Mississippi State University

Displaying 1-16 of 16 results

  • White Papers // Jul 2012

    Trustworthy TCB for DNS Servers

    A simple atomic relay function is proposed as a minimal Trusted Computing Base (TCB) for a Domain Name System (DNS) server. This TCB, composed of a fixed sequence of logical and cryptographic hash operations, can be amplified to ensure that a DNS server cannot violate rules. The paper also outlines...

    Provided By Mississippi State University

  • White Papers // Jun 2011

    Multiple Criteria Decision Support for Software Reuse: A Case Study

    In practice, many factors must be considered and balanced when making software reuse decisions. However, few empirical studies exist that leverage practical techniques to support decision-making in software reuse. This paper reports a case study that applied SMART (Simple Multi-Attribute Rating Technique) to a company that considered reuse as an...

    Provided By Mississippi State University

  • White Papers // May 2011

    TraCter: A Tool for Candidate Traceability Link Clustering

    Automated tracing tools employ Information Retrieval (IR) methods to recover traceability links between software artifacts. A large body of research is available on the back-end design of such tools, including artifacts indexing and the underlying IR mechanism. In contrast, less attention has been paid to the front-end presentation of the...

    Provided By Mississippi State University

  • White Papers // Apr 2011

    Capacity Scaling of Multihop Cellular Networks

    Wireless cellular networks are large-scale networks in which asymptotic capacity investigation is no longer a cliche. A substantial body of work has been carried out to improve the capacity of cellular networks by introducing ad hoc communications, resulting in the so-called multihop cellular networks. Most of the previous research allows...

    Provided By Mississippi State University

  • White Papers // Mar 2011

    Faceted Navigation for Software Exploration

    Much of developers' time is spent in exploring and understanding an unfamiliar software space. In this paper, the authors present a novel approach that characterizes the code fragments along several orthogonal dimensions in order for developers to navigate complex software spaces in a flexible manner. Central to their approach are...

    Provided By Mississippi State University

  • White Papers // Feb 2011

    Multimedia Database Applications: Issues and Concerns for Classroom Teaching

    The abundance of multimedia data and information is challenging educators to effectively search, browse, access, use, and store the data for their classroom teaching. However, many educators could still be accustomed to teaching or searching for information using conventional methods, but often the conventional methods may not function well with...

    Provided By Mississippi State University

  • White Papers // Nov 2010

    Leveraging a Minimal Trusted Computing Base for Securing On-Demand MANET Routing Protocols

    The authors propose an approach to secure on-demand Mobile Ad hoc NETwork (MANET) routing protocols by leveraging low-complexity Trustworthy MANET Modules (TMM). Such TMMs, which perform some trivial hard-wired functions involving simple logical and hash operations, can be realized at low cost. They describe the functionality of such TMMs to...

    Provided By Mississippi State University

  • White Papers // Nov 2010

    Obtaining Non-Repudiable Proof of Active Attacks in DSR

    Many secure MANET routing protocols have been proposed in the literature which employ non repudiable cryptographic authentication. However, they have not been explicitly designed to provide Non repudiable Proof of Active Attacks (NPAA). For example, Ariadne with Digital Signatures (ADS) is a secure extension of DSR which requires every node...

    Provided By Mississippi State University

  • White Papers // Oct 2010

    A Token-Based Access Control System for RDF Data in the Clouds

    The Semantic Web is gaining immense popularity - and with it, the Resource Description Framework (RDF) broadly used to model Semantic Web content. However, access control on RDF stores used for single machines has been seldom discussed in the literature. One significant obstacle to using RDF stores defined for single...

    Provided By Mississippi State University

  • White Papers // Oct 2010

    A Retrofit Network Transaction Data Logger and Intrusion Detection System for Transmission and Distribution Substations

    SCADA systems are widely used in electricity generation, distribution, and transmission control systems. NERC CIP 002-009 requires bulk electric providers to secure critical cyber assets electronically and physically. Transmission and distribution substations contain cyber critical assets including Remote Terminal Units (RTU), Intelligent Electronic Devices (IED) such as relays, Phasor Measurement...

