Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929102
Brian Moriarty
The research in this paper analyzes the common characteristics shared between social organizations of varied type and how personal and group identity within these groups is derived from the identification with common contextual artifacts. This analysis is performed through survey questions concerning markers of cultural identity posed to the Armenian Diaspora, a relatively small, geographically disparate, cultural group. Due to geographic dispersion, this group serves as a useful representative for illustrating common artifacts as well as divergences in markers of personal identity. Social systems are composed of an agglomeration of groups of this type, cultural and social, that are central in the formation of personal identity within a larger societal context. Groups identify themselves through self-imposed artifacts or by artifacts imposed by virtue of their identification within a given social or cultural group. These markers of identity sometimes serve as a unifying principle within varied social structures, but often serve a different purpose, as a dividing principal within organizations as well as cultural groups. The conflict resulting from this type of interaction serves as an impediment to organizational efficiency. Integration in corporate structures and similarly interorganizational attempts to broker coexistence between cultural groups sharing common geography or other binding characteristics are commonly challenged by issues of object identity resulting in strife derived from identification of cultural artifacts.
{"title":"Group identity in social and cultural systems","authors":"Brian Moriarty","doi":"10.1109/SYSCON.2011.5929102","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929102","url":null,"abstract":"The research in this paper analyzes the common characteristics shared between social organizations of varied type and how personal and group identity within these groups is derived from the identification with common contextual artifacts. This analysis is performed through survey questions concerning markers of cultural identity posed to the Armenian Diaspora, a relatively small, geographically disparate, cultural group. Due to geographic dispersion, this group serves as a useful representative for illustrating common artifacts as well as divergences in markers of personal identity. Social systems are composed of an agglomeration of groups of this type, cultural and social, that are central in the formation of personal identity within a larger societal context. Groups identify themselves through self-imposed artifacts or by artifacts imposed by virtue of their identification within a given social or cultural group. These markers of identity sometimes serve as a unifying principle within varied social structures, but often serve a different purpose, as a dividing principal within organizations as well as cultural groups. The conflict resulting from this type of interaction serves as an impediment to organizational efficiency. Integration in corporate structures and similarly interorganizational attempts to broker coexistence between cultural groups sharing common geography or other binding characteristics are commonly challenged by issues of object identity resulting in strife derived from identification of cultural artifacts.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126555874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929055
S. Musman, Mike Tanner, A. Temin, E. Elsaesser, Lewis Loren
This paper describes how to evaluate the impact of a cyber attack on a mission. We accomplish this by computing impact as the changes to mission measures of effectiveness, based on the reported effects of a known or suspected attack on one or more parts of the information technology (IT) supporting the mission. Our previous papers have described our goals for computing mission impact and the choices of the techniques we use for modeling missions, IT, and cyber attacks. This paper focuses on how we compute the impact of cyber attacks on IT processes and information. These computations will improve decision-making when under cyber attack by providing accurate and detailed assessments of the impact of those attacks. Although the focus of our work has been on the calculation of cyber mission impacts during mission execution, we have also demonstrated how our representations and computations can be used for performing cyber risk analysis and crown jewels analysis.
{"title":"Computing the impact of cyber attacks on complex missions","authors":"S. Musman, Mike Tanner, A. Temin, E. Elsaesser, Lewis Loren","doi":"10.1109/SYSCON.2011.5929055","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929055","url":null,"abstract":"This paper describes how to evaluate the impact of a cyber attack on a mission. We accomplish this by computing impact as the changes to mission measures of effectiveness, based on the reported effects of a known or suspected attack on one or more parts of the information technology (IT) supporting the mission. Our previous papers have described our goals for computing mission impact and the choices of the techniques we use for modeling missions, IT, and cyber attacks. This paper focuses on how we compute the impact of cyber attacks on IT processes and information. These computations will improve decision-making when under cyber attack by providing accurate and detailed assessments of the impact of those attacks. Although the focus of our work has been on the calculation of cyber mission impacts during mission execution, we have also demonstrated how our representations and computations can be used for performing cyber risk analysis and crown jewels analysis.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125252202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929099
J. Aitken, R. Alexander, T. Kelly
Communicating Systems of Systems provide new methods for developing flexibility and functionality. However, these systems contain added layers of complexity due to the emergent behaviours present in the network. In order to understand the safety implications of operating these SoS this paper develops a new risk modelling technique. Building on information contained within the MODAF model of the SoS this technique provides a structure to enable the analysis of risk.
