Papers by Daryl McCullough
Proceedings. 1988 IEEE Symposium on Security and Privacy
Length: 4633 words and about 4.5 pages of Many failures of software systems may be traced to inad... more Length: 4633 words and about 4.5 pages of Many failures of software systems may be traced to inadequate development of systemwide attributes, such as system security, reliability, and usability. Despite the recognized importance of system-wide requirements, commercially available computer-aided software engineering (CASE) tools do not provide any special assistance for satisfying them, instead concentrating on support for developing and rapidly prototyping a system's functionality. This paper presents DesignExpert, a knowledge-based tool intended to aid system developers and other stakeholders to e ectively address system-wide requirements. The tool elicits requirements, analyzes needs, generates design alternatives, and suggests evaluation strategies. 1
Modern Defense strategy and execution is increasingly net-centric, making more information availa... more Modern Defense strategy and execution is increasingly net-centric, making more information available more quickly. In this environment, the intelligence agent or warfighter must distinguish decision-quality information from potentially inaccurate, or even conflicting, pieces of information from multiple sources – often in time-critical situations. The Pedigree Management and Assessment Framework (PMAF) enables the publisher of information to record standard provenance metadata about the source, manner of collection, and the chain of modification of information as it passed through processing and/or assessment. In addition, the publisher can define and include other metadata relevant to quality assessment, such as domain-specific metadata about sensor accuracy or the organizational structure of agencies. PMAF stores this potentially enormous amount of metadata compactly and presents it to the user in an intuitive graphical format, together with PMAF-generated assessments that enable ...
This paper describes EMMA (Evolution-Memory Management Assistant), a tool to provide collaborativ... more This paper describes EMMA (Evolution-Memory Management Assistant), a tool to provide collaborative support for the release-based Evolutionary Delivery Model [4] of system development. Evolution information in EMMA is organized around four interrelated concepts: (1) properties, (2) assumptions, (3) solutions, and (4) change events. This information provides context to relate development decisions to higher-level purposes and to the assumptions under which decisions are made. By managing information about design decisions and directions for change, EMMA helps project managers to understand the issues involved and to be proactive in planning for system evolution.
this paper, we present a .new approach to enhancing an expert system with an explanation facility... more this paper, we present a .new approach to enhancing an expert system with an explanation facility. The approach comprises both software components and a methodology for assembling the components. The methodology is minimally intrusive into existing expert system development practice
We report on two preliminary evaluations of RIPTIDES, a system that combines information extracti... more We report on two preliminary evaluations of RIPTIDES, a system that combines information extraction (IE), extraction-based summarization, and natural language generation to support user-directed multidocument summarization. We report first on a case study of the system's ability to detect discrepancies in numerical estimates appearing in different news articles at different time points in the evolution of a story, using a corpus of more than 100 articles from multiple sources about an earthquake in Central America in January 2001. We then report on how our domain-independent, extraction-based summarizer fared on the DUC multidocument task, discussing the extent to which we were able to improve cohesion and organization over the baselines, without unduly sacrificing content relevance.
: The Romulus Report describes the Romulus Computer Security Properties Modeling Environment. Rom... more : The Romulus Report describes the Romulus Computer Security Properties Modeling Environment. Romulus is an environment and methodology for the modeling, analysis, and verification of trusted computer systems, together with supporting tools. The Romulus methodology is based on a mathematical theory of security developed at Odyssey Research Associates. The theory formalizes multilevel information flow security by introducing restrictiveness, a hookup security property. This means that a collection of secure restrictive composite system. Because of its composability restrictiveness is a useful security property for large, complex, distributed systems. Volume I presents an overview of the important ideas and tools incorporated into the Romulus system. Volume II describes the underlying theory of security as well as Mathesis, the mathematical foundation of Romulus.
: Expert systems were one of the first applications to emerge from initial research in artificial... more : Expert systems were one of the first applications to emerge from initial research in artificial intelligence, and the explanation of expert system reasoning was one of the first applications of natural language generation. This is because the need for explanations is obvious, and generation from a knowledge-based application such as reasoning should be relatively straightforward. However, while explanation has been universally acknowledged as a desirable functionality in expert systems, natural language generation has not taken a central place in contemporary expert system development. For example, a popular text book about expert systems such as (Giarratano and Riley, 1994) stresses twice in the introduction the importance of explanation, but provides no further mention of explanation in the remaining 600 pages. (The book is based on the popular CLIPS framework.) In this paper, we present a new approach to enhancing an expert system with an explanation facility. The approach comp...
