According to "Assemble line balancing (ALB)" problem which is widespread in manufacture, we establish a mathematical model and present our improved algorithm that is based on Heuristic rules, which adopt cum...
详细信息
Zero-Knowledge proof is a very basic and important primitive, which allows a prover to prove some statement without revealing anything else. Very recently, Jain et al. proposed very efficient zero-knowledge proofs to ...
详细信息
We propose a new encryption primitive called Membership Encryption. Let P(G) be a privacy-preserving token on a group attribute/identity G, such that given P(G) it is hard to know the attributes in G. In this membersh...
详细信息
The effectiveness of a system refers to the accuracy and completeness with which users achieve specified goals. These two aspects are interpreted as errors and completion in the context of usability testing. However, ...
详细信息
An RFID tag could change hands many times during its lifetime. In a retail chain, the ownership of the tag is instituted by the supplier who initially owns the tag. In the view of a buyer, the validity of the current ...
详细信息
Reviewing software system architecture to pinpoint potential security flaws before proceeding with system development is a critical milestone in secure software development lifecycles. This includes identifying possib...
详细信息
ISBN:
(纸本)9781467330763
Reviewing software system architecture to pinpoint potential security flaws before proceeding with system development is a critical milestone in secure software development lifecycles. This includes identifying possible attacks or threat scenarios that target the system and may result in breaching of system security. Additionally we may also assess the strength of the system and its security architecture using well-known security metrics such as system attack surface, Compartmentalization, least-privilege, etc. However, existing efforts are limited to specific, predefined security properties or scenarios that are checked either manually or using limited toolsets. We introduce a new approach to support architecture security analysis using security scenarios and metrics. Our approach is based on formalizing attack scenarios and security metrics signature specification using the Object Constraint Language (OCL). Using formal signatures we analyse a target system to locate signature matches (for attack scenarios), or to take measurements (for security metrics). New scenarios and metrics can be incorporated and calculated provided that a formal signature can be specified. Our approach supports defining security metrics and scenarios at architecture, design, and code levels. We have developed a prototype software system architecture security analysis tool. To the best of our knowledge this is the first extensible architecture security risk analysis tool that supports both metric-based and scenario-based architecture security analysis. We have validated our approach by using it to capture and evaluate signatures from the NIST security principals and attack scenarios defined in the CAPEC database.
In system of systems engineering, stakeholders are individuals, groups or organizations that stand to gain or lose from the success or failure of a system of systems. Systems of systems pose unique problems for stakeh...
详细信息
ISBN:
(纸本)9781467355964
In system of systems engineering, stakeholders are individuals, groups or organizations that stand to gain or lose from the success or failure of a system of systems. Systems of systems pose unique problems for stakeholder analysis due to their evolutionary nature, emergent behavior, operational independence, managerial independence, and geographical distribution of their constituent systems. This paper proposes the use of social networks and crowdsourcing to identify and prioritize the stakeholders for system of systems projects. The proposed method crowdsources the stakeholders to recommend other stakeholders, builds a social network of stakeholders, and prioritizes stakeholders using social network measures. The paper describes the method, and discusses the strengths and limitations of applying the method in system of systems projects.
This paper describes a swarm control algorithm based on distributed pheromone maps to effectively track a moving fire front. The algorithm uses a single heuristic to maintain persistent surveillance to detect new fire...
详细信息
ISBN:
(纸本)9781479904532
This paper describes a swarm control algorithm based on distributed pheromone maps to effectively track a moving fire front. The algorithm uses a single heuristic to maintain persistent surveillance to detect new fires, while concurrently allowing for tracking of known fires. Control of the swarm is fully distributed and self-contained; requiring no external communication infrastructure and being resilient to individual hardware failures.
This article examines a new lightweight, slim, high energy efficient, light-transmitting, self-supporting envelope system, providing for seamless, free-form designs for use in architectural projects. The system exploi...
详细信息
It is common in organizational contexts and in law to apply a decision-scope approach to decision making. Higher organization levels set a decision scope within which lower organization levels may operate. In case of ...
详细信息
暂无评论