{"title":"A risk modelling approach for a Communicating System of Systems","authors":"J. Aitken, R. Alexander, T. Kelly","doi":"10.1109/SYSCON.2011.5929099","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929099","url":null,"abstract":"Communicating Systems of Systems provide new methods for developing flexibility and functionality. However, these systems contain added layers of complexity due to the emergent behaviours present in the network. In order to understand the safety implications of operating these SoS this paper develops a new risk modelling technique. Building on information contained within the MODAF model of the SoS this technique provides a structure to enable the analysis of risk.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134375160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929073
Brian Mekdeci, A. Ross, D. Rhodes, D. Hastings
The concept of operations is often assumed when assessing different design variables in a tradespace study for a particular system architecture, The way a system operates, however, has a large effect on its performance, and can often be the only variable through which stakeholders can influence a system after the system is implemented. The concept of pliable system architectures is introduced so that operational variables can be explicitly considered and incorporated into tradespace studies. System transitions can be predicted by pliability, and these transitions can provide insight into other system “ilities” such as changeability, adaptability, flexibility and survivability. Two techniques are introduced in order to demonstrate the usefulness of the pliability concept; (1) a step-by-step process by which operational variables can be identified within a system architecture, and (2) a process by which very large tradespaces can be sampled into a manageable set of system instances that provide maximum insight for the level of effort to model them. As these new concepts and methodologies are new and part of ongoing research, they will need to be tested and validated in future work.
{"title":"System architecture pliability and trading operations in tradespace exploration","authors":"Brian Mekdeci, A. Ross, D. Rhodes, D. Hastings","doi":"10.1109/SYSCON.2011.5929073","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929073","url":null,"abstract":"The concept of operations is often assumed when assessing different design variables in a tradespace study for a particular system architecture, The way a system operates, however, has a large effect on its performance, and can often be the only variable through which stakeholders can influence a system after the system is implemented. The concept of pliable system architectures is introduced so that operational variables can be explicitly considered and incorporated into tradespace studies. System transitions can be predicted by pliability, and these transitions can provide insight into other system “ilities” such as changeability, adaptability, flexibility and survivability. Two techniques are introduced in order to demonstrate the usefulness of the pliability concept; (1) a step-by-step process by which operational variables can be identified within a system architecture, and (2) a process by which very large tradespaces can be sampled into a manageable set of system instances that provide maximum insight for the level of effort to model them. As these new concepts and methodologies are new and part of ongoing research, they will need to be tested and validated in future work.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115877563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929057
H. Dagdougui, A. Ouammi, R. Sacile
In this paper, an optimization model of Green Hydrogen Refuelling Station (GHRS) is presented. The GHRS is powered completely by a wind farm to satisfy predefined hydrogen fuel and electrical energy demands. The model based on a mathematical programming is developed to control both energy and hydrogen flows exchanged among the system components. The optimization model has been applied on one week basis to a case study in the province of Savona, Italy. Optimal results are reported taking into account the presence of an additional hydrogen industrial market and a connection with the electrical network.
