{"title":"Analysis of Monolithic and Microkernel Architectures: Towards Secure Hypervisor Design","authors":"Jordan Shropshire","doi":"10.1109/HICSS.2014.615","DOIUrl":"https://doi.org/10.1109/HICSS.2014.615","url":null,"abstract":"This research focuses on hyper visor security from holistic perspective. It centers on hyper visor architecture - the organization of the various subsystems which collectively compromise a virtualization platform. It holds that the path to a secure hyper visor begins with a big-picture focus on architecture. Unfortunately, little research has been conducted with this perspective. This study investigates the impact of monolithic and micro kernel hyper visor architectures on the size and scope of the attack surface. Six architectural features are compared: management API, monitoring interface, hyper calls, interrupts, networking, and I/O. These subsystems are core hyper visor components which could be used as attack vectors. Specific examples and three leading hyper visor platforms are referenced (ESXi for monolithic architecture; Xen and Hyper-V for micro architecture). The results describe the relative strengths and vulnerabilities of both types of architectures. It is concluded that neither design is more secure, since both incorporate security tradeoffs in core processes.","PeriodicalId":250241,"journal":{"name":"2014 47th Hawaii International Conference on System Sciences","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127075646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Terstyánszky, T. Kiss, V. Korkhov, S. Olabarriaga
{"title":"Analyzing and Modeling of Medical Data on Distributed Computing Infrastructures","authors":"G. Terstyánszky, T. Kiss, V. Korkhov, S. Olabarriaga","doi":"10.1109/HICSS.2014.364","DOIUrl":"https://doi.org/10.1109/HICSS.2014.364","url":null,"abstract":"Researchers want to analyse Health Care data which may requires large pools of compute and data resources. To have them they need access to Distributed Computing Infrastructures (DCI). To use them it requires expertise which researchers may not have. Workflows can hide infrastructures. There are many workflow systems but they are not interoperable. To learn a workflow system and create workflows in a workflow system may require significant effort. Considering these efforts it is not reasonable to expect that researchers will learn new workflow systems if they want to run workflows of other workflow systems. As a result, the lack of interoperability prevents workflow sharing and a vast amount of research efforts is wasted. The FP7 Sharing Interoperable Workflow for Large-Scale Scientific Simulation on Available DCIs (SHIWA) project developed the Coarse-Grained Interoperability (CGI) to enable workflow sharing. The project created the SHIWA Simulation Platform (SSP) to support CGI as a production-level service. The paper describes how the CGI approach can be used for analysis and simulation in Health Care.","PeriodicalId":250241,"journal":{"name":"2014 47th Hawaii International Conference on System Sciences","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126109071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk Management in Video Game Development Projects","authors":"Marc L. Schmalz, Aimee Finn, Hazel Taylor","doi":"10.1109/HICSS.2014.534","DOIUrl":"https://doi.org/10.1109/HICSS.2014.534","url":null,"abstract":"The video game software industry has a reputation for volatile, chaotic projects yet, in spite of dramatic growth in global revenues, surprisingly little academic work has examined these projects. This study reports a preliminary investigation into this under-researched area. We interviewed eight video game producers from a range of companies, using a critical incident method to explore risk management practices and risk perceptions. Our results revealed that in lieu of formal risk management practices, these managers relied on prototyping, pre-production decision points, and agile approaches to contain risk on their projects. Among the risk factors mentioned, two are specific to the unique context of video game development. The risk of failing to match the development strategy to the project was identified as a major cause of problems during the development process, and a new risk - the 'fun factor' - was a key element threatening the success of the final game release.","PeriodicalId":250241,"journal":{"name":"2014 47th Hawaii International Conference on System Sciences","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116923074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IT Governance Effectiveness and Its Antecedents: An Empirical Examination in Brazilian Firms","authors":"G. Lunardi, A. C. Maçada, J. Becker","doi":"10.1109/HICSS.2014.540","DOIUrl":"https://doi.org/10.1109/HICSS.2014.540","url":null,"abstract":"IT governance has become an important concern for business, receiving great attention from both practitioners and academics. Although some authors have stated that effective IT governance is crucial for any organization to achieve its corporate goals, little academic research is available that empirically supports the assumptions about the factors that determine the effectiveness of IT governance. In this sense, we proposed and examined a theoretical model that explains and predicts IT governance effectiveness, linking its domains and mechanisms. We empirically tested our hypotheses based on survey data gathered from 87 CIOs of large Brazilian companies. The results have implications about how IT governance domains and the adoption of different IT governance mechanisms can affect IT governance effectiveness, bringing implications from theory and practice.","PeriodicalId":250241,"journal":{"name":"2014 47th Hawaii International Conference on System Sciences","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125024985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Nomological Network Analysis of Research on Information Security Management Systems","authors":"Fernando Parra, Laura L. Hall","doi":"10.1109/HICSS.2014.536","DOIUrl":"https://doi.org/10.1109/HICSS.2014.536","url":null,"abstract":"This study offers a comprehensive examination of hypothetical concepts related to the behaviors, attitudes, outcomes, processes, experiences, manifestations and indicators connected with an organization's design, implementation and management of a coherent set of policies, procedures and systems to manage risks to its information assets. We introduce network analysis tools as a novel approach to highlight the construct relationships found in Information Security Management Systems (ISMS) literature published in the new millennium. Descriptive results display a significant expansion in the research of ISMS-related phenomena. Network analyses showcase the critical influence of certain constructs in scholarly publications as well as the most salient relationships among these constructs. Our study provides a gap analysis that also underscores those constructs that may require further exploration by this stream of research.","PeriodicalId":250241,"journal":{"name":"2014 