Displaying 1 - 10 of 17 results

  • Multilateral Approaches for Improving Global Security in Cyberspace

    White Papers // Nov 2012 // provided by MITRE

    Effective cyber security requires that national governments, private companies, and non-governmental organizations work together to understand threats in cyberspace and to share information and capabilities for mitigating those threats. This is necessary because cyberspace is an interconnected environment that provides tremendous benefits to nations, organizations and individuals. Unfortunately, this environment ...

    Download Now
  • Minimum-Cost First-Push-Then-Pull Gossip Algorithm

    White Papers // Mar 2012 // provided by MITRE

    In this paper, the authors study the communication overhead of gossip-based information dissemination algorithms. Among basic variants of gossip algorithm push is most efficient in the early rounds while, in contrast, pull becomes more efficient in the later rounds. Therefore, a cost-efficient gossip algorithm needs to combine the advantages of ...

    Download Now
  • Information Security in the Clouds

    White Papers // Jun 2011 // provided by MITRE

    From the perspective of information security, cloud computing elicits one of two responses: Security issues make cloud computing very risky and Security issues are more perceptual than prohibitive. Paradoxically, both positions have merit. Along with the benefits, this new model of computing resource delivery presents Federal IT leaders and security ...

    Download Now
  • Enabling Rich Discovery of Web Services by Projecting Weak Semantics From Structural Specifications

    White Papers // Apr 2011 // provided by MITRE

    Although the authors would prefer using defined ontologies that express the domains and specifications of web services, and thus more easily discover and compose these, they know that in the mainstream world represented by the US Department of Defense they will not have those ontologies available soon. In the meantime ...

    Download Now
  • Building Secure, Resilient Architectures for Cyber Mission Assurance

    White Papers // Jan 2011 // provided by MITRE

    Today's Information Technology (IT) environments are increasingly subject to escalating cyber attacks. Cyber threats vary widely in sophistication, intent, and the consequences to the targeted systems and networks. The range of attackers extends from users who unintentionally damage systems to hackers, to cyber criminals, to full-scale cyber spies and cyber ...

    Download Now
  • Feasibility Analysis of GPS III Integrated With an Inertial System to Provide Cat IIIb Services

    White Papers // Dec 2010 // provided by MITRE

    This paper describes a follow-on analysis of the potential for an integrated GPS III/Inertial Reference System (IRS) to provide CATegory IIIB (CAT IIIB) precision approach and landing services. Three different levels of GPS III capability are considered: one without cross-link (GPS IIIA), one with cross-link but without improved integrity assurance ...

    Download Now
  • Toward an Ontology Architecture for Cyber-Security Standards

    White Papers // Oct 2010 // provided by MITRE

    The rapid growth in magnitude and complexity of Cyber-Security Information and Event Management (CSIEM) has ignited a trend toward security automation and information exchange standards. Making Security Measurable (MSM) references a collection of open community standards for the common enumeration, expression and reporting of cyber-security-related information. While MSM-related standards are ...

    Download Now
  • How Do You Assess Your Organization's Cyber Threat Level?

    White Papers // Sep 2010 // provided by MITRE

    In the Cyber Prep methodology, an organization determines its target level of preparedness against cyber threats, including the advanced persistent threat, based on its assessment of the level of the adversary it faces. That is, an organization calibrates its cyber security measures, as well as its cyber security governance, to ...

    Download Now
  • CYBEX - The Cybersecurity Information Exchange Framework

    White Papers // Sep 2010 // provided by MITRE

    The cybersecurity information exchange framework, known as CYBEX, is currently undergoing its first iteration of standardization efforts within ITU-T. The framework describes how cybersecurity information is exchanged between cybersecurity entities on a global scale and how the exchange is assured. The worldwide implementation of the framework will eventually minimize the ...

    Download Now
  • Cloud SLA Considerations for the Government Consumer

    White Papers // Sep 2010 // provided by MITRE

    During the past year, much work has been done to provide a set of terms and definitions that will enable the common discussion of cloud computing. The National Institute of Standards and Technology (NIST) have defined emerging cloud service models to include Infrastructure as a Service (IaaS), Platform as a ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?