{"title":"Optimization and control of hydrogen and energy flows in a Green Hydrogen Refuelling Stations","authors":"H. Dagdougui, A. Ouammi, R. Sacile","doi":"10.1109/SYSCON.2011.5929057","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929057","url":null,"abstract":"In this paper, an optimization model of Green Hydrogen Refuelling Station (GHRS) is presented. The GHRS is powered completely by a wind farm to satisfy predefined hydrogen fuel and electrical energy demands. The model based on a mathematical programming is developed to control both energy and hydrogen flows exchanged among the system components. The optimization model has been applied on one week basis to a case study in the province of Savona, Italy. Optimal results are reported taking into account the presence of an additional hydrogen industrial market and a connection with the electrical network.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116388199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929101
Soumya Simanta, Daniel Plakosh, E. Morris
Service-Oriented Architecture (SOA) is an architectural pattern for constructing and deploying systems characterized by components called services that can be composed into applications using standard interface formats. While service orientation can reduce integration cost and enhance agility in response to changing situations, it has not been widely applied to support mobile users in ad hoc, wireless computing environments common to tactical military situations and first responders to humanitarian disasters. These environments are impoverished in terms of computational resources and network characteristics. This paper describes a set of prototypes that demonstrate the use of SOA in tactical environments in which users are employing handheld devices to obtain situational awareness data.
{"title":"Web services for handheld tactical systems","authors":"Soumya Simanta, Daniel Plakosh, E. Morris","doi":"10.1109/SYSCON.2011.5929101","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929101","url":null,"abstract":"Service-Oriented Architecture (SOA) is an architectural pattern for constructing and deploying systems characterized by components called services that can be composed into applications using standard interface formats. While service orientation can reduce integration cost and enhance agility in response to changing situations, it has not been widely applied to support mobile users in ad hoc, wireless computing environments common to tactical military situations and first responders to humanitarian disasters. These environments are impoverished in terms of computational resources and network characteristics. This paper describes a set of prototypes that demonstrate the use of SOA in tactical environments in which users are employing handheld devices to obtain situational awareness data.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116900569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929123
P. Croll
This paper describes the scope of the problem regarding software vulnerabilities and the current state of the practice in static code analysis for software assurance. Recommendations are made regarding the use of static analysis methods and tools during the software life. Static code analysis touch points in during life cycle reviews and challenges to automated static code analysis are also discussed.
{"title":"Supply chain risk management - Understanding vulnerabilities in code you buy, build, or integrate","authors":"P. Croll","doi":"10.1109/SYSCON.2011.5929123","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929123","url":null,"abstract":"This paper describes the scope of the problem regarding software vulnerabilities and the current state of the practice in static code analysis for software assurance. Recommendations are made regarding the use of static analysis methods and tools during the software life. Static code analysis touch points in during life cycle reviews and challenges to automated static code analysis are also discussed.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127341424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929100
J. Bian, R. Seker, U. Topaloglu, Coskun Bayrak
Large-scale organizations often use role-based hierarchical systems for managing human resources. Meanwhile, secure communication is an essential element in protecting an organization's intellectual property. In this paper, we propose a solution to the problem of securing group communication (i.e. multiple-peer communication) along with the difficulty of managing such communication system in a large-scale and role-based environment. A role-based conference key generation algorithm is proposed to produce chained-keys by recursive hashing. The proposed work makes it possible that a user with a higher clearance can audit the communications among the users that are hierarchically below him/her. Furthermore, the compartmentalization problem in the previous version is solved by introducing Role Identification Certificates (RICs) using the same key-chain algorithm, so that communications within a group will not be exposed to the outsiders. A centralized key management server is used to securely dispatch the keys to each communicating entity based on his/her role. This lowers the cost associated with deployment of a good Random Number Generator (RNG) and reduces the packet size compared to traditional PKI systems.
