes a scalable-cost solution for addressing the reliability problem.

12 citations


Proceedings ArticleDOI
19 Sep 1995
TL;DR: The WILDFIRE hardware and the accompanying software environment for application development and runtime operation are presented and suitable applications for WilDFIRE and future capabilities are discussed.
Abstract: WILDFIRE is a commercial reconfigurable computer architecture based on field programmable gatearray (FPGA) technology. Programmers achieve high processing performance by rapidly modifying theinternal hardware architecture through software to efficiently accommodate the specific processing needsof an application. The WILDFIRE hardware and the accompanying software environment forapplications development and runtime operation are presented. Suitable applications for WILDFIRE andfuture capabilities are also discussed.Keywords: computer architecture, FPGA, reconfigurable computing, VHDL 1.0 INTRODUCTION WILDFIRE represents a new vision in commercially available computing technology implemented usingfield programmable gate arrays1 (FPGAs) that allows programmers to configure the architecture of theprocessing elements to exhibit the computational features required by an application. WILDFIRE isbased on the Splash 22 technology transferred from the National Security Agency and the Institute forDefense Analyses, Supercomputing Research Center* (SRC). This technology has effectively solvedparallel processing and rapid prototyping problems on a variety of applications relating to imageprocessing, text searching, and sequence analysis.The discussion begins in Section 2 by describing the motivation for reconfigurable computing. Itcontinues in Section 3 with a history of the Splash 2 project that led to the development of WILDFIRE.Section 4 discusses the system architecture of WILDFIRE. This includes a description of the layout andthe interaction of the hardware and a description of both the applications development and runtime

6 citations


Journal ArticleDOI
01 Jul 1995
TL;DR: System engineers should become familiar with “technical” information system architecture alternatives, and advances in technology are leading to the merging of system, software, and hardware engineering disciplines at the architectural level.
Abstract: Government and industry are focusing on “information” system technology to provide dramatic changes that will be the critical factors in a comprehensive range of activities from achieving-competitive-advantage to winning-wars. System, software, and security engineering for information systems involve principles and practices that continue to evolve. This paper identifies, compares, and questions those principles and practices. It characterizes the information system development/integration paradigms as being in a state of flux. In addition, architectural concepts are discussed that provide a framework for information system services that support a variety of missions and functions. Three salient points of the paper are: (1) system engineers should become familiar with “technical” information system architecture alternatives, (2) advances in technology are leading to the merging of system, software, and hardware engineering disciplines at the architectural level, and (3) requirements-definition and design-resolution procedures are being revolutionized through incremental/continuous development paradigms.

1 citations


Journal ArticleDOI
TL;DR: A quasimultiple affine plane of order n and multiplicity? is a (v, k,?) = (n2, n,?) balanced incomplete block design.

1 citations


01 Jan 1995
TL;DR: The paper concludes with the presentation of issues that develop from looking at merging satellite service into a world of many different networks.
Abstract: This paper is an expansion of an earlier paper on Satellite/Terrestrial PCS which addressed issues for interoperability that included Networks, Services, Voice Coders and Mobility/Security. This paper focuses on the narrower topic of Network Reference Models and associated interfaces and protocols. The network reference models are addressed from the perspective of the User, the Cellular Carrier, the PSN Carrier, and the Radio Vendor. Each perspective is presented in the way these systems have evolved. The TIA TR46/GSM reference model will be reviewed. Variations in the use of this model that are prevalent in the industry will be discussed. These are the North American Cellular networks, the GSM networks, and the North American Carriers/Bellcore perspective. The paper concludes with the presentation of issues that develop from looking at merging satellite service into a world of many different networks.

