Optimizations for Risk-Aware Secure Supply Chain Master Planning J.UCS Special Issue: Security in Information Systems

Total Page:16

File Type:pdf, Size:1020Kb

Optimizations for Risk-Aware Secure Supply Chain Master Planning J.UCS Special Issue: Security in Information Systems Optimizations for Risk-Aware Secure Supply Chain Master Planning J.UCS Special Issue: Security in Information Systems Axel SchrÄopfer (SAP Research Karlsruhe, Germany [email protected]) Florian Kerschbaum (SAP Research Karlsruhe, Germany fl[email protected]) Christoph SchÄutz (SAP Research Karlsruhe, Germany [email protected]) Richard Pibernik (Supply Chain Management Institute, EBS Wiesbaden, Germany [email protected]) Abstract: Supply chain master planning strives for optimally aligned production, warehousing and transportation decisions across a multiple number of partners. Its execution in practice is limited by business partners' reluctance to share their vital business data. Secure Multi-Party Computation (SMC) can be used to make such collaborative computations privacy-preserving by applying cryptographic techniques. Thus, computation becomes acceptable in practice, but the performance of SMC re- mains critical for real world-sized problems. We assess the disclosure risk of the input and output data and then apply a protection level appropriate for the risk under the assumption that SMC at lower protection levels can be performed faster. This speeds up the secure computation and enables signi¯cant improvements in the supply chain. 1 Introduction Supply chain master planning (SCMP) strives for optimally aligned production, warehousing and transportation decisions across multiple partners. In practice, we can commonly observe a decentralized coordination mechanism (referred to as upstream planning) that usually only leads to local optima rather than to global supply chain optima [Dudek, Stadtler 2005]. At least in theory, optimal master plans can be generated for the whole supply chain if some planning unit has at its disposal all relevant information pertinent to the individual partners in the supply chain. It is, however, a well known fact that companies are typ- ically not willing to share sensitive private data (e.g. cost and capacity data) ([Pibernik, Sucky 2006, Pibernik, Sucky 2007]). They perceive the risk that the central planning unit or other parties misuse data to their disadvantage in order to obtain additional bene¯ts. The major obstacles to centralized master planning can be removed if a mech- anism for securely and privately computing the supply master plan is in place [Atallah et al. 2009]. A central planning unit, e.g. a 4th party logistics provider (4PL), could then determine globally optimal master plans and distribute these to the individual partners involved in the supply chain. To this end, Secure (Multi-Party) Computation (SMC) can be employed such that the relevant data does not need to be disclosed even to the central planning unit. This o®ers the ultimate level of protection, since no data sharing risk remains. In this paper we propose a framework for secure centralized supply chain master planning (SS- CMP). We introduce a basic model for centralized supply chain master planning and, from this, derive the relevant data a central planning unit requires to opti- mally coordinate manufacturing and transportation decisions. We then analyse this data with respect to its "criticality". Criticality refers to how sensitive cer- tain pieces of data are and how willing the di®erent partners will be to share this data. The criticality is determined by the perceived risks associated with data sharing and its prior public knowledge. In this context, risk can be characterized by the potential negative impact that occurs if a partner misuses the data to its own bene¯t and the likelihood for this to happen. We derive an overall criti- cality assessment for each data element that is relevant for supply chain master planning and use information about on the prior (public) knowledge of the data to determine an overall criticality score. This criticality score constitutes an in- put to secure computation of centralized supply chain master plans. We map criticality scores to protection levels which consist of certain technologies and parameters for SMC. Lower protection levels lead to faster SMC implementa- tions. We propose a mixed approach to SMC combining the di®erent protection levels in one implementation and propose modi¯cations to Linear Programming (LP) that optimize the e®ort involved by selecting the pivot element based on the protection level. We experimentally verify the e®ectiveness of the new algorithm. 