Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Lance J. Hoffman is active.

Publication


Featured researches published by Lance J. Hoffman.


IEEE Transactions on Intelligent Transportation Systems | 2004

Challenges of intervehicle ad hoc networks

Jeremy J. Blum; Azim Eskandarian; Lance J. Hoffman

Intervehicle communication (IVC) networks, a subclass of mobile ad hoc networks (MANETs), have no fixed infrastructure and instead rely on the nodes themselves to provide network functionality. However, due to mobility constraints, driver behavior, and high mobility, IVC networks exhibit characteristics that are dramatically different from many generic MANETs. This paper elicits these differences through simulations and mathematical models and then explores the impact of the differences on the IVC communication architecture, including important security implications.


intelligent vehicles symposium | 2003

Mobility management in IVC networks

Jeremy J. Blum; Azim Eskandarian; Lance J. Hoffman

Inter-vehicle communication, a central component of future in-vehicle Intelligent Transportation Systems (ITS), will require the development of distributed coordination functions that operate without a fixed communications infrastructure. These functions will be critical for coordination of access to the media, message routing, and security. The stable clustering of nearby nodes is the key for the creation of a scalable network architecture. However, existing clustering algorithms for generic networks do not perform well in a vehicular, environment due to the high speeds and the constraints on vehicle mobility. This paper presents a clustering algorithm that greatly improves cluster stability.


Communications of The ACM | 2006

Trust beyond security: an expanded trust model

Lance J. Hoffman; Kim Lawson-Jenkins; Jeremy J. Blum

Developing an improved trust model and related metrics for distributed computer-based systems that will be useful immediately and resilient to changing technology.


ACM Computing Surveys | 1969

Computers and Privacy: A Survey

Lance J. Hoffman

The problem of access control and pr ivacy in computer sys tems is su rveyed in te rms of exis t ing sys tems and cur ren t proposals. A review of sugges ted legal and admin i s t r a t ive safeguards is given The bulk of the dmcusslon deals w i th the cur ren t technology, i ts l imi ta t ions , and some addi t ional safeguards which have been proposed bu t not implemented . Final ly , a few promis ing compute r science research problems m the field are ou t hned A par t i a l ly a n n o t a t e d b l b h o g r a p h y of h t e r a t u r e in the area is included.


Journal of Policy Analysis and Management | 1980

Computers and Privacy in the Next Decade

Lance J. Hoffman

Downloading the book in this website lists can give you more advantages. It will show you the best book collections and completed collections. So many books can be found in this website. So, this is not only this computers and privacy in the next decade. However, this book is referred to read because it is an inspiring book to give you more chance to get experiences and also thoughts. This is simple, read the soft file of the book and you get it.


international conference on intelligent transportation systems | 2003

Performance characteristics of inter-vehicle ad hoc networks

Jeremy J. Blum; Azim Eskandarian; Lance J. Hoffman

Inter-vehicle communication (IVC) networks are a sub-class of mobile ad hoc networks (MANETs). They have no fixed infrastructure and instead rely on the mobile nodes themselves to provide network functionality. However, due to mobility constraints, driver behavior, and high mobility, IVC networks exhibit characteristics that are dramatically different than those of many generic MANETs studied so far. This paper elicits these differences through simulations and mathematical models, and then investigates the impact of the differences on the IVC communication architecture, including important security implications.


ieee symposium on security and privacy | 2012

Holistically Building the Cybersecurity Workforce

Lance J. Hoffman; Diana Burley; Costis Toregas

This article proposes a holistic approach to developing the cybersecurity workforce based on careful integration of workforce development strategies into a plan that involves educators, career professionals, employers, and policymakers. Observations of the healthcare model, along with the findings of a recent workshop on cybersecurity education, suggest some practical steps for such an approach. Computer science educators, human resources professionals, and cybersecurity practitioners should seek to attract computer science graduates to think beyond their stovepiped fields and collaborate to develop, accept, and implement holistic, integrated solutions.


Computers & Security | 1986

A survey of issues in computer network security

Linda S. Rutledge; Lance J. Hoffman

Computer networks are proliferating rapidly for a number of reasons discussed in this paper. During this boom, relatively little attention has been paid to computer network security. This paper describes problems posed by network security and presents a survey of methods and technologies available today to enhance network security. Current methods are discussed, including information security strategy, computer security and its relation to network security, data communications security, and data encryption. Ideas from promising areas of research close the paper.


Communications of The ACM | 1994

Cryptography policy

Lance J. Hoffman; Faraz A. Ali; Steven L. Heckler; Ann Huybrechts

D wing the past five yews. encryption technology haa become easily available tu both individuals and businesses, affording them a level of security formerly available to only military, national security. and law enforcement agencies. This availability and the desirability of encrypting some communications is just starting to be generally recognized by American business, and the encryption market is just now beginning to emerge as a significant part of the computer security market. As a result, a debate about the proper balance of national security, law enforcement, and personal freedom has been initiated. Law enforcement and national security agencies would like to maintain tight control over civilian encryption technologies, while industry and individual and privacy rights advocates tight to expand their ability to distribute and use cryptographic products as they please 171. This article analyzes trends in mcryption technology and policy against this backdrop. It is divided into four primary sections: technology, market analysis, export controls, and public policy issues.


Computers & Security | 1993

A shortest path network security model

John A. Fitch; Lance J. Hoffman

This paper presents a new model, based on the resource- constrained shortest path, for evaluating the security of computer networks. The power of the model is twofold. First, the use of the resource-constrained shortest path as an integral part of the model ties security evaluation metrics to graph theory, thus providing a rigorous mathematical base for the evaluation of network security. Second, the model allows both local (nodal) and overall (network) security considerations to be incorporated into the security evaluation process. The usefulness of the model is demonstrated by applying the model to examples from current literature. Applying the model to a generalization of the cascade problem not only yields an efficient algorithm (O(N^3)) for the problem, but also points out the underlying security issues in interconnecting independently evaluated systems. As a consequence, the resource-constrained shortest path model leads to a broader understanding of network security risks.

Collaboration


Dive into the Lance J. Hoffman's collaboration.

Top Co-Authors

Avatar

Anya Kim

George Washington University

View shared research outputs
Top Co-Authors

Avatar

Jeremy J. Blum

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Timothy Rosenberg

George Washington University

View shared research outputs
Top Co-Authors

Avatar

Azim Eskandarian

George Washington University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Costis Toregas

George Washington University

View shared research outputs
Top Co-Authors

Avatar

Diana Burley

George Washington University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

John A. Fitch

George Washington University

View shared research outputs
Top Co-Authors

Avatar

Ronald Dodge

United States Military Academy

View shared research outputs
Researchain Logo
Decentralizing Knowledge