User Bar First

This is a debugging block

User Bar Second

This is a debugging block

Branding

This is a debugging block


 

Header First

This is a debugging block

Header Second

This is a debugging block

Preface First

This is a debugging block

Preface Second

This is a debugging block

Preface Third

This is a debugging block

Content

This is a debugging block

Stop the Flow: Damage Mitigation Framework for Trusted Systems

Wed, 02/01/2012 - 11:57 -- llaird
Faculty Advisor(s): 
Jon Wade, Ph.D. or Linda Laird
Faculty Email(s): 
jwade@stevens.edu, llaird@stevens.edu
Program: 
Systems Engineering
Project Title: 
Stop the Flow: Damage Mitigation Framework for Trusted Systems
Description: 

A Trusted System is one that dependably performs its mission while minimizing or eliminating the probability of significant, unintended damage. The ability to develop, deploy and maintain trusted systems, those that are safe, secure, dependable, and survivable is an unsolved problem. A high-level, abstract framework of Damage Mitigation has been created to enable the architecture and design of trusted systems, those that dependably perform a mission while minimizing or eliminating the probability of significant, unintended damage. This framework is based upon the premise of system imperfection, consisting of a Trusted Systems Model and a Damage Process Model. Damage will be defined as any significant negative consequence of a system's operation. The intent is that this systems approach to Damage Mitigation will facilitate new ideas on how to improve the fundamental properties of trustability of systems and encourage the creation of trustable architectures and designs for critical systems. The central idea is that there exists a causal event chain that can lead to damage and a loss in system value. At each point within the chain, there are potential "chokepoints" where it may be possible to "Stop the Flow" from an instigating event to a damage event.

This project involves furthering this work through the creation of case studies through the identification and analysis of existing systems, using this framework, as a means to determine their trustworthiness and to determine potential areas of improvement. Another potential area of research is in the classification of existing trusted system techniques using this framework. A final area of potential research would be to create new mitigation techniques based on this framework.

References: 
  1. Laird, L., Wade, J. (2011). "Stop The Flow: A Damage Mitigation Framework for Trusted Systems", CrossTalk, MarchiApril2011, pg. 12-16. http://www.crosstalkonline.org/storagelflipbooks/20 11120 11 03/index.html
Student Requirements: 
  • Systems Engineers with experience and/or interest in dependable systems and damage mitigation techniques.
Send the faculty advisor an email to get additional information on this topic.
Please enter your full name.
Please select a SSE Program.
Please select a term.
Please provide a short message.
CAPTCHA
This question is for testing whether you are a human visitor and to prevent automated spam submissions.
Image CAPTCHA
Enter the characters shown in the image.

Postscript First

This is a debugging block

Postscript Second

This is a debugging block

Postscript Third

This is a debugging block

Postscript Fourth

This is a debugging block