首页 > 最新文献

Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)最新文献

英文 中文
Fault Tolerance in Bluetooth Scatternet Topologies 蓝牙散射网拓扑中的容错
L. Hodge, R. Whitaker
This paper addresses the optimization of topological characteristics of Bluetooth scatternets which affect network performance. Particular attention is paid to the issue of fault tolerance, and objectives which are in competition with this. Using a multiple objective framework, the optimized trade-off between various topological objectives is determined. This is used to compare the scatternets produced by four decentralized protocols from the literature. The results offer a new basis to analyse and compare decentralized scatternet formation protocols. Results are presented for a range of randomized test problems.
本文研究了影响网络性能的蓝牙散射网拓扑特性的优化问题。特别关注的是容错问题,以及与此相竞争的目标。利用多目标框架,确定了各种拓扑目标之间的最优权衡。这用于比较文献中四个分散协议产生的散射网。研究结果为分析和比较分散散射网形成协议提供了新的基础。结果提出了一系列随机测试问题。
{"title":"Fault Tolerance in Bluetooth Scatternet Topologies","authors":"L. Hodge, R. Whitaker","doi":"10.1109/HICSS.2006.182","DOIUrl":"https://doi.org/10.1109/HICSS.2006.182","url":null,"abstract":"This paper addresses the optimization of topological characteristics of Bluetooth scatternets which affect network performance. Particular attention is paid to the issue of fault tolerance, and objectives which are in competition with this. Using a multiple objective framework, the optimized trade-off between various topological objectives is determined. This is used to compare the scatternets produced by four decentralized protocols from the literature. The results offer a new basis to analyse and compare decentralized scatternet formation protocols. Results are presented for a range of randomized test problems.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116541862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IT Projects: Conflict, Governance, and Systems Thinking IT项目:冲突、治理和系统思考
D. Johnstone, S. Huff, B. Hope
Triggered by several embarrassing (and costly) IT project collapses in New Zealand’s public sector, a government report found that effective project control required good governance measures to be in place. Escalating conflict amongst project stakeholders, particularly where the IT projects are large and complex, is often cited as a major contributor to project problems. Conflict, and its resolution, will be affected by factors that are difficult to control, including culture and politics. In this paper we apply the basic concepts of systems thinking to deliver a holistic research framework, focusing on the project-related conflict resolution process. Key constructs include: input (stakeholder conflict); output (e.g. resolution outcome, satisfaction with outcome); contextual factors (e.g. power, culture); and, most importantly, the control mechanism (governance). This framework was empirically tested using a single case study. Our research found strong support for the model.
由于新西兰公共部门的几个令人尴尬(且代价高昂)的IT项目失败,一份政府报告发现,有效的项目控制需要良好的治理措施。项目涉众之间不断升级的冲突,特别是在IT项目又大又复杂的情况下,经常被认为是项目问题的主要贡献者。冲突及其解决将受到难以控制的因素的影响,包括文化和政治。在本文中,我们应用系统思维的基本概念来提供一个整体的研究框架,重点关注与项目相关的冲突解决过程。关键结构包括:输入(涉众冲突);输出(如解决结果、对结果的满意度);语境因素(如权力、文化);最重要的是控制机制(治理)。使用单个案例研究对该框架进行了实证检验。我们的研究为这个模型找到了强有力的支持。
{"title":"IT Projects: Conflict, Governance, and Systems Thinking","authors":"D. Johnstone, S. Huff, B. Hope","doi":"10.1109/HICSS.2006.235","DOIUrl":"https://doi.org/10.1109/HICSS.2006.235","url":null,"abstract":"Triggered by several embarrassing (and costly) IT project collapses in New Zealand’s public sector, a government report found that effective project control required good governance measures to be in place. Escalating conflict amongst project stakeholders, particularly where the IT projects are large and complex, is often cited as a major contributor to project problems. Conflict, and its resolution, will be affected by factors that are difficult to control, including culture and politics. In this paper we apply the basic concepts of systems thinking to deliver a holistic research framework, focusing on the project-related conflict resolution process. Key constructs include: input (stakeholder conflict); output (e.g. resolution outcome, satisfaction with outcome); contextual factors (e.g. power, culture); and, most importantly, the control mechanism (governance). This framework was empirically tested using a single case study. Our research found strong support for the model.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115080023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Classifying Knowledge Management Systems Based on Context Content 基于上下文内容的知识管理系统分类
M. Jennex
This paper discusses using users and the amount of context captured by a Knowledge Management System as the basis for classifying systems. The paper discusses previous classification schemes and concludes they aren’t helpful as Knowledge Management in an organization encompasses all the classification criteria in an ongoing basis. Ultimately, it is concluded that classifying the system based on the context for the captured knowledge being stored in the users’ heads or as part of the knowledge base is the appropriate method.