2 Related Work Numerous works in the area of supply chain management exists on supply chain master planning as well as information sharing and collaboration in supply chains. In general, it is a well acknowledged fact that sharing relevant infor- mation and planning in a collaborative fashion can improve supply chain per- formance and mitigate the consequences of demand variability, especially with respect to the well-known bullwhip e®ect (see for example [Chen et al. 1999, Lee et al. 1997, Min et al. 2005, Yu et al. 2001]). With respect to supply chain master planning, numerous authors have proposed multi-stage models that can be utilized to coordinate planning activities across multiple locations and ¯rms (e.g. [Fleischmann, Meyr 2003, Jayaraman, Pirkul 2001, Shapiro 2001]). Various authors have stated that employing a centralized approach to master planning will lead to better results as compared to decentralized approaches that are most commonly employed in industry. [Simpson, ErengÄuc2001], for example, analyze the disadvantages of upstream coordination in comparison with cen- tralized coordination. They compute the average gap between centralized and upstream coordination for several test scenarios with varying cost parameters and demand patterns. Similar ¯ndings are reported in [Pibernik, Sucky 2007]. However, centralized supply chain planning has not been widely adopted in industry. [HolstrÄomet al. 2002] states: "it is di±cult, or maybe even impossi- ble, to get a large network consisting of independent companies to agree on and implement a centralised planning and control solution." Reluctance to- wards information sharing (a prerequisite for centralized master planning) has been identi¯ed as the main obstacle that inhibits centralized master planning ([Pibernik, Sucky 2006, Pibernik, Sucky 2007]). For this reason, alternative ap- proaches have been developed that either build on negotiation based coordina- tion ([Dudek, Stadtler 2005]) or hybrid forms ([Pibernik, Sucky 2006]). So far there has been no research on supply chain master planning based on mech- anisms that privacy preserving data sharing and computation. To the best of our knowledge the only approach to secure multi-party computation in the area of supply chain management can be found in [Atallah et al. 2009]. The authors develop secure protocols for a Collaborative Planning, Forecasting, and Replen- ishment (CPFR) process. Next to the fact that we, in our paper, consider a di®erent problem setting, a major distinction between the research presented in [Atallah et al. 2009] and our research is that they do not consider di®erent pro- tection levels for di®erent risks of data to be shared. They follow the approach to provide the highest protection for all data using a specially developed pro- tocol. Their protocols are two-party protocols, while we consider a multi-party problem. We will now review related work for SMC. SMC allows a set of n players, P = P1;:::;Pn, to jointly compute an arbitrary function of their private inputs, f(x1; : : : ; xn). The computation is privacy pre- serving, i.e. nothing else is revealed to a player than what is inferable by his private input and the outcome of the function. A cryptographic protocol is then run between the players in order to carry out the computation. Even if there are adversarial players, the constraints on correctness and privacy can be proven to hold under well stated settings. These settings consider the type of adversary as well as his computing power which can be bounded or unbounded. An adversary can be passive, i.e. following the protocol correctly but trying to learn more or he can be active, by arbitrarily deviating. For the two-party case it has been proven by Yao in [Yao 1982], that any arbitrary function is computable in privacy pre- serving fashion, using garbled binary circuits. This approach has been extended to the multi-party case in [Beaver et al. 1990, Goldreich et al. 1987]. Alternative approaches base on secret sharing schemes. A player's secret s is split into m shares which are then distributed to m players. Players can compute intermedi- ate results on the shares, and in the end a reconstruction is performed in order to receive the ¯nal result. Other approaches utilize semantically secure homo- morphic encryption (HE) [Damgºard,Jurik 2001], a public encryption scheme, where E(x) ¢ E(y) = E(x + y) and x cannot be deduced by E(x). Using the general approach leads to solutions that have high complexity and are therefore almost always not practically feasible [Li, Atallah 2006]. Thus, in order to get a practical solution, a dedicated protocol should be constructed. Atallah et al. constructed solutions for a couple of supply chain problems, e.g. planning, forecasting, replenishment, benchmarking, capacity allocation and e-auctions ([Atallah et al. 2009, Atallah et al. 2004, Atallah et al. 2003]). Their cryptographic protocols base on additive secret sharing, homomorphic encryption and garbled circuits. A contribution of Atallah et al. which is closely related to ours is that of secure linear programming [Li, Atallah 2006]. It uses the simplex method intro- duced by Dantzig in [Dantzig, Thapa 1997] to solve linear programs which get expressed as a matrix D. The method consists of two steps: selecting the pivot element drs and pivoting all elements dij of D over this element. The pivot step 0 sets the new value of dij, denoted dij, by d0 = 1 for i = r and j = s (pivot element) ij drs d0 = dij for i = r and j 6= s (pivot row) ij drs d0 = ¡dij for i 6= r and j = s (pivot column) ij drs d0 = dij ¡disdrj for i 6= r and j 6= s (all other elements): ij drs The method is repeated until the optimal solution of the LP is found (resp., it is stated that the problem is unbounded or infeasible).
