Advanced search Help
Resource Type or Special Collection is Theses & Research Reports
Format is pdf
Searching for terms: ALL (Nguyen) in: author
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Lawful Hacking: Toward a Middle Ground Solution to the Going Dark Problem
From the thesis abstract: "This thesis examines the ongoing debate between law enforcement and the intelligence communities on one side, and the technology industry and privacy rights groups on the other, over the 'going dark' problem. Going dark is a phenomenon created by ubiquitous use of end-to-end encryption over communication devices and Internet platforms, rendering those communications warrant-proof. End-to-end encryption means that only the sender and receiver of the message can read it, and no one in between. Even with a properly executed warrant or subpoena, law enforcement and intelligence agencies are unable to access the data they need because that data was encrypted. This thesis explores the historical, political and legislative developments that contributed to the rise of encryption in recent years, as well as constitutional doctrines that may be relevant to the public debate over possible policy solutions. Through the policy options analysis method, this thesis identifies lawful hacking as a middle-ground solution that policymakers should adopt in the short term. It also recommends that the U.S. government initiate a public education campaign to gain public support for some form of regulation concerning encryption in the future. The fundamental issue here is not only about the tension between privacy and security. The issue is also about who should make decisions with broad implications for the collective security: elected officials or the technology industry."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Nguyen, Hoaithi Y.T.
2017-03
-
Analysis of Three Kernel-Based Multilevel Security Architectures
"Various system architectures have been proposed for highly robust enforcement of multilevel security (MLS). This paper provides an analysis of the relative merits of three architectural types--one based on a traditional separation kernel, another based on a security kernel, and a third based on a high-robustness separation kernel. We show that by taking advantage of commonly available hardware features, and incorporating security features required by the nascent Separation Kernel Protection Profile (SKPP), the latter architecture may provide several aspects of security and assurance that are not achievable with the other two."
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Levin, Timothy E.; Nguyen, Thuy D.
2006-08-25
-
Policy Enforced Remote Login
This document describes enhancements made to the popular OpenSSH authentication service to restrict the execution of OpenSSH processes by applying a ring-based program execution policy. It also applies a label-based mandatory access control (MAC) policy to limit a user's login shell to run at a specific security level within the user's authorized security clearance range. While still rudimentary, these enhancements illustrate the usefulness of a ring-based execution mechanism for restricting program behavior.
Naval Postgraduate School (U.S.)
Levin, Timothy E.; Nguyen, Thuy D.
2003-02
-
TCX Project: High Assurance for Secure Embedded Systems
"An overview of the Trusted Computing Exemplar (TCX) research project and its accomplishments to date are presented. The TCX project is constructing a separation kernel that will be high assurance and suitable for use in simple embedded systems. To guide the kernel development, we have created a reusable high assurance development framework. The main emphasis of this multifaceted research and development initiative is to transfer knowledge and techniques for high assurance trusted system development new developers, evaluators and educators."
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Levin, Timothy E.; Nguyen, Thuy D.
2005-03
-
Building a Capabilities Network to Improve Disaster Preparation Effort in the Pacific Command Area of Responsibility
From the thesis abstract: "The United States Pacific Command (PACOM) area of responsibility (AOR) includes 36 Asia-Pacific countries and over 100 million square miles of Earth's surface. Five of the countries in the PACOM are historically most often hit by natural disasters and require immediate response with effective coordination. In order to provide the most effective disaster-relief efforts, identification of the organizations that are available and the capabilities that they can provide is essential. This research identifies and analyzes 27 nongovernmental organizations (NGOs) that currently or recently conducted relief projects in the PACOM AOR. We primarily analyzed the organizations using six factors: (1) mission or primary focus, (2) capabilities, (3) budget, (4) training, (5) religious affiliation, and (6) liaison with military. We also analyzed the financial status of the NGOs for a better understanding. The end result of the research is to provide PACOM leadership with in-depth analysis of the most effective organizations that can assist in disaster relief preparation and the efficient coordination of resources and can minimize redundancy of efforts after a catastrophic event."
Naval Postgraduate School (U.S.)
Nguyen, Quy P.; Curley, Edward P.
2013-06
-
Learning to Mow Grass: IDF Adaptations to Hybrid Threats
From the thesis abstract: "From the Army Operating Concept to ADP 3-0, the US Army expects to fight hybrid threats in the current operating environment. Hybrid threats combine the characteristics of irregular forces with improved conventional capabilities. This monograph examines the adaptations of the Israel Defense Force [IDF] against hybrid threats to draw relevant operational lessons for military planners. It links the nature of the hybrid threat, Israeli adaptations, and the adaptations' effects on Israeli operational art against the hybrid threat in three case studies spanning the Second Lebanon War in 2006, Operation Cast Lead in 2008, and Operation Protective Edge in 2014. The monograph observed Israeli adaptations in the three areas of materiel, doctrine, and training for comprehensiveness. After meeting a hybrid threat on the battlefield in 2006, the Israel Defense Force invested in equipment like the Merkava IV tank, Trophy active protection system, and Iron Dome. It purged Systemic Operational Design's language from its tactical doctrine. Critically, the Israel Defense Force retrained both active and reserve units for combined arms maneuver to defeat hybrid threats. Altogether, this provided Israeli operational art the means of a conventional ground force to succeed against Hamas in 2008 and 2014. The IDF lacked such a force against Hezbollah's hybrid threat in 2006, and lost. An Israeli ground force reequipped and retrained for combined arms maneuver defeated Hamas in 2008, and enabled Israeli operational art to counter Hamas' new subterranean threat in 2014. The Israeli experience from 2006 to 2014 have made clear that a ground force capable of combined arms maneuver remained a necessary component for effective operational art against a hybrid threat."
U.S. Army Command and General Staff College; U.S. Army Command and General Staff College. School of Advanced Military Studies
Nguyen, Kha M.
2017-02-06
1