Pi.,mmqum bj 1w= 1W~m an~td id~m um~m ,t~= w~ ',m-am wmxlg MWt eT.1w ~tnIWU.o mE=wig u~ m =m gow ... more Pi.,mmqum bj 1w= 1W~m an~td id~m um~m ,t~= w~ ',m-am wmxlg MWt eT.1w ~tnIWU.o mE=wig u~ m =m gow W ra ,-m w Ord 3W-M 0 i 0in o I 0 do ow $ew d Sew w t.alr bu c-W.o w wty cMw mom d ci d 000oft rc~md W.~ f1r~w rbejd~~w tWt* N.mw.m~acm-1Wif i n opou""ewpm 1315 JOWw 0MKI SLA 12i. AkrnI VA 20=4= wl t to 0Kf. d Mw e wd &jg. Plvpwu A.mlaon P aim W00 1. W*V=m 17. SECURiIY CLASSIFICATION 15SECURITYCLASSIFICATION III SECURIYCLASSIFICATION 20UMITATION OF ABSTRACT
Expert systems were one of the rst applications to emerge from initial research in artiicial inte... more Expert systems were one of the rst applications to emerge from initial research in artiicial intelligence , and the explanation of expert system reasoning was one of the rst applications of natural language generation. 1 This is because the need for explanations is obvious, and generation from a knowledge-based application such as reasoning should be relatively straightforward. However, while explanation has been universally acknowledged as a desirable functionality in expert systems, natural language generation has not taken a central place in contemporary expert system development. For example, a popular text book about expert systems such as (Giarratano and Riley, 1994) stresses twice in the introduction the importance of explanation, but provides no further mention of explanation in the remaining 600 pages. (The book is based on the popular CLIPS framework.) In this paper, we present a new approach to providing an expert system with an explanation facility. The approach comprise...
: The Romulus Report describes the Romulus Computer Security Properties Modeling Environment. Rom... more : The Romulus Report describes the Romulus Computer Security Properties Modeling Environment. Romulus is an environment and methodology for the modeling, analysis, and verification of trusted computer systems, together with supporting tools. The Romulus methodology is based on a mathematical theory of security developed at Odyssey Research Associates. The theory formalizes multilevel information flow security by introducing restrictiveness, a hookup security property. This means that a collection of secure restrictive composite system. Because of its composability, restrictiveness is a useful security property for large, complex, distributed systems. Volume I presents an overview of the important ideas and tools incorporated into the Romulus system. Volume II describes the underlying theory of security as well as Mathesis, the mathematical foundation of Romulus.
Pi.,mmqum bj 1w= 1W~m an~td id~m um~m ,t~= w~ ',m-am wmxlg MWt eT.1w ~tnIWU.o mE=wig u~ m =m gow ... more Pi.,mmqum bj 1w= 1W~m an~td id~m um~m ,t~= w~ ',m-am wmxlg MWt eT.1w ~tnIWU.o mE=wig u~ m =m gow W ra ,-m w Ord 3W-M 0 i 0in o I 0 do ow $ew d Sew w t.alr bu c-W.o w wty cMw mom d ci d 000oft rc~md W.~ f1r~w rbejd~~w tWt* N.mw.m~acm-1Wif i n opou""ewpm 1315 JOWw 0MKI SLA 12i. AkrnI VA 20=4= wl t to 0Kf. d Mw e wd &jg. Plvpwu A.mlaon P aim W00 1. W*V=m 17. SECURiIY CLASSIFICATION 15SECURITYCLASSIFICATION III SECURIYCLASSIFICATION 20UMITATION OF ABSTRACT
Pi.,mmqum bj 1w= 1W~m an~td id~m um~m ,t~= w~ ',m-am wmxlg MWt eT.1w ~tnIWU.o mE=wig u~ m =m gow ... more Pi.,mmqum bj 1w= 1W~m an~td id~m um~m ,t~= w~ ',m-am wmxlg MWt eT.1w ~tnIWU.o mE=wig u~ m =m gow W ra ,-m w Ord 3W-M 0 i 0in o I 0 do ow $ew d Sew w t.alr bu c-W.o w wty cMw mom d ci d 000oft rc~md W.~ f1r~w rbejd~~w tWt* N.mw.m~acm-1Wif i n opou""ewpm 1315 JOWw 0MKI SLA 12i. AkrnI VA 20=4= wl t to 0Kf. d Mw e wd &jg. Plvpwu A.mlaon P aim W00 1. W*V=m 17. SECURiIY CLASSIFICATION 15SECURITYCLASSIFICATION III SECURIYCLASSIFICATION 20UMITATION OF ABSTRACT