本文讨论了使用用户和知识管理系统捕获的上下文数量作为分类系统的基础。本文讨论了以前的分类方案,并得出结论,它们没有帮助,因为组织中的知识管理在持续的基础上包含所有的分类标准。最后得出结论,基于存储在用户头脑中或作为知识库一部分的捕获知识的上下文对系统进行分类是适当的方法。
{"title":"Classifying Knowledge Management Systems Based on Context Content","authors":"M. Jennex","doi":"10.1109/HICSS.2006.85","DOIUrl":"https://doi.org/10.1109/HICSS.2006.85","url":null,"abstract":"This paper discusses using users and the amount of context captured by a Knowledge Management System as the basis for classifying systems. The paper discusses previous classification schemes and concludes they aren’t helpful as Knowledge Management in an organization encompasses all the classification criteria in an ongoing basis. Ultimately, it is concluded that classifying the system based on the context for the captured knowledge being stored in the users’ heads or as part of the knowledge base is the appropriate method.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115310786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Exploiting Mobile Agents for Structured Distributed Software-Implemented Fault Injection 利用移动代理实现结构化分布式软件故障注入
Thomas M. Galla, K. Hummel, B. Peer
Embedded distributed real-time systems are traditionally used in safety-critical application areas such as avionics, healthcare, and the automotive sector. Assuring dependability under faulty conditions by means of fault tolerance mechanisms is a major concern in safety-critical systems. From a validation perspective, Software-Implemented Fault Injection (SWIFI) is an approved means for testing fault tolerance mechanisms. In recent work, we have introduced the concept of using mobile agents for distributed SWIFI in time-driven real-time systems. This paper presents a prototypical implementation of the agent platform for the OSEKtime real-time operating system and the FlexRay communication system. It is further shown, how to implement fault injection experiments by means of mobile agents in a structured manner following a classification of faults in terms of domain, persistence, and perception. Based on experiments conducted on ARM-based platforms, selected results are described in detail to demonstrate the potential of mobile agent based fault injection.
嵌入式分布式实时系统传统上用于安全关键应用领域,如航空电子、医疗保健和汽车行业。通过容错机制确保故障条件下的可靠性是安全关键型系统的主要关注点。从验证的角度来看,软件实现的错误注入(SWIFI)是一种被认可的测试容错机制的方法。在最近的工作中,我们引入了在时间驱动的实时系统中使用移动代理进行分布式SWIFI的概念。本文给出了OSEKtime实时操作系统和FlexRay通信系统代理平台的一个原型实现。进一步展示了如何通过移动代理以结构化的方式实现故障注入实验,并按照领域、持久性和感知对故障进行分类。通过在arm平台上进行的实验,详细说明了基于移动代理的故障注入的潜力。
{"title":"Exploiting Mobile Agents for Structured Distributed Software-Implemented Fault Injection","authors":"Thomas M. Galla, K. Hummel, B. Peer","doi":"10.1109/HICSS.2006.176","DOIUrl":"https://doi.org/10.1109/HICSS.2006.176","url":null,"abstract":"Embedded distributed real-time systems are traditionally used in safety-critical application areas such as avionics, healthcare, and the automotive sector. Assuring dependability under faulty conditions by means of fault tolerance mechanisms is a major concern in safety-critical systems. From a validation perspective, Software-Implemented Fault Injection (SWIFI) is an approved means for testing fault tolerance mechanisms. In recent work, we have introduced the concept of using mobile agents for distributed SWIFI in time-driven real-time systems. This paper presents a prototypical implementation of the agent platform for the OSEKtime real-time operating system and the FlexRay communication system. It is further shown, how to implement fault injection experiments by means of mobile agents in a structured manner following a classification of faults in terms of domain, persistence, and perception. Based on experiments conducted on ARM-based platforms, selected results are described in detail to demonstrate the potential of mobile agent based fault injection.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114775794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Antecedents of Business Process Outsourcing in Manufacturing Plants 制造工厂业务流程外包的前因后果
I. Bardhan, Jonathan Whitaker, Sunil Mithas
between investments in information technology, manufacturing plant strategies and their impact on business process outsourcing (BPO) in manufacturing plants. Using survey data from US manufacturing plants, we develop a theoretical framework for studying the antecedents of BPO at the plant level. Our analysis suggests that the level of information technology (IT) investments, as a percentage of plant sales, is positively associated with the outsourcing of plant production activities. We also find that plants with higher levels of in-house software infrastructure are less likely to outsource plant support business processes. Furthermore, we find that plant manufacturing strategies and other plant-specific characteristics, such as production volume and the degree of worker unionization, also have a significant impact on the types of business processes that are outsourced. Managerial and research implications of our research into the antecedents of BPO are summarized.
信息技术投资、制造工厂战略及其对制造工厂业务流程外包(BPO)的影响之间的关系。利用美国制造工厂的调查数据,我们开发了一个理论框架,用于研究工厂层面的业务流程外包的前因。我们的分析表明,信息技术(IT)投资水平,作为工厂销售的百分比,与工厂生产活动的外包呈正相关。我们还发现,拥有较高级别内部软件基础设施的工厂不太可能将工厂支持业务流程外包。此外,我们发现工厂制造策略和其他工厂特有的特征,如产量和工人工会化程度,也对外包的业务流程类型产生重大影响。总结了本研究对业务流程外包前因式的管理和研究意义。
{"title":"Antecedents of Business Process Outsourcing in Manufacturing Plants","authors":"I. Bardhan, Jonathan Whitaker, Sunil Mithas","doi":"10.1109/HICSS.2006.62","DOIUrl":"https://doi.org/10.1109/HICSS.2006.62","url":null,"abstract":"between investments in information technology, manufacturing plant strategies and their impact on business process outsourcing (BPO) in manufacturing plants. Using survey data from US manufacturing plants, we develop a theoretical framework for studying the antecedents of BPO at the plant level. Our analysis suggests that the level of information technology (IT) investments, as a percentage of plant sales, is positively associated with the outsourcing of plant production activities. We also find that plants with higher levels of in-house software infrastructure are less likely to outsource plant support business processes. Furthermore, we find that plant manufacturing strategies and other plant-specific characteristics, such as production volume and the degree of worker unionization, also have a significant impact on the types of business processes that are outsourced. Managerial and research implications of our research into the antecedents of BPO are summarized.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123610775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
GPS-Synchronized Data Acquisition: Technology Assessment and Research Issues gps同步数据采集:技术评估与研究问题
A. Meliopoulos, G. Cokkinides, F. Galvan, B. Fardanesh
GPS-synchronized equipment (PMUs) is in general higher precision equipment as compared to typical SCADA systems. Conceptually, PMU data are time tagged with accuracy of better than 1 microsecond and magnitude accuracy that is better than 0.1%. This potential performance is not achieved in an actual field installation due to errors from instrumentation channels and system imbalances. Presently, PMU data precision from substation installed devices is practically unknown. On the other hand, specific applications of PMU data require specific accuracy of data. Applications vary from simple system monitoring to wide area protection and control to voltage instability prediction. Each application may have different accuracy requirements. For example for simple system monitoring in steady state highly accurate data may not be critical while for transient instability prediction high precision may be critical. For addressing data precision requirements for a variety of applications, it is necessary to quantify the accuracy of the collected PMU data. We discuss data precision requirements for a variety of applications and we propose a methodology for characterizing data errors. In particular, we propose a new approach for improving data accuracy via estimation methods. The proposed methodology quantifies the expected error of the filtered data. Examples are provided that define the instrumentation requirements for specific applications.
与典型的SCADA系统相比,gps同步设备(pmu)通常具有更高的精度。从概念上讲,PMU数据的时间标记精度优于1微秒,幅度精度优于0.1%。由于仪表通道和系统不平衡的误差,在实际的现场安装中无法实现这种潜在的性能。目前,变电站安装设备的PMU数据精度实际上是未知的。另一方面,PMU数据的特定应用需要特定的数据精度。应用范围从简单的系统监测到广域保护和控制,再到电压不稳定预测。每种应用可能有不同的精度要求。例如,对于稳定状态下的简单系统监测,高精度的数据可能不是关键,而对于瞬态不稳定预测,高精度可能是关键。为了满足各种应用的数据精度要求,有必要量化所收集PMU数据的准确性。我们讨论了各种应用程序的数据精度要求,并提出了一种表征数据误差的方法。特别地,我们提出了一种通过估计方法来提高数据精度的新方法。所提出的方法量化了过滤数据的预期误差。提供了定义特定应用程序的仪器需求的示例。
{"title":"GPS-Synchronized Data Acquisition: Technology Assessment and Research Issues","authors":"A. Meliopoulos, G. Cokkinides, F. Galvan, B. Fardanesh","doi":"10.1109/HICSS.2006.199","DOIUrl":"https://doi.org/10.1109/HICSS.2006.199","url":null,"abstract":"GPS-synchronized equipment (PMUs) is in general higher precision equipment as compared to typical SCADA systems. Conceptually, PMU data are time tagged with accuracy of better than 1 microsecond and magnitude accuracy that is better than 0.1%. This potential performance is not achieved in an actual field installation due to errors from instrumentation channels and system imbalances. Presently, PMU data precision from substation installed devices is practically unknown. On the other hand, specific applications of PMU data require specific accuracy of data. Applications vary from simple system monitoring to wide area protection and control to voltage instability prediction. Each application may have different accuracy requirements. For example for simple system monitoring in steady state highly accurate data may not be critical while for transient instability prediction high precision may be critical. For addressing data precision requirements for a variety of applications, it is necessary to quantify the accuracy of the collected PMU data. We discuss data precision requirements for a variety of applications and we propose a methodology for characterizing data errors. In particular, we propose a new approach for improving data accuracy via estimation methods. The proposed methodology quantifies the expected error of the filtered data. Examples are provided that define the instrumentation requirements for specific applications.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"33 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123591409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
System-Wide Replacement Strategy for Substation Protection and Automation Systems 变电站保护和自动化系统的全系统替换策略
P. Myrda, E. Udren
The protection and control systems in the US utility industry are still primarily composed of electromechanical relays and systems. Over 80 percent of the relays are still electromechanical at Michigan Electric Transmission Company (METC), with only incremental upgrading to microprocessor technology carried out in recent years. Maintenance costs of older equipment are high, and limited non-operational fault data is accessed via modem from the microprocessor relays. METC embarked on a program to develop a business and technical strategy to replace the aging protection and control equipment. This paper describes how an aggressive replacement strategy can be the most cost-effective solution for system-wide upgrading. This strategy and its benefits (from both reliability and financial perspectives) are described using the program to completely replace the protection and control equipment in all 82 of its substations. METC is developing enterprise-level processing of the masses of data to improve operational and business efficiency.
