Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Cynthia E. Irvine is active.

Publication


Featured researches published by Cynthia E. Irvine.


Journal of Computer Security | 1996

A sound type system for secure flow analysis

Dennis M. Volpano; Cynthia E. Irvine; Geoffrey Smith

Ensuring secure information flow within programs in the context of multiple sensitivity levels has been widely studied. Especially noteworthy is Denning’s work in secure flow analysis and the lattice model [6][7]. Until now, however, the soundness of Denning’s analysis has not been established satisfactorily. We formulate Denning’s approach as a type system and present a notion of soundness for the system that can be viewed as a form of noninterference. Soundness is established by proving, with respect to a standard programming language semantics, that all well-typed programs have this noninterference property.


Computers & Security | 2007

A video game for cyber security training and awareness

Benjamin D. Cone; Cynthia E. Irvine; Michael F. Thompson; Thuy D. Nguyen

Although many of the concepts included in cyber security awareness training are universal, such training often must be tailored to address the policies and requirements of a particular organization. In addition, many forms of training fail because they are rote and do not require users to think about and apply security concepts. A flexible, highly interactive video game, CyberCIEGE, is described as a security awareness tool that can support organizational security training objectives while engaging typical users in an engaging security adventure. The game is now being successfully utilized for information assurance education and training by a variety of organizations. Preliminary results indicate the game can also be an effective addition to basic information awareness training programs for general computer users (e.g., annual awareness training.)


new security paradigms workshop | 2001

Quality of security service

Cynthia E. Irvine; Timothy E. Levin

Abstract : We examine the concept of security as a dimension of Quality of Service in distributed systems. Implicit to the concept of Quality of Service is the notion of choice or variation. Security services also offer a range of choice both from the user perspective and among the underlying resources. We provide a discussion and examples of user-specified security variables and show how the range of service levels associated with these variables can support the provision of Quality of Security Service, whereby security is a constructive network management tool rather than a performance obstacle. We also discuss various design implications regarding security ranges provided in a QoS-aware distributed system.


annual computer security applications conference | 1999

Toward a taxonomy and costing method for security services

Cynthia E. Irvine; Timothy E. Levin

A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource management systems (RMSs) responsible for assigning computing and network resources to tasks need to know the resource-utilization costs associated with the various network security services. In order to understand the range of security services all RMS needs to manage, a preliminary security service taxonomy is defined. The taxonomy is used as a framework for defining the costs associated with network security services.


Proceedings. Eighth Heterogeneous Computing Workshop (HCW'99) | 1999

An overview of MSHN: the Management System for Heterogeneous Networks

Debra A. Hensgen; Taylor Kidd; D. St. John; M.C. Schnaidt; Howard Jay Siegel; T.D. Braun; M. Maheswaran; S. Ali; Jong Kook Kim; Cynthia E. Irvine; Timothy E. Levin; R.F. Freund; Matt Kussow; Michael Godfrey; A. Duman; P. Carff; S. Kidd; Viktor K. Prasanna; Prashanth B. Bhat; Ammar H. Alhusaini

The Management System for Heterogeneous Networks (MSHN) is a resource management system for use in heterogeneous environments. This paper describes the goals of MSHN, its architecture, and both completed and ongoing research experiments. MSHNs main goal is to determine the best way to support the execution of many different applications, each with its own quality of service (QoS) requirements, in a distributed, heterogeneous environment. MSHNs architecture consists of seven distributed, potentially replicated components that communicate with one another using CORBA (Common Object Request Broker Architecture). MSHNs experimental investigations include: the accurate, transparent determination of the end-to-end status of resources; the identification of optimization criteria and how non-determinism and the granularity of models affect the performance of various scheduling heuristics that optimize those criteria; the determination of how security should be incorporated between components as well as how to account for security as a QoS attribute; and the identification of problems inherent in application and system characterization.


Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004. | 2004

The Trusted Computing Exemplar project

Cynthia E. Irvine; Timothy E. Levin; Thuy D. Nguyen; George W. Dinolt

We describe the Trusted Computing Exemplar project, which is producing an openly distributed worked example of how high assurance trusted computing components can be built. The TCX project encompasses four related activities: creation of a prototype framework for rapid high assurance system development; development of a reference-implementation trusted computing component; evaluation of the component for high assurance; and open dissemination of results related to the first three activities. The projects open development methodology provides widespread availability of key high assurance enabling technologies and ensures transfer of knowledge and capabilities for trusted computing to the next generation of developers, evaluators and educators.


ieee symposium on security and privacy | 2005

CyberCIEGE: gaming for information assurance

Cynthia E. Irvine; Michael F. Thompson; Ken Allen

CyberCIEGE is a high-end, commercial-quality video game developed jointly by Rivermind and the Naval Postgraduate Schools Center for Information Systems Security Studies and Research. This dynamic, extensible game adheres to information assurance principles to help teach key concepts and practices. CyberCIEGE is a resource management simulation in which the player assumes the role of a decision maker for an IT dependent organization. The objective is to keep the organizations virtual users happy and productive while providing the necessary security measures to protect valuable information assets.


annual computer security applications conference | 2000

Calculating costs for quality of security service

Evdoxia Spyropoulou; Timothy E. Levin; Cynthia E. Irvine

Presents a quality-of-security-service (QoSS) costing framework and a demonstration of it. A method for quantifying costs related to the security service and for storing and retrieving security information is illustrated. We describe a security model for tasks, which incorporates the ideas of variant security services invoked by the task, dynamic network modes, abstract security level choices and resource utilization costs. The estimated costs can be fed into a resource management system to facilitate the process of estimating efficient task schedules. Integration and scalability issues have been taken into account during the design of the QoSS costing demonstration, which we believe is suitable for incorporation into a resource management system research prototype.


Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004. | 2004

Overview of a high assurance architecture for distributed multilevel security

Cynthia E. Irvine; Timothy E. Levin; Thuy D. Nguyen; David J. Shifflett; Jean Khosalim; Paul C. Clark; Albert Wong; Francis B. Afinidad; David Bibighaus; Joseph Sears

A high assurance architecture is described for the protection of distributed multilevel secure computing environments from malicious code and other attacks. Component security services and mechanisms extend and interoperate with commodity PCs, commodity client software, applications, trusted components, and legacy single level networks, providing new capabilities for composing secure, distributed multilevel security. This architecture results from the realization that unless a secure system offers users comfortable and familiar interfaces for handling routine information, it will fail due to lack of user acceptability.


IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | 2013

A 3-D Split Manufacturing Approach to Trustworthy System Development

Jonathan Valamehr; Timothy Sherwood; Ryan Kastner; David Marangoni-Simonsen; Ted Huffmire; Cynthia E. Irvine; Timothy E. Levin

Securing the supply chain of integrated circuits is of utmost importance to computer security. In addition to counterfeit microelectronics, the theft or malicious modification of designs in the foundry can result in catastrophic damage to critical systems and large projects. In this letter, we describe a 3-D architecture that splits a design into two separate tiers: one tier that contains critical security functions is manufactured in a trusted foundry; another tier is manufactured in an unsecured foundry. We argue that a split manufacturing approach to hardware trust based on 3-D integration is viable and provides several advantages over other approaches.

Collaboration


Dive into the Cynthia E. Irvine's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Thuy D. Nguyen

Naval Postgraduate School

View shared research outputs
Top Co-Authors

Avatar

Paul C. Clark

Naval Postgraduate School

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ted Huffmire

Naval Postgraduate School

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge