Advanced search Help
Resource Type or Special Collection is Theses & Research Reports
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Execution Policies Research and Implementation
This research studied the application of a software-based ring execution policy, the type of which has previously been implemented via hardware mechanisms, to an open source operating system. Such an execution policy is orthogonal to, and may be used in conjunction with, other mandatory (viz, secrecy, integrity) and discretionary policies. It allows processes running with otherwise similar privileges (such as the root user, or secrecy attributes) to be differentiated with respect to priority or privilege regarding system resources and execution. The authors have found that it is possible to construct a mandatory ring execution policy whose primary function is to restrict subjects from executing certain file system objects, and that this may result in a more coherent and manageable policy than what can be expected from various discretionary (e.g., policy-bypass or privilege-grouping) mechanisms.
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Levin, Timothy E.; Clark, Paul C.
2003-02
-
Policy Enforced Remote Login
This document describes enhancements made to the popular OpenSSH authentication service to restrict the execution of OpenSSH processes by applying a ring-based program execution policy. It also applies a label-based mandatory access control (MAC) policy to limit a user's login shell to run at a specific security level within the user's authorized security clearance range. While still rudimentary, these enhancements illustrate the usefulness of a ring-based execution mechanism for restricting program behavior.
Naval Postgraduate School (U.S.)
Levin, Timothy E.; Nguyen, Thuy D.
2003-02
-
Review of Arabic Software and Information Technology Jobs in the Middle East
The Microsoft Office suite of applications software including Internet Explorer is available in Arabic and should support Farsi and Urdu soon. This document outlines why running an office computer in Arabic is possible. It also outlines why running an office computer in other languages of interest such as Farsi, Urdu or Pushtun is much more difficult because developers of software are not pursuing these language groups as hard as they are Arabic. New computer standards, such as Unicode character sets, will continue to improve the ability of the graphical user interface shell and selected applications to support a wide variety of languages.
Naval Postgraduate School (U.S.)
Palmer, Jess
2003
-
Demonstration of Quality of Security Service Awareness for IPsec
Quality of Security Service (QoSS) refers to the ability to provide security services according to user and system preferences, policies and conditions. Thus, security can be managed as a responsive "service" for which quantitative measurement of service "efficiency" is possible. This document presents a demonstration on how a specific underlying security mechanism, IPsec, can be modulated to provide different levels for security in response to changing QoSS requirements. Section 1 provides a demonstration of QoSS awareness for IPsec. Section 2 provides some Psec background and describes how QoSS notions can be linked to this security mechanism. Section 3 gives a brief description of the demo's functionality. Section 4 discusses the IPsec's Security Policy Database and how to put rules into it. Sections 5 and 6 discuss Internet Key Exchange daemon's configuration and policy issues. Section 7 presents the functionality of the QoSS management module. Display of traffic data and of established security parameters is discussed in sections 8 and 9. Section 10 contains a detailed list of demonstration steps and files.
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Levin, Timothy E.; Spyropoulou, Evdoxia
2002-09
-
Information Warfare & Information Operations (IW/IO): A Bibliography
This bibliography, maintained by the Dudley Knox Library at Naval Postgraduate School, contains a compilation of links to books, periodicals, and documents, theses and technical reports on a variety of information warfare and operations topics. Also included are links to doctrinal publications, bibliographies, and internet sites.
Naval Postgraduate School (U.S.). Dudley Knox Library
Marlatt, Greta E.
-
Optimizing Electric Grid Design under Asymmetric Threat
"This research develops analytical techniques to help improve the security of electric power grids subject to disruptions caused by terrorist attacks (and even by natural disasters). Our new bilevel mathematical models and optimization techniques identify critical system components (e.g., transmission lines, generators, transformers, and other power system elements) by creating maximally disruptive attack plans for terrorists who are assumed to have limited offensive resources. Results for standard, reliability-benchmark, test networks are presented. We also discuss trilevel models for actually selecting a set of budget-limited system upgrades that minimizes the potential for disruption."
Naval Postgraduate School (U.S.)