美国公用事业行业的保护和控制系统仍然主要由机电继电器和系统组成。在密歇根电力传输公司(METC),超过80%的继电器仍然是机电的,近年来只有逐步升级到微处理器技术。旧设备的维护成本很高,有限的非操作故障数据通过调制解调器从微处理器继电器访问。METC开始了一项计划,制定商业和技术战略,以取代老化的保护和控制设备。本文描述了一个积极的替换策略如何成为系统范围升级的最具成本效益的解决方案。这一策略及其效益(从可靠性和财务角度来看)是用该方案来描述的,该方案完全取代了其所有82个变电站的保护和控制设备。METC正在开发大量数据的企业级处理,以提高运营和业务效率。
{"title":"System-Wide Replacement Strategy for Substation Protection and Automation Systems","authors":"P. Myrda, E. Udren","doi":"10.1109/HICSS.2006.446","DOIUrl":"https://doi.org/10.1109/HICSS.2006.446","url":null,"abstract":"The protection and control systems in the US utility industry are still primarily composed of electromechanical relays and systems. Over 80 percent of the relays are still electromechanical at Michigan Electric Transmission Company (METC), with only incremental upgrading to microprocessor technology carried out in recent years. Maintenance costs of older equipment are high, and limited non-operational fault data is accessed via modem from the microprocessor relays. METC embarked on a program to develop a business and technical strategy to replace the aging protection and control equipment. This paper describes how an aggressive replacement strategy can be the most cost-effective solution for system-wide upgrading. This strategy and its benefits (from both reliability and financial perspectives) are described using the program to completely replace the protection and control equipment in all 82 of its substations. METC is developing enterprise-level processing of the masses of data to improve operational and business efficiency.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124733700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Blueprint for Enhancing Future Reliability 提高未来可靠性的蓝图
P. A. Fedora
This paper describes the efforts underway at NPCC to enhance system reliability since the August 2003 Blackout, and summarizes how the NERC and the U.S. - Canadian Power System Outage Task Force Recommendations are being addressed in Northeastern North America.
本文描述了自2003年8月停电以来,NPCC为提高系统可靠性所做的努力,并总结了NERC和美国-加拿大电力系统停电工作组建议如何在北美东北部得到解决。
{"title":"A Blueprint for Enhancing Future Reliability","authors":"P. A. Fedora","doi":"10.1109/HICSS.2006.2","DOIUrl":"https://doi.org/10.1109/HICSS.2006.2","url":null,"abstract":"This paper describes the efforts underway at NPCC to enhance system reliability since the August 2003 Blackout, and summarizes how the NERC and the U.S. - Canadian Power System Outage Task Force Recommendations are being addressed in Northeastern North America.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124900499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Approaches to Disclosure Limitation While Answering Queries to a Database: Protecting Numerical Confidential Data against Insider Threat Based on Data or Algorithms 回答数据库查询时披露限制的新方法:保护数字机密数据免受基于数据或算法的内部威胁
R. Garfinkel, R. Gopal, Daniel O. Rice
Confidentiality via Camouflage (CVC) is a practical method for giving unlimited, correct, numerical responses to ad-hoc queries to an on-line database, while not compromising confidential numerical data . Responses are in the form of intervals that are guaranteed to contain the exact answer. Virtually any imaginable query type can be answered and although sharing of query answers among users presents no problem, the threat of insider information is real. In this work we identify two distinct types of insider information, depending on whether the knowledge is of data in the confidential field or of the algorithmic process that is used to answer queries. We show that different realizations of CVC can protect against one type of insider threat or the other, while a combination of realizations can be used if the database administrator is not able to specify the type of threat that is present. Various strategies for dealing with cases where a user poses both types of threats are also presented. Computational experience relates the degradation of answer intervals that can be expected based on the type of threat that is protected against and indicates that, in general, algorithmic threat causes the greatest degradation.
伪装保密性(CVC)是一种实用的方法,可以对在线数据库的特别查询提供无限的、正确的、数字响应,同时不会损害机密的数字数据。响应以保证包含确切答案的间隔形式出现。实际上,任何可以想象到的查询类型都可以得到回答,尽管在用户之间共享查询答案没有问题,但内部信息的威胁是真实存在的。在这项工作中,我们确定了两种不同类型的内幕信息,这取决于知识是关于机密领域的数据还是用于回答查询的算法过程。我们展示了CVC的不同实现可以防止一种类型的内部威胁,而如果数据库管理员无法指定存在的威胁类型,则可以使用多种实现的组合。还介绍了用于处理用户构成两种威胁的各种策略。计算经验将基于所保护的威胁类型可以预期的答案间隔的退化联系起来,并表明,通常情况下,算法威胁导致最大的退化。
{"title":"New Approaches to Disclosure Limitation While Answering Queries to a Database: Protecting Numerical Confidential Data against Insider Threat Based on Data or Algorithms","authors":"R. Garfinkel, R. Gopal, Daniel O. Rice","doi":"10.1109/HICSS.2006.359","DOIUrl":"https://doi.org/10.1109/HICSS.2006.359","url":null,"abstract":"Confidentiality via Camouflage (CVC) is a practical method for giving unlimited, correct, numerical responses to ad-hoc queries to an on-line database, while not compromising confidential numerical data . Responses are in the form of intervals that are guaranteed to contain the exact answer. Virtually any imaginable query type can be answered and although sharing of query answers among users presents no problem, the threat of insider information is real. In this work we identify two distinct types of insider information, depending on whether the knowledge is of data in the confidential field or of the algorithmic process that is used to answer queries. We show that different realizations of CVC can protect against one type of insider threat or the other, while a combination of realizations can be used if the database administrator is not able to specify the type of threat that is present. Various strategies for dealing with cases where a user poses both types of threats are also presented. Computational experience relates the degradation of answer intervals that can be expected based on the type of threat that is protected against and indicates that, in general, algorithmic threat causes the greatest degradation.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129004735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Extracting Useful Information from Security Assessment Interviews 从安全评估访谈中提取有用信息
J. Stanton, Isabelle J. Fagnot
We conducted N=68 interviews with managers, employees, and information technologists in the course of conducting security assessments of 15 small- and medium-sized organizations. Assessment interviews provide a rich source of information about the security culture and norms of an organization; this information can complement and contextualize the traditional sources of security assessment data, which generally focus on the technical infrastructure of the organization. In this paper we began the process of systematizing audit interview data through the development of a closed vocabulary pertaining to security beliefs. We used a ground-up approach to develop a list of subjects, verbs, objects, and relationships among them that emerged from the audit interviews. We discuss implications for improving the processes and outcomes of security auditing.
在对15个中小型组织进行安全评估的过程中,我们对管理人员、员工和信息技术人员进行了N=68次访谈。评估访谈提供了关于组织的安全文化和规范的丰富信息来源;这些信息可以补充和上下文化安全评估数据的传统来源,后者通常关注于组织的技术基础设施。在本文中,我们通过开发与安全信念相关的封闭词汇表,开始了系统化审计访谈数据的过程。我们采用了一种自下而上的方法,从审计访谈中得出了一个由主语、动词、宾语以及它们之间的关系组成的列表。我们将讨论改进安全审计过程和结果的含义。
{"title":"Extracting Useful Information from Security Assessment Interviews","authors":"J. Stanton, Isabelle J. Fagnot","doi":"10.1109/HICSS.2006.180","DOIUrl":"https://doi.org/10.1109/HICSS.2006.180","url":null,"abstract":"We conducted N=68 interviews with managers, employees, and information technologists in the course of conducting security assessments of 15 small- and medium-sized organizations. Assessment interviews provide a rich source of information about the security culture and norms of an organization; this information can complement and contextualize the traditional sources of security assessment data, which generally focus on the technical infrastructure of the organization. In this paper we began the process of systematizing audit interview data through the development of a closed vocabulary pertaining to security beliefs. We used a ground-up approach to develop a list of subjects, verbs, objects, and relationships among them that emerged from the audit interviews. We discuss implications for improving the processes and outcomes of security auditing.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129040408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1