Expert systems were one of the first applications to emerge from initial research in artificial i... more Expert systems were one of the first applications to emerge from initial research in artificial intelligence, and the explanation of expert system reasoning was one of the first applications of natural language generation3 This is because the need for explanations is obvious, and generation from a knowledge-based application such as reasoning should be relatively straightforward. However, while explanation has been universally acknowledged as a desirable functionality in expert systems, natural language generation has not taken a central place in contemporary expert system development. For example, a popular.text book about expert systems such as (Giarratano and Riley, 1994) stresses twice in the introduction the importance of explanation, but provides no further mention of explanation in the remaining 600 pages. (The book is based on the popular CLIPS framework.) In this paper, we present a new approach to enhancing an expert system with an explanation facility. The approach comprises both software components and a methodology for assembling the components. The methodology is minimally intrusive into existing expert system development practice. This paper is structured as follows. In Section• 2, we discuss previous work and identify shortcomings. We present our analysis of knowledge • types in Section 3. Section 4 presents the •Security Assistant and its explanation facility. Finally, we sketch a general methodology for explainable expert system engineering in Section 5. 1The work reported inthis paper was carried out while all authors were at CoGenTex, Inc., and is in part supported by contract F30602-96-C-0076 awarded by the Information Directorate of the Air Force Research Laboratory at the Rome Research Site. We would like to thank Rob Flo, project engineer, for his support and feedback. We would also like to thank Joe McEnerney for help in integrating the explanation facility with the SA, and Mike White and two anonymous reviewers for useful comments.
Proc. of SPIE Vol, 2007
... R. Ismail, C. Boyd. “A Survey of Trust and Reputation Systems for Online Service Provision” D... more ... R. Ismail, C. Boyd. “A Survey of Trust and Reputation Systems for Online Service Provision” Decision Support Systems 2006. 12. J. Golbeck, Computing and Applying Trust in Web-Based Social Networks, PhD Thesis, University of Maryland, 2005. 13. C. Ziegler and G. Lausen, “ ...
Abstract: Static computer security policies may sometimes be inadequate for two reasons:(1) the h... more Abstract: Static computer security policies may sometimes be inadequate for two reasons:(1) the high-level objectives of the security policy, and the approach to enforcing that policy, may change over time; and (2) the computer system itself may change its structure or ...
Is. REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS WlLASIFIED N/A SECURITY CLASSIFICATIO... more Is. REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS WlLASIFIED N/A SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTIONIAVAILAiIUTY OF REPORT VIA Approved for public release; 2b. DECLASSIFICATION/ DOWNGRADING SCHEDULE Apoe o ulcrlae /A distribution unlimited. 4. PERFORMING ORGANIZATION REPORT NUMBER(S) S. MONITORING ORGANIZATION REPORT NUMBER(S) N/A RADC-TR-87-222 6e. NAME OF PERFORMING ORGANIZATION Ib. OFFICE SYMBOL 7a. NAME OF MONITORING ORGANIZATION
This paper describes EMMA (Evolution-Memory Management Assistant), a tool to provide collaborativ... more This paper describes EMMA (Evolution-Memory Management Assistant), a tool to provide collaborative support for the release-based Evolutionary Delivery Model [4] of system development. Evolution information in EMMA is organized around four interrelated concepts: (1) properties, (2) assumptions, (3) solutions, and (4) change events. This information provides context to relate development decisions to higher-level purposes and to the assumptions under which decisions are made. By managing information about design decisions and directions for change, EMMA helps project managers to understand the issues involved and to be proactive in planning for system evolution. 1 The EMMA Metamodel for System Evolution EMMA, an Evolution-Memory Management Assistant, is a collaborative information management tool being developed by CoGenTex, Inc. under the sponsorship of the Evolutionary Development of Complex Software (EDCS) program to address the needs of managers and developers when developing and ...
Public reporting burden for this collection of information is estimated to average 1 hour per res... more Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports,
Uploads
Papers by Daryl McCullough