Salmeron, Javier; Wood, Kevin; Baldick, Ross
2003-02
-
Applicability Assessment for Maritime Operations Simulation (MarOpsSim) - Phase II
"The Maritime Operations Simulation (MarOpsSim) is a modern discrete event simulation being used by the U.S. Coast Guard. MarOpsSim was originally developed by the U.S. Coast Guard Research & Development Center to examine elements of the Search & Rescue and Law Enforcement missions. MarOpsSim is now being extended to encompass all 14 Deepwater missions to support the Deepwater Acquisition. This document reports the results of the Core Verification and Validation (Core V&V) effort conducted at the Naval Postgraduate School by the authors. Based on the analysis and assessment made so far, it can be concluded that MarOpsSim is a modeling tool that can be used to reasonably represent the characteristics and behavior of the Coast Guard against the demands of, and in the operating environments described in, the Modeling and Simulation Master Plan (MSMP). Furthermore, MarOpsSim produces output that can be summarized and analyzed to consistently generate Coast Guard system performance measures also described in the MSMP."
Naval Postgraduate School (U.S.)
Halwachs, Thomas E.; Buss, Arnold H.
2003-02
-
Demonstration of Linked UAV Observations and Atmospheric Model Predictions in Chem/Bio Attach Response
"Faculty and staff from the Departments of Meteorology and Aeronautics evaluated the integration of components for a near-real time decision aid designed to enable small units to respond in a focused way to a ChemBio attack. This effort included the field-testing of an atmospheric dispersion prediction model, an instrumented UAV for collecting meteorological data, and the means for linking the UAV data to real-time dispersion prediction. The primary modeling effort focused on an adaptation of the "Wind On Constant Streamline Surfaces" (WOCSS) model developed to run on a small computer with input from an external mesoscale model (MM5). The combined models were run for approximately one month for the region surrounding Camp Roberts, CA In situ meteorological data were collected at the Camp Roberts airfield from 2 October to 5 November 2002 to validate the model predictions. The model results showed promise in capturing the diurnal evolution of near-surface temperatures that drive the local circulations in the warm season. Linking WOCSS with the atmospheric mesoscale model forecasts showed no significant improvement in wind forecasts when compared to the mesoscale model wind forecasts alone. Linking WOCSS to the trajectory visualization code revealed that vertical wind component estimates needed to be improved. The linked model/UAV demonstration of 7-9 October 2002 tested the synthesis of UAV measurements and dispersion model predictions. Although a UAV mishap occurred soon after the demonstration began, the instrumented UAV performance during this early period and in preliminary flight tests indicate that the hardware/software architecture for UAV data collection and its linkage with real-time dispersion prediction will be successful. Overall, the demonstration proved the feasibility of linking a coarse grid mesoscale model to a fine-scale diagnostic wind model for producing fine resolution forward and backward trajectories."
Naval Postgraduate School (U.S.)
Kaminer, Isaac; Davidson, Kenneth L.; Miller, Douglas . . .
2003-01-21
-
ASOCC Capabilities to Meet MTAC Current and Future Requirements
The Area Security Command and Control System (ASOCC) has been designed to support Command and Control information and decision making during a terrorist event. It is being installed in a number of DoD facilities, including the Multi-Threat Alert Center in NCIS. This report determines the support ASOCC can provide for current and possible future MTAC missions.
Naval Postgraduate School (U.S.)
Schacher, Gordon; Gallup, Shelley
2003-08
-
Closing the Gaps: A Strategy for Gaining the Initiative in the War on Terror
The purpose of this document is to propose a new way of operating for special operations forces. In a time when small units of action can accomplish incredible feats if given the opportunity, it is time to change from an organization that deploys large joint task forces to one that is capable of self synchronizing at the lowest levels and acting without the presence of large command and control structures. In short, this proposal is about optimizing human resources and creating new economies of force. Four critical areas are addressed. These four areas make up the framework for this proposal. Section one argues the best mechanism to fuse the global assets with regional assets is a "fused" theater SOC. There is no overriding reason to change command relationships, only the need to be able to task regional assets and fuse them with global assets (human or technical) to quickly respond to threats and, more importantly-to seize fleeting opportunities. Section two explains that normal mil-to-mil relationships can be exploited to meet the challenges of the GWOT. Section three describes the technical means associated with a regionally managed global network. Finally, section four discusses the need to integrate information operations into an overall strategy for a theater. These information operations will incorporate cohesive and divisive means.
Naval Postgraduate School (U.S.)
Simmons, Jeremy; Manuel, Chris
2003
-
ASOCC Demonstration - System Evaluation for NCIS Use
The Area Security Operations Command and Control system is being tested for Homeland Security applications through an ACTD. A multi-agency, nation-wide, demonstration of the system has been conducted. This report presents an evaluation of the system for Naval Criminal Investigative Service use using results from the demonstration.
Naval Postgraduate School (U.S.)
Schacher, Gordon; Gallup, Shelley
2003-05-28
-
Modeling and Analysis of Uncertain Time-Critical Tasking Problems (UTCTP)
This paper considers modeling and operational analysis of a generic asymmetric service-system situation in which (a) Red agents, potentially threatening, but possibly requiring assistance, arrive according to some partially known and possibly changing pattern in time and space; and (b) Reds are impatient: have effectively limited unknown deadlines or times of availability for Blue service, i.e., detection, classification, and attack in a military setting, or emergency assistance in other settings, such as medical care. This paper discusses various service options by Blue service agents and devises several approximations allowing one to compute efficiently proportions of tasks of different types that are successfully served or, more generally, if different rewards are associated with different types of tasks, the percentage of the possible reward gained. The paper suggests a heuristic policy for a Blue server to select the next task to perform and to decide how much time to allocate to that service. The paper also discusses this and related policies for a number of specific examples.
Naval Postgraduate School (U.S.)
Gaver, Donald P.; Jacobs, Patricia A.; Samorodnitsky, Gennady
2003-11
-
Unmanned Vehicle Distributed Sensor Management and Information Exchange Demonstration
On 24 Feb 2004 the Naval Postgraduate School, Commander, THIRD Fleet staff, and AKSI Solutions, LLC, conducted a demonstration for information exchange from a local network of distributed sensors, to a remote decision-making node. The goal was to establish connectivity between the two nodes, assess quality of relayed data transmission from distributed sensors, and determine viability of the technology for future testing and evaluation of distributed sensor information exchange for maritime missions. The demonstration brought to light the impact of limited bandwidth for data flow, dependence of information quality on collection management, and the need for architecture to support the recognized maritime picture information exchange. This paper describes the demonstration, expectations, outcomes, and implications for follow-on testing, sensor management applications, information exchange, and use of prototype systems that support emerging technologies.
Naval Postgraduate School (U.S.)
Gottfried, Russell; Woolsey, Aaron L.
2004-03
-
Maritime Domain Protection Task Force Project Update (May 2004)
This document reviews several research initiatives under the NPS Maritime Domain Protection Task Force (MDP-TF), which investigates issues concerning the protection of the United States, its vessels, and citizens, against terrorist threats originating from the maritime domain. This document reviews the MDP system architecture design process, threat and vulnerability assessment, maritime domain awareness, maritime domain protection gaming laboratory, applied at-sea technology, and additional task force news.
Naval Postgraduate School (U.S.)
Kline, Jeffrey E.
2004-05
-
Fleet Battle Experiment Juliet Final Summary Report
This document is the Final Summary Report, Reconstruction and Analysis Report and Appendices of data collection, analysis and results from Fleet Battle Experiment Juliet (conducted July and August 2002). A primary goal of the experiment was to enable commanders to make fast, accurate planning and execution decisions. The range of information-related objectives has been broad, including battlefield situation, information accuracy, timeliness, dissemination and display, and the processes by which the information is used for decision making.
Naval Postgraduate School (U.S.)
Schacher, Gordon; Gallup, Shelley; Jensen, Jack
2003-04
-
Lanchester-Type Models of Warfare, Volume I
This monograph is a comprehensive treatise on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide an introduction to and current- state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the modeling of force-on-force attrition over the complete spectrum of combat operations, from combat between platoon-sized units through theater-level air-ground combat. This material should be of interest primarily to individuals concerned with defense planning, quantitative aspects of military analysis, military OR, war gaming, or combat modeling, although it may also be of interest to the reader concerned with the modeling and analysis of other dynamic systems. It should also be of interest to the concerned citizen who is interested in the foundations for defense analysis and has the appropriate technical background.
Naval Postgraduate School (U.S.)
Taylor, James G.
1980-10
-
Phase I Report on Intelligent Software Decoys: Technical Feasibility and Institutional Issues in the Context of Homeland Security
"The purpose of this project is to explore the technical feasibility and institutional issues associated with applying software-based deception techniques as part of Homeland defense. At present, we refer to the embodiment of software-based deception as intelligent software decoys, although this name may change in the next phase of our research.' The key idea that we are pursuing is that software-based deception can be used to harden software assets against attack. An important novel aspect of our research is that we introduce the concept of conducting counterintelligence and intelligently employing countermeasures in cyberspace via software-based deception. The owners of computing assets may have to deploy intelligent software decoys with such capabilities in order to counter attacks conducted by technology-savvy terrorists and criminals, in addition to information warriors from rogue2 or enemy nation-states; conventional countermeasures will likely be ineffective against the sophisticated arsenal of cyber weapons at the disposal of such attackers, and any countermeasure will be difficult to deploy without reliable counterintelligence, particularly if the users of countermeasures intend to avoid becoming cyber war criminals."
Naval Postgraduate School (U.S.)
Michael, James B.; Rowe, Neil C.
2002-12-10
-
Capture-the-Flag: Learning Computer Security under Fire
"In this paper, we describe the Capture-the-Flag (CTF) activity and argue that it contributes to a necessary component of the computer security curriculum. This component is the study of software vulnerability investigation. It is currently not properly emphasized in this curriculum. We discuss reasons for this situation and we go on to describe how CTF can be useful for educating students within this focus. CTF helps develop those computer security skills that enable students to identify new vulnerabilities before those with malicious intent find them. It also helps them to hone the core computer security skills."
Naval Postgraduate School (U.S.)
Eagle, Chris; Clark, John L.
2004-07
-
Security Plan: Effectively Teaching How To Write One
"In addition to the hard requirement to maintain a security plan, the Committee for National Security Systems (CNSS), formerly known as the National Security Telecommunications and Information Security Committee (NSTISSC), has issued educational standards for Information-Assurance-related positions, many of which require some level of ability with respect to security plans. For example, Issuance No. 4011, National Training Standard for Information Systems Security (INFOSEC) Professionals, expects graduates of compliant courses to be able to build a security plan. The Naval Postgraduate School (NPS) Center for Information Systems Security Studies and Research (CISR) supports the teaching of many courses in the Computer Science department that are dedicated to Information Assurance education. One of these courses, Secure Management of Systems,' is the capstone of a series of courses that meet the educational requirements of three CNSS training standards, including No. 4011. Therefore, one of the projects in this course is the development of a security plan. This paper describes our experience and lessons learned from requiring students to write a security plan as part of Secure Management of Systems."
Naval Postgraduate School (U.S.)
Clark, Paul C.
2005-03
-
Approach to Security Requirements Engineering for a High Assurance System
"Requirements specifications for high assurance secure systems are rare in the open literature. This paper examines the development of a requirements document for a multilevel secure system that must meet stringent assurance and evaluation requirements. The system is designed to be secure, yet combines popular commercial components with specialized high assurance ones. Functional and non-functional requirements pertinent to security are discussed. A multi-dimensional threat model is presented. The threat model accounts for the developmental and operational phases of system evolution and for each phase accounts for both physical and non-physical threats. We describe our team-based method for developing a requirements document and relate that process to techniques in requirements engineering. The system requirements document presented provides a calibration point for future security requirements engineering techniques intended to meet both functional and assurance goals."
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Levin, Timothy E.; Wilson, Jeffery D.
2002
-
TCX Project: High Assurance for Secure Embedded Systems
"An overview of the Trusted Computing Exemplar (TCX) research project and its accomplishments to date are presented. The TCX project is constructing a separation kernel that will be high assurance and suitable for use in simple embedded systems. To guide the kernel development, we have created a reusable high assurance development framework. The main emphasis of this multifaceted research and development initiative is to transfer knowledge and techniques for high assurance trusted system development new developers, evaluators and educators."
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Levin, Timothy E.; Nguyen, Thuy D.
2005-03
-
SITREP: The NPS Maritime Domain Protection Newsletter, April 2005
This issue of the SITREP includes information about a presentation that will take place on the NPS study entitled "Countering Terrorism from the Sea," as well as an article on Lt. Bruce Martin from the Department of Public Safety in the City of Marina. Lt. Martin provides information about what first responders deal with. This document also includes information on a "Requirements, Capabilities and Technology Forum, held by the U.S. Coast Guard's Maritime Domain Awareness Program Integrations Office and the NPS Maritime Domain Protection Research Group, that will take place on May 2, 2005.
Naval Postgraduate School (U.S.). Maritime Defense and Security Research Program
2005-04
-
'SEA SWAT' A Littoral Combat Ship for Sea Base Defense
"Unlike past conflicts which were characterized by major naval battles in the open ocean, present day threats are mostly associated with rogue nations and terrorist cells. These threats are of a different nature to past threats and may strike at unsuspected times and locations. The United States Navy may operate from a Sea Base which projects power ashore through the use of surface and air assets. These assets must transit from the Sea Base in the blue water through the littoral region in order to reach the objective area. Total ship system designs of a group of high-speed littoral combat ships (LCS) are required which are capable of operating in these regions and defending the Sea Base and the surface and air assets from an asymmetric threat. With the modular design and the ability to carry multiple helicopters and underwater vehicles (UUV), the SEA SWAT LCS concept can be quickly employed as a force multiplier capable of operating as an Air Warfare or Undersea/Mine Warfare mission platform. With the addition of the core and Surface Warfare sensors and weapons to one of these modular mission packages, the SEA SWAT LCS concept for sea base defense will ensure air, surface and subsurface superiority during conflict. An advanced electrical power system in conjunction with an integrated propulsion system and zonal power distribution provides sustained combat capability against multiple asymmetric threats. Its enclosed super-structure allows for high survivability in a CBR environment."
Naval Postgraduate School (U.S.)
Echols, Robert; Santos, Wilfredo; Fernandez, Constance
2003-12
-
Chemical, Biological and Nuclear Terrorism/Warfare: A Bibliography
This bibliography contains 3 individual lists of periodicals, books, technical reports, and websites related to: 1) Chemical Terrorism/Warfare; 2) Biological Terrorism/Warfare; and Nuclear Terrorism/Warfare.
Naval Postgraduate School (U.S.). Dudley Knox Library
Marlatt, Greta E.
2003-09
-
SITREP: The NPS Maritime Domain Protection Newsletter, February 2004
This is an e-newsletter for the Naval Postgraduate School's Maritime Domain Protection Task Force (MDP-TF). This issue introduces the efforts of the MDP-TF surrounding protection of the United States and its vessels and citizens against terrorist threats originating from the maritime domain. In response, NPS commissioned the MDP-TF in January 2004. The task force will focus on the DoD's responsibilities and roles in Homeland Defense, while recognizing the need to integrate with national Homeland Security efforts through inter-agency cooperation and intelligence sharing to form a common operational picture. The MDP-TF has established a schedule that includes delivery of a vulnerability versus capability assessment and an initial description of the current national system by October 2004.
Naval Postgraduate School (U.S.). Maritime Defense and Security Research Program
2004-02
-
Seventh Fleet Field Training Exercise: Fleet Battle Experiment Kilo Fires Initiative Final Report
"Fleet Battle Experiment Kilo was conducted during Seventh Fleet exercise Tandem Thrust 03. During the Field Training Exercise phase, testing of Time Sensitive Targets processes using the Joint Fires Network was carried out. This report contains results obtained on contributions made by the Joint Fires Network to Navy Time Sensitive Targeting and experiment lessons learned."
Naval Postgraduate School (U.S.)
Schacher, Gordon; Gallup, Shelley; Pilnick, Steve
2003-07-20
-
SITREP: The NPS Maritime Domain Protection Newsletter, December 2004
Articles in this issue include "Using a Standardized Planning and Execution System to Improve Maritime Homeland Security," "The Maritime and Port Security Summit: Getting to Best Practices," and "Naval Criminal Investigative Service (NCIS) Multiple Threat Alert Center (MTAC)."
Naval Postgraduate School (U.S.). Maritime Defense and Security Research Program
2004-12
-
SITREP: The NPS Maritime Domain Protection Newsletter, January 2005
Articles in this issue include: "Asymmetric Warfare Initiative Exercise 04 North: A Center for Asymmetric Warfare Project" and "MDP Research Group - Port Security Visit".
Naval Postgraduate School (U.S.). Maritime Defense and Security Research Program
2005-01
-
SITREP: The NPS Maritime Domain Protection Newsletter, March 2005
This volume of the SITREP newsletter includes articles on the U.S. Coast Guard's Maritime Domain Awareness Program and the Atmospheric Detection Effects Prediction Tool (ADEPT).
Naval Postgraduate School (U.S.). Maritime Defense and Security Research Program
2005-03
-
Analysis of Spending Patterns Associated with the PHALANX Close-In Weapon System (CIWS) Program
"In light of the current world climate, U.S. military force protection has become an increasing concern. The bombing of the USS COLE and terrorist actions on the World Trade Center buildings show a vulnerability to attack both at home and abroad. In response to this threat, the Close-In Weapon System (CIWS) has become an attractive system for re-evaluation as a deterrent to hostile airborne threats to U.S. Navy surface ships. Because it is a mature system, data exist related to past spending patterns and the resultant outputs of that spending. This project analyzes those spending patterns and identifies potential areas of investigation for cost savings."
Naval Postgraduate School (U.S.)
Chaparro, Michael R.
2003-12