Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Joseph S. Sherif is active.

Publication


Featured researches published by Joseph S. Sherif.


workshops on enabling technologies: infrastracture for collaborative enterprises | 2002

Intrusion detection: systems and models

Joseph S. Sherif; Tommy G. Dearmond

Organizations more often than not lack comprehensive security policies and are not adequately prepared to protect their systems against intrusions. This paper puts forward a review of the state of the art and state of the applicability of intrusion detection systems and models. The paper also presents a classification of literature pertaining to intrusion detection.


international symposium on environmental software systems | 1995

Quality Function Deployment (QFD): an effective technique for requirements acquisition and reuse

Tuyet-Lan Tran; Joseph S. Sherif

This paper proposes Quality Function Deployment (QFD) as an effective tool for the capture and refinement of requirements. When applied to a project, QFD will enable its success. More specifically, QFD will: (1) improve product quality by focusing on customer requirements up-front and throughout the development cycle; (2) improve communications between customers, system engineers, programmers and testers and thus contribute to a better decision-making process; (3) facilitate the management of change, through rigorous rating and systematic traceability of requirements; (4) reduce costs of projects, by enabling concurrent engineering and by reducing costs associated with late-in-the life-cycle rework, (5) enable alignment between customer requirements, product requirements, and cost requirements (or constraints), and (6) enable cataloguing of key performance requirements, for parameter-based modeling of the target application and systematic reuse of requirements across projects.


Information Management & Computer Security | 2003

Intrusion detection: the art and the practice. Part I

Joseph S. Sherif; Rod Ayers; Tommy G. Dearmond

Organizations more often than not lack comprehensive security policies and are not adequately prepared to protect their systems against intrusions. This paper puts forward a review of state of the art and state of the applicability of intrusion detection systems and models. The paper also presents a classification of literature pertaining to intrusion detection.


Information Management & Computer Security | 2003

Intrusion detection: methods and systems. Part II

Joseph S. Sherif; Rod Ayers

This paper is part II of a previous article of the same title: Intrusion detection. Part II is concerned with intrusion threats, attacks, defense, models, methods and systems.


Information Management & Computer Security | 2003

Deployment of anti‐virus software: a case study

Joseph S. Sherif; David P. Gilliam

The growth of Inter‐ and intranets and the sharing of software have led to a rise in the transmission of viruses, especially among the PC and MAC platforms. However, maintaining virus protection software and pattern updates for any large organization is a monumental problem, especially when the organization supports multiple platforms and operating systems. The Jet Propulsion Laboratory (JPL) and other National Aeronautics and Space Administration (NASA) Centers have had problems maintaining current virus protection software and pattern files, and so NASA asked the JPL Network and Computer Security (NCS) Group to lead an effort to search for a comprehensive solution. This paper puts forward a study, analysis and recommendations concerning anti‐virus software solutions, problems encountered and their resolutions. One of the key issues was finding a single‐source anti‐virus software solution. Selection and deployment of single‐source anti‐virus software were successful. The lessons learned in the deployment of a software product site‐wide may benefit other organizations facing a similar situation.


Kybernetes | 2012

Managing homeland security: deployment, vigilance and persistence

Rahul Bhaskar; Bhushan Kapoor; Joseph S. Sherif

Purpose – This paper aims to analyze provisions in the existing US laws and government directives for deployment, vigilance and persistence in managing homeland security.Design/methodology/approach – Within about a year after the September 11 terrorist attacks, the US Congress passed various new laws and the executive branch of the government issued a series of directives to maintain domestic security. The approach of the study is to analyze the provisions of the laws and the directives with an aim of seeing how these will enable risk management considering that the resources are not unlimited.Findings – The existing laws and directives enhance the ability of the USA to manage domestic incidents by establishing a single, comprehensive national incident management system. However, the major impediment to risk management is currently the lack of ability to share critical information among federal, state, local, tribal, public and private sector organizations. The government and private sectors should work t...


Microelectronics Reliability | 1997

MY-STAR: A methodology and system for tracing and analyzing requirements

Tuyet-Lan Tran; Joseph S. Sherif; Carmen Mikulski; Monica Wang

Abstract This paper describes a methodology developed at the Jet Propulsion Laboratory (JPL), and designed for the process of requirements engineering and management. MY-STAR provides techniques for specifying, refining, allocating, baselining, sharing, changing, storing and reporting on requirements and requirements metrics. In support of MY-STAR, the tool STAFR (System for Tracing and Analyzing Functional Requirements) has been prototyped by the Ground Systems Group (Software Product Assurance) as part of process assurance support to four different projects within the Deep Space Network (DSN) at JPL. The results show that STAFR provides an effective means for capturing in one place requirements, while enabling refinement, analysis, traceability of test cases to requirements, and other trade-off artifacts associated with the specifications, prioritization, allocation and planning of requirements. It does so without the significant overhead typically associated with knowledge-based systems.


workshops on enabling technologies infrastracture for collaborative enterprises | 2003

Software security checklist for the software life cycle

David P. Gilliam; Thomas L. Wolfe; Joseph S. Sherif; Matt Bishop


Kybernetes | 2008

The semantic web: a catalyst for future e‐business

Janet K. Durgin; Joseph S. Sherif


Kybernetes | 2011

Cryptography: A security pillar of privacy, integrity and authenticity of data communication

Bhushan Kapoor; Pramod Pandya; Joseph S. Sherif

Collaboration


Dive into the Joseph S. Sherif's collaboration.

Top Co-Authors

Avatar

Tuyet-Lan Tran

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Bhushan Kapoor

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

David P. Gilliam

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Tommy G. Dearmond

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Carmen Mikulski

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Janet K. Durgin

Lockheed Martin Aeronautics

View shared research outputs
Top Co-Authors

Avatar

Matt Bishop

University of California

View shared research outputs
Top Co-Authors

Avatar

Monica Wang

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Pramod Pandya

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Rahul Bhaskar

California Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge