Reading PAGE

Peer Evaluation activity

Emailed by 1
Downloads 668
Views 528
Full text requests 9
Followed by 2

Total impact ?

    Send a

    An-Ping has...

    Trusted 0
    Reviewed 0
    Emailed 0
    Shared/re-used 0
    Discussed 0
    Invited 0
    Collected 0

     

    This was brought to you by:

    block this user An-Ping Li

    Research Fellow

    Beijing 100085, P.R.China

    Proposal to the FY 2006 Director�s R&D Fund Novel Security Mechanisms for Mobile Code and Mobile Ad Hoc Network Environments

    Export to Mendeley

    Invention Disclosures/Patents: None at this time, however, we expect intellectual property to arise from this project Abstract: This proposal is submitted in furtherance of the knowledge discovery thrust, specifically in the area of mobile code security. The CSE division (CSED) has adopted a dual approach to knowledge discovery from questions to data (formulating questions, then collecting sufficient data to answer the questions) and from data to questions (analyzing extant data to understand what questions can be answered). This approach is particularly timely in the field of mobile code security, where the exaggerated promises of COTS security products have usually led to unexpected compromises. Effective security is achieved using a dual approach: When a system is envisioned, the designers can define the questions (i.e., the required security properties) and demand sufficient data to provide the answers. Conversely, when a new security protocol or product is introduced, security analysts must understand what questions (i.e. what security properties) are answered by this particular set of data (i.e., the introduction of a new security product). For this project, ORNL researchers propose to follow this dual approach to develop novel security mechanisms for mobile code that ensure confidentiality, integrity, availability authentication and reliability. Data will be used to authenticate trust among trusted entities (mobile code) so that the trusted enterprise system cannot be compromised in a way that creates a new threat or exposes vulnerabilities. Untrusted mobile code may be isolated/inoculated to render it ineffective and non-threatening. Knowledge will be gained enabling real-time actionable decisions in the realm of enforcing security policies.

    Oh la laClose

    Your session has expired but don’t worry, your message
    has been saved.Please log in and we’ll bring you back
    to this page. You’ll just need to click “Send”.

    Your evaluation is of great value to our authors and readers. Many thanks for your time.

    Review Close

    Short review
    Select a comment
    Select a grade
    You and the author
    Anonymity My review is anonymous( Log in  or  Register )
    publish
    Close

    When you're done, click "publish"

    Only blue fields are mandatory.

    Relation to the author*
    Overall Comment*
    Anonymity* My review is anonymous( Log in  or  Register )
     

    Focus & Objectives*

    Have the objectives and the central topic been clearly introduced?

    Novelty & Originality*

    Do you consider this work to be an interesting contribution to knowledge?

    Arrangement, Transition and Logic

    Are the different sections of this work well arranged and distributed?

    Methodology & Results

    Is the author's methodology relevant to both the objectives and the results?

    Data Settings & Figures

    Were tables and figures appropriate and well conceived?

    References and bibliography

    Is this work well documented and has the bibliography been properly established?

    Writing

    Is this work well written, checked and edited?

    Write Your Review (you can paste text as well)
    Please be civil and constructive. Thank you.


    Grade (optional, N/A by default)

    N/A 1 1.5 2 2.5 3 3.5 4 4.5 5 5.5 6 6.5 7 7.5 8 8.5 9 9.5 10
    Close

    Your mailing list is currently empty.
    It will build up as you send messages
    and links to your peers.

     No one besides you has access to this list.
    Close
    Enter the e-mail addresses of your recipients in the box below.  Note: Peer Evaluation will NOT store these email addresses   log in
    Your recipients

    Your message:

    Your email : Your email address will not be stored or shared with others.

    Your message has been sent.

    Description

    Title : Proposal to the FY 2006 Director�s R&D Fund Novel Security Mechanisms for Mobile Code and Mobile Ad Hoc Network Environments
    Abstract : Invention Disclosures/Patents: None at this time, however, we expect intellectual property to arise from this project Abstract: This proposal is submitted in furtherance of the knowledge discovery thrust, specifically in the area of mobile code security. The CSE division (CSED) has adopted a dual approach to knowledge discovery from questions to data (formulating questions, then collecting sufficient data to answer the questions) and from data to questions (analyzing extant data to understand what questions can be answered). This approach is particularly timely in the field of mobile code security, where the exaggerated promises of COTS security products have usually led to unexpected compromises. Effective security is achieved using a dual approach: When a system is envisioned, the designers can define the questions (i.e., the required security properties) and demand sufficient data to provide the answers. Conversely, when a new security protocol or product is introduced, security analysts must understand what questions (i.e. what security properties) are answered by this particular set of data (i.e., the introduction of a new security product). For this project, ORNL researchers propose to follow this dual approach to develop novel security mechanisms for mobile code that ensure confidentiality, integrity, availability authentication and reliability. Data will be used to authenticate trust among trusted entities (mobile code) so that the trusted enterprise system cannot be compromised in a way that creates a new threat or exposes vulnerabilities. Untrusted mobile code may be isolated/inoculated to render it ineffective and non-threatening. Knowledge will be gained enabling real-time actionable decisions in the realm of enforcing security policies.
    Subject : unspecified
    Area : Mathematics
    Language : English
    Affiliations
    Url : http://www.csm.ornl.gov/~sheldon/public/LDRD-MobileCodeFY2006v5b.pdf
    Doi : 10.1.1.107.2773

    Leave a comment

    This contribution has not been reviewed yet. review?

    You may receive the Trusted member label after :

    • Reviewing 10 uploads, whatever the media type.
    • Being trusted by 10 peers.
    • If you are blocked by 10 peers the "Trust label" will be suspended from your page. We encourage you to contact the administrator to contest the suspension.

    Does this seem fair to you? Please make your suggestions.

    Please select an affiliation to sign your evaluation:

    Cancel Evaluation Save

    Please select an affiliation:

    Cancel   Save

    An-Ping's Peer Evaluation activity

    Emailed by 1
    • Anonymous : 1
    Downloads 668
    Views 528
    Full text requests 9
    Followed by 2

    An-Ping has...

    Trusted 0
    Reviewed 0
    Emailed 0
    Shared/re-used 0
    Discussed 0
    Invited 0
    Collected 0
    Invite this peer to...
    Title
    Start date (dd/mm/aaaa)
    Location
    URL
    Message
    send
    Close

    Full Text request

    Your request will be sent.

    Please enter your email address to be notified
    when this article becomes available

    Your email


     
    Your email address will not be shared or spammed.