{"title":"A scalable Role-based Group Key Agreement and Role Identification mechanism","authors":"J. Bian, R. Seker, U. Topaloglu, Coskun Bayrak","doi":"10.1109/SYSCON.2011.5929100","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929100","url":null,"abstract":"Large-scale organizations often use role-based hierarchical systems for managing human resources. Meanwhile, secure communication is an essential element in protecting an organization's intellectual property. In this paper, we propose a solution to the problem of securing group communication (i.e. multiple-peer communication) along with the difficulty of managing such communication system in a large-scale and role-based environment. A role-based conference key generation algorithm is proposed to produce chained-keys by recursive hashing. The proposed work makes it possible that a user with a higher clearance can audit the communications among the users that are hierarchically below him/her. Furthermore, the compartmentalization problem in the previous version is solved by introducing Role Identification Certificates (RICs) using the same key-chain algorithm, so that communications within a group will not be exposed to the outsiders. A centralized key management server is used to securely dispatch the keys to each communicating entity based on his/her role. This lowers the cost associated with deployment of a good Random Number Generator (RNG) and reduces the packet size compared to traditional PKI systems.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128129671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929124
Pushparani Bhallamudi, S. Tilley
Service-Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing enterprise systems where business needs and technical solutions are closely aligned. SOA offers a number of potential benefits, such as cost-efficiency and agility. To exploit the benefits that SOA offers, several organizations are adopting a services model for leveraging their existing legacy systems. Migration to SOA can give new life to the existing legacy, but if not done correctly the migration can also lead to failure. There are several factors for this, such as technology selection, migration approach, type of legacy system, and SOA governance. One way to learn how to achieve success and avoid failure is through a thorough analysis of existing work in this field. This paper reports on a study that analyzed existing SOA migration projects to learn from them the factors that influence the success or failure of their efforts. A mechanism called the Evolution Process Framework for SOA was used to structure the analysis. Three SOA migration case studies and one experience report were analyzed. Lessons learned from each study are summarized, with crosscutting issues distilled from across all four studies presented. One of the most important lessons learned is the significance of well-defined policies and procedures for defining, publishing, and maintaining services.
{"title":"SOA migration case studies and lessons learned","authors":"Pushparani Bhallamudi, S. Tilley","doi":"10.1109/SYSCON.2011.5929124","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929124","url":null,"abstract":"Service-Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing enterprise systems where business needs and technical solutions are closely aligned. SOA offers a number of potential benefits, such as cost-efficiency and agility. To exploit the benefits that SOA offers, several organizations are adopting a services model for leveraging their existing legacy systems. Migration to SOA can give new life to the existing legacy, but if not done correctly the migration can also lead to failure. There are several factors for this, such as technology selection, migration approach, type of legacy system, and SOA governance. One way to learn how to achieve success and avoid failure is through a thorough analysis of existing work in this field. This paper reports on a study that analyzed existing SOA migration projects to learn from them the factors that influence the success or failure of their efforts. A mechanism called the Evolution Process Framework for SOA was used to structure the analysis. Three SOA migration case studies and one experience report were analyzed. Lessons learned from each study are summarized, with crosscutting issues distilled from across all four studies presented. One of the most important lessons learned is the significance of well-defined policies and procedures for defining, publishing, and maintaining services.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126861766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929058
G. Zakharia
There are very few architectural issues that invite as much religious ardor as the question of whether to connect to a remote service asynchronously or synchronously. To arguments of architectural decoupling in favor of the asynchronous option some architects and developers will continue to argue in favor of the simplicity of the synchronous option. This paper proposes to introduce new insights to such debate through an Architectural Efficiency analysis, an approach that will turn out to reveal major differentiators between the two alternatives, thus also validating the methodology to this particular domain of analysis.
{"title":"An Architectural Efficiency based methodology for assessing the relative merit of synchronous vs. asynchronous service invocations","authors":"G. Zakharia","doi":"10.1109/SYSCON.2011.5929058","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929058","url":null,"abstract":"There are very few architectural issues that invite as much religious ardor as the question of whether to connect to a remote service asynchronously or synchronously. To arguments of architectural decoupling in favor of the asynchronous option some architects and developers will continue to argue in favor of the simplicity of the synchronous option. This paper proposes to introduce new insights to such debate through an Architectural Efficiency analysis, an approach that will turn out to reveal major differentiators between the two alternatives, thus also validating the methodology to this particular domain of analysis.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124826038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}