2011 IEEE International Systems Conference最新文献

筛选
英文 中文
Group identity in social and cultural systems 社会和文化系统中的群体认同
2011 IEEE International Systems Conference Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929102
Brian Moriarty
{"title":"Group identity in social and cultural systems","authors":"Brian Moriarty","doi":"10.1109/SYSCON.2011.5929102","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929102","url":null,"abstract":"The research in this paper analyzes the common characteristics shared between social organizations of varied type and how personal and group identity within these groups is derived from the identification with common contextual artifacts. This analysis is performed through survey questions concerning markers of cultural identity posed to the Armenian Diaspora, a relatively small, geographically disparate, cultural group. Due to geographic dispersion, this group serves as a useful representative for illustrating common artifacts as well as divergences in markers of personal identity. Social systems are composed of an agglomeration of groups of this type, cultural and social, that are central in the formation of personal identity within a larger societal context. Groups identify themselves through self-imposed artifacts or by artifacts imposed by virtue of their identification within a given social or cultural group. These markers of identity sometimes serve as a unifying principle within varied social structures, but often serve a different purpose, as a dividing principal within organizations as well as cultural groups. The conflict resulting from this type of interaction serves as an impediment to organizational efficiency. Integration in corporate structures and similarly interorganizational attempts to broker coexistence between cultural groups sharing common geography or other binding characteristics are commonly challenged by issues of object identity resulting in strife derived from identification of cultural artifacts.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126555874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computing the impact of cyber attacks on complex missions 计算网络攻击对复杂任务的影响
2011 IEEE International Systems Conference Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929055
S. Musman, Mike Tanner, A. Temin, E. Elsaesser, Lewis Loren
{"title":"Computing the impact of cyber attacks on complex missions","authors":"S. Musman, Mike Tanner, A. Temin, E. Elsaesser, Lewis Loren","doi":"10.1109/SYSCON.2011.5929055","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929055","url":null,"abstract":"This paper describes how to evaluate the impact of a cyber attack on a mission. We accomplish this by computing impact as the changes to mission measures of effectiveness, based on the reported effects of a known or suspected attack on one or more parts of the information technology (IT) supporting the mission. Our previous papers have described our goals for computing mission impact and the choices of the techniques we use for modeling missions, IT, and cyber attacks. This paper focuses on how we compute the impact of cyber attacks on IT processes and information. These computations will improve decision-making when under cyber attack by providing accurate and detailed assessments of the impact of those attacks. Although the focus of our work has been on the calculation of cyber mission impacts during mission execution, we have also demonstrated how our representations and computations can be used for performing cyber risk analysis and crown jewels analysis.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125252202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
A risk modelling approach for a Communicating System of Systems 系统的通信系统的风险建模方法
2011 IEEE International Systems Conference Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929099
J. Aitken, R. Alexander, T. Kelly
{"title":"A risk modelling approach for a Communicating System of Systems","authors":"J. Aitken, R. Alexander, T. Kelly","doi":"10.1109/SYSCON.2011.5929099","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929099","url":null,"abstract":"Communicating Systems of Systems provide new methods for developing flexibility and functionality. However, these systems contain added layers of complexity due to the emergent behaviours present in the network. In order to understand the safety implications of operating these SoS this paper develops a new risk modelling technique. Building on information contained within the MODAF model of the SoS this technique provides a structure to enable the analysis of risk.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134375160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
System architecture pliability and trading operations in tradespace exploration 贸易空间探索中的系统架构灵活性与交易操作
2011 IEEE International Systems Conference Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929073
Brian Mekdeci, A. Ross, D. Rhodes, D. Hastings
{"title":"System architecture pliability and trading operations in tradespace exploration","authors":"Brian Mekdeci, A. Ross, D. Rhodes, D. Hastings","doi":"10.1109/SYSCON.2011.5929073","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929073","url":null,"abstract":"The concept of operations is often assumed when assessing different design variables in a tradespace study for a particular system architecture, The way a system operates, however, has a large effect on its performance, and can often be the only variable through which stakeholders can influence a system after the system is implemented. The concept of pliable system architectures is introduced so that operational variables can be explicitly considered and incorporated into tradespace studies. System transitions can be predicted by pliability, and these transitions can provide insight into other system “ilities” such as changeability, adaptability, flexibility and survivability. Two techniques are introduced in order to demonstrate the usefulness of the pliability concept; (1) a step-by-step process by which operational variables can be identified within a system architecture, and (2) a process by which very large tradespaces can be sampled into a manageable set of system instances that provide maximum insight for the level of effort to model them. As these new concepts and methodologies are new and part of ongoing research, they will need to be tested and validated in future work.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115877563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Optimization and control of hydrogen and energy flows in a Green Hydrogen Refuelling Stations 绿色加氢站氢气和能量流动的优化与控制
2011 IEEE International Systems Conference Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929057
H. Dagdougui, A. Ouammi, R. Sacile
{"title":"Optimization and control of hydrogen and energy flows in a Green Hydrogen Refuelling Stations","authors":"H. Dagdougui, A. Ouammi, R. Sacile","doi":"10.1109/SYSCON.2011.5929057","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929057","url":null,"abstract":"In this paper, an optimization model of Green Hydrogen Refuelling Station (GHRS) is presented. The GHRS is powered completely by a wind farm to satisfy predefined hydrogen fuel and electrical energy demands. The model based on a mathematical programming is developed to control both energy and hydrogen flows exchanged among the system components. The optimization model has been applied on one week basis to a case study in the province of Savona, Italy. Optimal results are reported taking into account the presence of an additional hydrogen industrial market and a connection with the electrical network.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116388199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web services for handheld tactical systems 手持式战术系统的Web服务
2011 IEEE International Systems Conference Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929101
Soumya Simanta, Daniel Plakosh, E. Morris
{"title":"Web services for handheld tactical systems","authors":"Soumya Simanta, Daniel Plakosh, E. Morris","doi":"10.1109/SYSCON.2011.5929101","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929101","url":null,"abstract":"Service-Oriented Architecture (SOA) is an architectural pattern for constructing and deploying systems characterized by components called services that can be composed into applications using standard interface formats. While service orientation can reduce integration cost and enhance agility in response to changing situations, it has not been widely applied to support mobile users in ad hoc, wireless computing environments common to tactical military situations and first responders to humanitarian disasters. These environments are impoverished in terms of computational resources and network characteristics. This paper describes a set of prototypes that demonstrate the use of SOA in tactical environments in which users are employing handheld devices to obtain situational awareness data.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116900569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Supply chain risk management - Understanding vulnerabilities in code you buy, build, or integrate 供应链风险管理——了解您购买、构建或集成的代码中的漏洞
2011 IEEE International Systems Conference Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929123
P. Croll
{"title":"Supply chain risk management - Understanding vulnerabilities in code you buy, build, or integrate","authors":"P. Croll","doi":"10.1109/SYSCON.2011.5929123","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929123","url":null,"abstract":"This paper describes the scope of the problem regarding software vulnerabilities and the current state of the practice in static code analysis for software assurance. Recommendations are made regarding the use of static analysis methods and tools during the software life. Static code analysis touch points in during life cycle reviews and challenges to automated static code analysis are also discussed.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127341424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A scalable Role-based Group Key Agreement and Role Identification mechanism 一个可扩展的基于角色的组密钥协议和角色识别机制
2011 IEEE International Systems Conference Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929100
J. Bian, R. Seker, U. Topaloglu, Coskun Bayrak
{"title":"A scalable Role-based Group Key Agreement and Role Identification mechanism","authors":"J. Bian, R. Seker, U. Topaloglu, Coskun Bayrak","doi":"10.1109/SYSCON.2011.5929100","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929100","url":null,"abstract":"Large-scale organizations often use role-based hierarchical systems for managing human resources. Meanwhile, secure communication is an essential element in protecting an organization's intellectual property. In this paper, we propose a solution to the problem of securing group communication (i.e. multiple-peer communication) along with the difficulty of managing such communication system in a large-scale and role-based environment. A role-based conference key generation algorithm is proposed to produce chained-keys by recursive hashing. The proposed work makes it possible that a user with a higher clearance can audit the communications among the users that are hierarchically below him/her. Furthermore, the compartmentalization problem in the previous version is solved by introducing Role Identification Certificates (RICs) using the same key-chain algorithm, so that communications within a group will not be exposed to the outsiders. A centralized key management server is used to securely dispatch the keys to each communicating entity based on his/her role. This lowers the cost associated with deployment of a good Random Number Generator (RNG) and reduces the packet size compared to traditional PKI systems.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128129671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SOA migration case studies and lessons learned SOA迁移案例研究和经验教训
2011 IEEE International Systems Conference Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929124
Pushparani Bhallamudi, S. Tilley
{"title":"SOA migration case studies and lessons learned","authors":"Pushparani Bhallamudi, S. Tilley","doi":"10.1109/SYSCON.2011.5929124","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929124","url":null,"abstract":"Service-Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing enterprise systems where business needs and technical solutions are closely aligned. SOA offers a number of potential benefits, such as cost-efficiency and agility. To exploit the benefits that SOA offers, several organizations are adopting a services model for leveraging their existing legacy systems. Migration to SOA can give new life to the existing legacy, but if not done correctly the migration can also lead to failure. There are several factors for this, such as technology selection, migration approach, type of legacy system, and SOA governance. One way to learn how to achieve success and avoid failure is through a thorough analysis of existing work in this field. This paper reports on a study that analyzed existing SOA migration projects to learn from them the factors that influence the success or failure of their efforts. A mechanism called the Evolution Process Framework for SOA was used to structure the analysis. Three SOA migration case studies and one experience report were analyzed. Lessons learned from each study are summarized, with crosscutting issues distilled from across all four studies presented. One of the most important lessons learned is the significance of well-defined policies and procedures for defining, publishing, and maintaining services.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126861766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
An Architectural Efficiency based methodology for assessing the relative merit of synchronous vs. asynchronous service invocations 一种基于体系结构效率的方法,用于评估同步与异步服务调用的相对优点
2011 IEEE International Systems Conference Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929058
G. Zakharia
{"title":"An Architectural Efficiency based methodology for assessing the relative merit of synchronous vs. asynchronous service invocations","authors":"G. Zakharia","doi":"10.1109/SYSCON.2011.5929058","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929058","url":null,"abstract":"There are very few architectural issues that invite as much religious ardor as the question of whether to connect to a remote service asynchronously or synchronously. To arguments of architectural decoupling in favor of the asynchronous option some architects and developers will continue to argue in favor of the simplicity of the synchronous option. This paper proposes to introduce new insights to such debate through an Architectural Efficiency analysis, an approach that will turn out to reveal major differentiators between the two alternatives, thus also validating the methodology to this particular domain of analysis.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124826038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信