47th Hawaii International Conference on System Sciences","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131472838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Things to Maintain or Change: The Importance of Critical Territory in Post-acquisition Integration Boundary Issues","authors":"Dongcheol Heo, Heeseok Lee","doi":"10.1109/HICSS.2014.447","DOIUrl":"https://doi.org/10.1109/HICSS.2014.447","url":null,"abstract":"Based upon two different but related post-acquisition cases of a global medical system manufacturing and service firm, this study explains why the preservation of a certain knowledge bearing domain, called critical territory, is essential in post-acquisition integration (PAI), particularly for the target firm. The lack of clear knowledge boundaries between the acquiring firm and the target firm and critical territories therein can jeopardize knowledge integration in PAI. The case analyses reveal both acquiring and target firms should promptly build and adjust their knowledge boundaries and critical territories, allowing selective, intelligent knowledge sharing and integration. It is also found that critical territory contributes to completing the ever-evolving knowledge cycle by enabling the synthesis and appropriation of PAI knowledge management activities of both the acquiring and target firms. Without the preservation of critical territory, knowledge integration in PAI hampers target firm knowledge management activities and maximum synergy generation, the goal of acquisition.","PeriodicalId":250241,"journal":{"name":"2014 47th Hawaii International Conference on System Sciences","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132449930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing KVM-Based Cloud Systems via Virtualization Introspection","authors":"Sheng-Wei Lee, Fang Yu","doi":"10.1109/HICSS.2014.617","DOIUrl":"https://doi.org/10.1109/HICSS.2014.617","url":null,"abstract":"Linux Kernel Virtual Machine (KVM) is one of the most commonly deployed hypervisor drivers in the IaaS layer of cloud computing ecosystems. The hypervisor provides a full-virtualization environment that intends to virtualize as much hardware and systems as possible, including CPUs, network interfaces and chipsets. With KVM, heterogeneous operating systems can be installed in Virtual Machines (VMs) in an homogeneous environment. However, it has been shown that various breaches due to software defects may cause damages on such a cloud ecosystem. We propose a new Virtualization Introspection System (VIS) to protect the host as well as VMs running on a KVM-based cloud structure from malicious attacks. VIS detects and intercepts attacks from VMs by collecting their static and dynamic status. We then replay the attacks on VMs and leverage artificial intelligence techniques to derive effective decision rules with unsupervised learning nature. The preliminary result shows the promise of the presented approach against several modern attacks on CVE-based vulnerabilities.","PeriodicalId":250241,"journal":{"name":"2014 47th Hawaii International Conference on System Sciences","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115263297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Which Factors Affect Software-as-a-Service Selection the Most? A Study from the Customer's and the Vendor's Perspective","authors":"Ariana Polyviou, N. Pouloudi, Stamatia Rizou","doi":"10.1109/HICSS.2014.621","DOIUrl":"https://doi.org/10.1109/HICSS.2014.621","url":null,"abstract":"Business interest in deploying Software-As-A-Service (SaaS) solutions has been increasing steadily. Despite this, there is limited empirical work addressing SaaS selection factors or attempting to understand the vendors' perception of the customer preferences. In this paper, we present the results of a qualitative study on SaaS selection factors that takes into account both the customers' and the vendors' perspectives. According to our findings, selection factors differ across customer segments. Furthermore, vendors appreciate the selection factors that relate more closely to the technical and branding aspects and seem to underestimate the importance of usability and support aspects that are highlighted by the customers.","PeriodicalId":250241,"journal":{"name":"2014 47th Hawaii International Conference on System Sciences","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131454704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Can Substitution and Complementarity Effects Be Leveraged for Broadband Internet Services Strategy?","authors":"Gwangjae Jung, Youngsoo Kim, R. Kauffman","doi":"10.1109/HICSS.2014.508","DOIUrl":"https://doi.org/10.1109/HICSS.2014.508","url":null,"abstract":"With growth in mobile Internet services, the relationship between mobile and fixed broadband has become an issue in telecom firm strategy. Previous research focused on aggregate penetration for mobile and fixed broadband services. Our research analyzes the economic relationship between mobile and fixed broadband services at the household level, as a basis for how senior managers should rethink their strategy approach. Using data on broadband services subscriptions, we examine how changes that occur for mobile broadband services bandwidth (MBB) affect changes in fixed broadband bandwidth (FBB) services subscriptions, inclusive of new subscriptions - and vice versa. We explore the different cross-effects and asymmetric patterns of event-driven bandwidth changes. Mobile and fixed broadband services are complementary: both affect the consumption of the other. Our findings offer useful information for marketing strategy and broadband services promotion, such as bundling strategy based on bandwidth changes, and segmentation based on the bandwidth changes in both services.","PeriodicalId":250241,"journal":{"name":"2014 47th Hawaii International Conference on System Sciences","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125653561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accelerating Economic Inequality and the Moral Responsibilities of Corporate-Employed Technologists","authors":"A. Singer","doi":"10.4018/IJSODIT.2015010103","DOIUrl":"https://doi.org/10.4018/IJSODIT.2015010103","url":null,"abstract":"Corporate-employed technologists have a special moral responsibility to themselves and to others to help oppose the dynamics of accelerating inequality in the US and globally. They have distinctive capabilities in this respect and they are in a special position to do so. There exists a moral-responsibility-to-self in this context, involving meta-coherence and integrity. Responsibility-to-others can be enacted by attempting to inject scientific and ethical habits-of-thought into the global distributed governance process, but also by standing in opposition to corporate-level strategies and practices that make inequality worse.","PeriodicalId":250241,"journal":{"name":"2014 47th Hawaii International Conference on System Sciences","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134311066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}