    Provided By Mississippi State University

  • White Papers // Aug 2010

    Minimal Trusted Computing Base for MANET Nodes

    Securing any MANET routing protocol requires measures to ensure that routing information advertised by a node (to its neighbors) is consistent with routing information assimilated by a node (from its neighbors). The authors investigate a minimal Trusted Computing Base (TCB) for MANET nodes to ensure this requirement. They outline low...

    Provided By Mississippi State University

  • White Papers // Jun 2010

    An Experimental Investigation of Reusable Requirements Retrieval

    Building a requirements library allows practitioners to better leverage reuse since they can work on the abstractions closer to the software system's initial concepts. However, little research has explored how to retrieve requirements profiles to answer user's queries to the library. This paper presents an experimental investigation of retrieving functional...

    Provided By Mississippi State University

  • White Papers // May 2010

    Soft Systems in Requirements Engineering: A Case Study

    Soft systems methodology should offer substantial benefits in managing expectations and requirements for a software-intensive system, but the benefits have not yet been examined empirically. This paper reports an exploratory case study investigating the hypothesis that "Soft systems approach would identify all the flaws in requirements practices and suggest improvements...

    Provided By Mississippi State University

  • White Papers // Apr 2010

    Variability Modeling for Product Line Viewpoints Integration

    Modern software product line development uses viewpoints to capture the needs of various stakeholders without resorting to a single complex model. Comparing and integrating different viewpoints help to gain insights into the product line and to derive products. Recent research has proposed conflict resolution rules for handling variability in the...

    Provided By Mississippi State University

  • White Papers // Apr 2010

    Collision Resistant Temporally Ordered Routing Algorithm

    A broad class of Mobile Ad hoc NETwork (MANET) applications will require every mobile node in a connected subnet to establish persistent paths with a single sink or gateway or command-post. Temporally Ordered Routing Algorithm (TORA) is the only MANET routing protocol which has been explicitly designed to facilitate such...

    Provided By Mississippi State University

  • White Papers // Mar 2009

    Private Logical Neighborhoods for Ad Hoc Networks

    In wired networks routers are aware of all other routers to which they are directly connected. In contrast, in Mobile Ad hoc NETworks (MANETs) a mobile router (node) will not be aware of all nodes within its transmission range. While many MANET routing protocols have been proposed in the literature,...

    Provided By Mississippi State University

  • White Papers // Feb 2011

    Multimedia Database Applications: Issues and Concerns for Classroom Teaching

    The abundance of multimedia data and information is challenging educators to effectively search, browse, access, use, and store the data for their classroom teaching. However, many educators could still be accustomed to teaching or searching for information using conventional methods, but often the conventional methods may not function well with...

    Provided By Mississippi State University

  • White Papers // Nov 2010

    Obtaining Non-Repudiable Proof of Active Attacks in DSR

    Many secure MANET routing protocols have been proposed in the literature which employ non repudiable cryptographic authentication. However, they have not been explicitly designed to provide Non repudiable Proof of Active Attacks (NPAA). For example, Ariadne with Digital Signatures (ADS) is a secure extension of DSR which requires every node...

    Provided By Mississippi State University

  • White Papers // Nov 2010

    Leveraging a Minimal Trusted Computing Base for Securing On-Demand MANET Routing Protocols

    The authors propose an approach to secure on-demand Mobile Ad hoc NETwork (MANET) routing protocols by leveraging low-complexity Trustworthy MANET Modules (TMM). Such TMMs, which perform some trivial hard-wired functions involving simple logical and hash operations, can be realized at low cost. They describe the functionality of such TMMs to...

    Provided By Mississippi State University

  • White Papers // Apr 2010

    Collision Resistant Temporally Ordered Routing Algorithm

    A broad class of Mobile Ad hoc NETwork (MANET) applications will require every mobile node in a connected subnet to establish persistent paths with a single sink or gateway or command-post. Temporally Ordered Routing Algorithm (TORA) is the only MANET routing protocol which has been explicitly designed to facilitate such...

    Provided By Mississippi State University

  • White Papers // Aug 2010

    Minimal Trusted Computing Base for MANET Nodes

    Securing any MANET routing protocol requires measures to ensure that routing information advertised by a node (to its neighbors) is consistent with routing information assimilated by a node (from its neighbors). The authors investigate a minimal Trusted Computing Base (TCB) for MANET nodes to ensure this requirement. They outline low...