1 citations


Proceedings ArticleDOI
06 Apr 1995
TL;DR: This panel discussion on remote GDSS sees great potential for the use of existing and proposed technology to provide an mlheu for conducting such decision makmg and a concern is the process used to conduct the decision making process.
Abstract: The philosophy and concept of the use of teams in organizations has expanded ascyberspace is now a reality (both practical and affordable). This expansion is expanding to decision making involving individuals at remote locations, not necessarily at the same locatlonhoom The potential of mcludmg multiple viewpoints, concerns, experiences and interests can provide a rich decision making environment. The panel sees great potential for the use of existing and proposed technology to provide an mlheu for conducting such decision makmg. However, a concern is the process used to conduct the decision making process INTRODUCTION The effect of a group in assisting in decision making is well known (Moore, 1987). Group decision support systems is a process that provides a rich and productive environment for decision making, knowledge engineering, and evaluation of altematwe issues (Jessup, 1993) This process is used extensively in a single site (same time-same place or different time-same place) scenario however there is a growing demand to provide the same milieu for remote participation (same timedifferent place and ddTerent time-different place). It is understandable as one of the strengths of GDSS is the lack of verbal communication, it is possible to provide remote participation. Authors have stressed that the process followed is more valuable than the number of decision reached (English, 1988) and this philosophy is the focus of this panel discussion on remote GDSS. REMOTE GDSS Some authors are beginning to address the issues revolved in remote GDSS (Aytes, 1994] The initial concern for a dividing point for discussions on remote GDSS is the timing of the activity: synchronous or asynchronous Each involves special needs that should be dealt within the process of a remote GDSS Topics for focus b Facilitation Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appear, and notice is given 02142emasie@rnasie.com Use of video Bandwidth Security Help and Suppofi need for AI engines Participation issues PANELIST’S FOCUS Dr. Corey Schou: “Help and Support use of video (video, BOB, BLOB) participation issues (Loss of attention, Interruptions, Vectors) V. Maconachy. the need and opportumtles for on-line security facilitation issues Masle: Communication reqturements for remote GDSS projections of new bandwidth requirements Frost: The group decision support process REFERENCES Aytes, K, Johnson, J., and Frost, J. Supporting Distributed GDSS, Presented at Worksho~ on CSCW infrastructure and Multimedia. Computer Supported Cooperative Work ’94, Chapel Hill, NC. Jessup, Leonard M, and Valacich, Joseph S., Group Sumort Swtems New Perspectives, Macmillan Publishing Company. Moore, Carl, Group ~, Sage Publications, Newbury Park, California, 1987. English, Linda, ‘The Tyranny of Teams”, Australian Accountant, Nov. 1988, pp 14-16 that copying is by permission of the Association of Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission. SIGCPR ’95, Nashville, TN, USA @ 1995 ACM 0-89791 -712-xJ9510004...$505o

Patent
24 Mar 1995
TL;DR: In this article, a laser-programmable clocked-logic integrated-circuit cell having a transmission gate, a first laser-cut area; a first two-input nand gate; a second 2-input Nand Gate; a third 2-and-1 gate; and a first inverter is described.
Abstract: A laser-programmable clocked-logic integrated-circuit cell having a transmission gate; a first laser-cut area; a first two-input nand gate; a second two-input nand gate; a third two-input nand gate; a first inverter; a first tri-state clocked-inverter; a second laser-cut area; a second inverter; a third inverter; a second tri-state clocked-inverter; a third laser-cut area; a fourth two-input nand gate; a fifth two-input nand gate; a sixth two-input nand gate; a fourth inverter; a third tri-state clocked-inverter; a fourth tri-state clocked-inverter; a first laser-link area; a second laser-link area; a fourth laser-cut area; a fifth laser-cut area; and a third laser-link area.

Proceedings ArticleDOI
22 Aug 1995
TL;DR: The separation kernel concept is revisited as a potential practical means of improving security protections consistent with preserving the use of legacy systems and of commercial products.
Abstract: Changes in computer usage have significantly changed the so-called computer security, network security and information security problems. The changes are largely due to the rapid proliferation and interconnection of computers and the associated distribution of software. Of concern is the uncontrolled nature of this activity: systems and workstations are often interconnected without notice being given to all of the affected parties. The result has been increased user perception of breaches in "security", especially in the form of computer takeover, data destruction, or service denial by virus, worm or trapdoor. It is expected that consciousness of these problems, and of confidentiality compromises, will increase in the coming months. It is posited that a principal cause of the problem is willful promiscuity and a pronounced lack of mutual suspicion. The separation kernel concept is revisited as a potential practical means of improving security protections consistent with preserving the use of legacy systems and of commercial products.