Sri Durga Group

Displaying 1-8 of 8 results

  • White Papers // Aug 2012

    SPADE: Support for Provenance Auditing in Distributed Environments

    SPADE is an open source software infrastructure for data provenance collection and management. The underlying data model used throughout the system is graph-based, consisting of vertices and directed edges that are modeled after the node and relationship types described in the Open Provenance Model. The system has been designed to...

    Provided By Sri Durga Group

  • White Papers // Jul 2011

    Ensuring Security and Availability Through Model-Based Cross-Layer Adaptation

    Situation- and resource-aware security is essential for the process control systems, composed of networked entities with sensors and actuators, that monitor and control the national critical infrastructure. However, security cannot be addressed at a single layer because of the inherent dependencies and tradeoffs among crosscutting concerns. Techniques applied at one...

    Provided By Sri Durga Group

  • White Papers // Jun 2011

    Policy-Based Integration of Provenance Metadata

    Reproducibility has been a cornerstone of the scientific method for hundreds of years. The range of sources from which data now originates, the diversity of the individual manipulations performed, and the complexity of the orchestrations of these operations all limit the reproducibility that a scientist can ensure solely by manually...

    Provided By Sri Durga Group

  • White Papers // May 2011

    On the (f)utility of Untrusted Data Sanitization

    Data sanitization has been studied in the context of architectures for high assurance systems, language-based information flow controls, and privacy-preserving data publication. A range of sanitization strategies has been developed to address the wide variety of data content and contexts that arise in practice. It is therefore tempting to separate...

    Provided By Sri Durga Group

  • White Papers // Aug 2010

    Fine-Grained Tracking of Grid Infections

    Previous distributed anomaly detection efforts have operated on summary statistics gathered from each node. This has the advantage that the audit trail is limited in size since event sets can be succinctly represented. While this minimizes the bandwidth consumed and helps scale the detection to a large number of nodes,...

    Provided By Sri Durga Group

  • White Papers // Jun 2010

    Policy-Based Data Downgrading: Toward a Semantic Framework and Automated Tools to Balance Need-to-Protect and Need-to-Share Policies

    The authors describe a new paradigm for articulating need-to-protect and need-to-share policies that shows promise for enabling automated derivation of the downgrading rule-sets needed to comply with these policies in systems that share data. This new paradigm is based on fine-grained semantic policy specifications in terms of context, content, Purpose,...

    Provided By Sri Durga Group

  • White Papers // Jun 2010

    Detection, Correlation, and Visualization of Attacks Against Critical Infrastructure Systems

    Digital control systems are essential to the safe and efficient operation of a variety of industrial processes in sectors such as electric power, oil and gas, water treatment, and manufacturing. Modern control systems are increasingly connected to other control systems as well as to corporate systems. They are also increasingly...

    Provided By Sri Durga Group

  • White Papers // May 2009

    Steps Toward Managing Lineage Metadata in Grid Clusters

    The lineage of a piece of data is of utility to a wide range of domains. Several application-specific extensions have been built to facilitate tracking the origin of the output that the software produces. In the quest to provide such support to extant programs, efforts have been recently made to...

    Provided By Sri Durga Group

  • White Papers // May 2009

    Steps Toward Managing Lineage Metadata in Grid Clusters

    The lineage of a piece of data is of utility to a wide range of domains. Several application-specific extensions have been built to facilitate tracking the origin of the output that the software produces. In the quest to provide such support to extant programs, efforts have been recently made to...

    Provided By Sri Durga Group

  • White Papers // Jun 2010

    Policy-Based Data Downgrading: Toward a Semantic Framework and Automated Tools to Balance Need-to-Protect and Need-to-Share Policies

    The authors describe a new paradigm for articulating need-to-protect and need-to-share policies that shows promise for enabling automated derivation of the downgrading rule-sets needed to comply with these policies in systems that share data. This new paradigm is based on fine-grained semantic policy specifications in terms of context, content, Purpose,...

    Provided By Sri Durga Group

  • White Papers // Aug 2010

    Fine-Grained Tracking of Grid Infections

    Previous distributed anomaly detection efforts have operated on summary statistics gathered from each node. This has the advantage that the audit trail is limited in size since event sets can be succinctly represented. While this minimizes the bandwidth consumed and helps scale the detection to a large number of nodes,...

    Provided By Sri Durga Group

  • White Papers // Jun 2011

    Policy-Based Integration of Provenance Metadata

    Reproducibility has been a cornerstone of the scientific method for hundreds of years. The range of sources from which data now originates, the diversity of the individual manipulations performed, and the complexity of the orchestrations of these operations all limit the reproducibility that a scientist can ensure solely by manually...

    Provided By Sri Durga Group

  • White Papers // Jul 2011

    Ensuring Security and Availability Through Model-Based Cross-Layer Adaptation

    Situation- and resource-aware security is essential for the process control systems, composed of networked entities with sensors and actuators, that monitor and control the national critical infrastructure. However, security cannot be addressed at a single layer because of the inherent dependencies and tradeoffs among crosscutting concerns. Techniques applied at one...

    Provided By Sri Durga Group

  • White Papers // May 2011

    On the (f)utility of Untrusted Data Sanitization

    Data sanitization has been studied in the context of architectures for high assurance systems, language-based information flow controls, and privacy-preserving data publication. A range of sanitization strategies has been developed to address the wide variety of data content and contexts that arise in practice. It is therefore tempting to separate...

    Provided By Sri Durga Group

  • White Papers // Aug 2012

    SPADE: Support for Provenance Auditing in Distributed Environments

    SPADE is an open source software infrastructure for data provenance collection and management. The underlying data model used throughout the system is graph-based, consisting of vertices and directed edges that are modeled after the node and relationship types described in the Open Provenance Model. The system has been designed to...

    Provided By Sri Durga Group

  • White Papers // Jun 2010

    Detection, Correlation, and Visualization of Attacks Against Critical Infrastructure Systems

    Digital control systems are essential to the safe and efficient operation of a variety of industrial processes in sectors such as electric power, oil and gas, water treatment, and manufacturing. Modern control systems are increasingly connected to other control systems as well as to corporate systems. They are also increasingly...

    Provided By Sri Durga Group