    Provided By Mississippi State University

  • White Papers // Mar 2009

    Private Logical Neighborhoods for Ad Hoc Networks

    In wired networks routers are aware of all other routers to which they are directly connected. In contrast, in Mobile Ad hoc NETworks (MANETs) a mobile router (node) will not be aware of all nodes within its transmission range. While many MANET routing protocols have been proposed in the literature,...

    Provided By Mississippi State University

  • White Papers // Apr 2011

    Capacity Scaling of Multihop Cellular Networks

    Wireless cellular networks are large-scale networks in which asymptotic capacity investigation is no longer a cliche. A substantial body of work has been carried out to improve the capacity of cellular networks by introducing ad hoc communications, resulting in the so-called multihop cellular networks. Most of the previous research allows...

    Provided By Mississippi State University

  • White Papers // Oct 2010

    A Token-Based Access Control System for RDF Data in the Clouds

    The Semantic Web is gaining immense popularity - and with it, the Resource Description Framework (RDF) broadly used to model Semantic Web content. However, access control on RDF stores used for single machines has been seldom discussed in the literature. One significant obstacle to using RDF stores defined for single...

    Provided By Mississippi State University

  • White Papers // May 2011

    TraCter: A Tool for Candidate Traceability Link Clustering

    Automated tracing tools employ Information Retrieval (IR) methods to recover traceability links between software artifacts. A large body of research is available on the back-end design of such tools, including artifacts indexing and the underlying IR mechanism. In contrast, less attention has been paid to the front-end presentation of the...

    Provided By Mississippi State University

  • White Papers // Jun 2011

    Multiple Criteria Decision Support for Software Reuse: A Case Study

    In practice, many factors must be considered and balanced when making software reuse decisions. However, few empirical studies exist that leverage practical techniques to support decision-making in software reuse. This paper reports a case study that applied SMART (Simple Multi-Attribute Rating Technique) to a company that considered reuse as an...

    Provided By Mississippi State University

  • White Papers // Mar 2011

    Faceted Navigation for Software Exploration

    Much of developers' time is spent in exploring and understanding an unfamiliar software space. In this paper, the authors present a novel approach that characterizes the code fragments along several orthogonal dimensions in order for developers to navigate complex software spaces in a flexible manner. Central to their approach are...

    Provided By Mississippi State University

  • White Papers // Jun 2010

    An Experimental Investigation of Reusable Requirements Retrieval

    Building a requirements library allows practitioners to better leverage reuse since they can work on the abstractions closer to the software system's initial concepts. However, little research has explored how to retrieve requirements profiles to answer user's queries to the library. This paper presents an experimental investigation of retrieving functional...

    Provided By Mississippi State University

  • White Papers // Apr 2010

    Variability Modeling for Product Line Viewpoints Integration

    Modern software product line development uses viewpoints to capture the needs of various stakeholders without resorting to a single complex model. Comparing and integrating different viewpoints help to gain insights into the product line and to derive products. Recent research has proposed conflict resolution rules for handling variability in the...

    Provided By Mississippi State University

  • White Papers // May 2010

    Soft Systems in Requirements Engineering: A Case Study

    Soft systems methodology should offer substantial benefits in managing expectations and requirements for a software-intensive system, but the benefits have not yet been examined empirically. This paper reports an exploratory case study investigating the hypothesis that "Soft systems approach would identify all the flaws in requirements practices and suggest improvements...

    Provided By Mississippi State University

  • White Papers // Oct 2010

    A Retrofit Network Transaction Data Logger and Intrusion Detection System for Transmission and Distribution Substations

    SCADA systems are widely used in electricity generation, distribution, and transmission control systems. NERC CIP 002-009 requires bulk electric providers to secure critical cyber assets electronically and physically. Transmission and distribution substations contain cyber critical assets including Remote Terminal Units (RTU), Intelligent Electronic Devices (IED) such as relays, Phasor Measurement...

    Provided By Mississippi State University

  • White Papers // Jul 2012

    Trustworthy TCB for DNS Servers

    A simple atomic relay function is proposed as a minimal Trusted Computing Base (TCB) for a Domain Name System (DNS) server. This TCB, composed of a fixed sequence of logical and cryptographic hash operations, can be amplified to ensure that a DNS server cannot violate rules. The paper also outlines...

    Provided By Mississippi State University