Recommended publications
  • Polska Myśl Techniczna W Ii Wojnie Światowej
    CENTRALNA BIBLIOTEKA WOJSKOWA IM. MARSZAŁKA JÓZEFA PIŁSUDSKIEGO POLSKA MYŚL TECHNICZNA W II WOJNIE ŚWIATOWEJ W 70. ROCZNICĘ ZAKOŃCZENIA DZIAŁAŃ WOJENNYCH W EUROPIE MATERIAŁY POKONFERENCYJNE poD REDAkcJą NAUkoWą DR. JANA TARCZYńSkiEGO WARSZAWA 2015 Konferencja naukowa Polska myśl techniczna w II wojnie światowej. W 70. rocznicę zakończenia działań wojennych w Europie Komitet naukowy: inż. Krzysztof Barbarski – Prezes Instytutu Polskiego i Muzeum im. gen. Sikorskiego w Londynie dr inż. Leszek Bogdan – Dyrektor Wojskowego Instytutu Techniki Inżynieryjnej im. profesora Józefa Kosackiego mgr inż. Piotr Dudek – Prezes Stowarzyszenia Techników Polskich w Wielkiej Brytanii gen. dyw. prof. dr hab. inż. Zygmunt Mierczyk – Rektor-Komendant Wojskowej Akademii Technicznej im. Jarosława Dąbrowskiego płk mgr inż. Marek Malawski – Szef Inspektoratu Implementacji Innowacyjnych Technologii Obronnych Ministerstwa Obrony Narodowej mgr inż. Ewa Mańkiewicz-Cudny – Prezes Federacji Stowarzyszeń Naukowo-Technicznych – Naczelnej Organizacji Technicznej prof. dr hab. Bolesław Orłowski – Honorowy Członek – założyciel Polskiego Towarzystwa Historii Techniki – Instytut Historii Nauki Polskiej Akademii Nauk kmdr prof. dr hab. Tomasz Szubrycht – Rektor-Komendant Akademii Marynarki Wojennej im. Bohaterów Westerplatte dr Jan Tarczyński – Dyrektor Centralnej Biblioteki Wojskowej im. Marszałka Józefa Piłsudskiego prof. dr hab. Leszek Zasztowt – Dyrektor Instytutu Historii Nauki Polskiej Akademii Nauk dr Czesław Andrzej Żak – Dyrektor Centralnego Archiwum Wojskowego im.
    [Show full text]
  • Trusted Internet Connections (TIC) Reference Architecture Document Version 2.2
    Trusted Internet Connections (TIC) Reference Architecture Document Version 2.2 Federal Interagency Technical Reference Architectures June 19, 2017 Federal Network Resilience Revision History Date Version Description Approved By 4/20/09 1.0 Agency feedback M.A. Brown, RADM, USN incorporated and released DAS Cybersecurity & Communications, DHS 3/24/2011 2.0 Capabilities and M. Coose architecture updated by the Director, Federal Network TIC 2.0 Working Group. Security, DHS Final version prepared by DHS. 9/1/2011 2.0 Final approval by OMB M. Coose and reference to M-11-11. Director, Federal Network Security, DHS 9/16/2013 2.0 Added Appendix H – John Streufert Cloud Considerations. Director, Federal Network Resilience, DHS 6/9/2017 2.2 Modified Secure Mark Kneidinger communications from Director, Federal Network Critical to Recommended Resilience, DHS TIC Reference Architecture V2.2 i Table of Contents ACKNOWLEDGEMENTS ........................................................................................................................................ 1 ORIGINAL TIC TECHNICAL ARCHITECTURE STRATEGY TEAM MEMBERS ................................................................. 1 KEY STAKEHOLDERS ................................................................................................................................................. 1 ADVISORS .................................................................................................................................................................. 2 TIC 2.0 UPDATE PARTICIPANTS................................................................................................................................
    [Show full text]
  • Design of Discrete-Time Chaos-Based Systems for Hardware Security Applications
    University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Doctoral Dissertations Graduate School 8-2020 Design of Discrete-time Chaos-Based Systems for Hardware Security Applications Aysha Shanta University of Tennessee, [email protected] Follow this and additional works at: https://trace.tennessee.edu/utk_graddiss Recommended Citation Shanta, Aysha, "Design of Discrete-time Chaos-Based Systems for Hardware Security Applications. " PhD diss., University of Tennessee, 2020. https://trace.tennessee.edu/utk_graddiss/6823 This Dissertation is brought to you for free and open access by the Graduate School at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Doctoral Dissertations by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. To the Graduate Council: I am submitting herewith a dissertation written by Aysha Shanta entitled "Design of Discrete- time Chaos-Based Systems for Hardware Security Applications." I have examined the final electronic copy of this dissertation for form and content and recommend that it be accepted in partial fulfillment of the equirr ements for the degree of Doctor of Philosophy, with a major in Electrical Engineering. Garrett Rose, Major Professor We have read this dissertation and recommend its acceptance: Jayne Wu, Hoon Hwangbo, Jinyuan Stella Sun Accepted for the Council: Dixie L. Thompson Vice Provost and Dean of the Graduate School (Original signatures are on file with official studentecor r ds.) Design and Implementation of Discrete-Time Chaos-Based Systems for Hardware Security Applications A Dissertation Presented for the Doctor of Philosophy Degree The University of Tennessee, Knoxville Aysha Siddique Shanta August 2020 © by Aysha Siddique Shanta, 2020 All Rights Reserved.
    [Show full text]
  • A New Efficient Digital Image Encryption Based on Inverse Left
    entropy Article A New Efficient Digital Image Encryption Based on Inverse Left Almost Semi Group and Lorenz Chaotic System Irfan Younas 1,* and Majid Khan 2,3 1 Department of Mathematics, Quaid-i-Azam University, Islamabad 44000, Pakistan 2 Department of Applied Mathematics and Statistics, Institute of Space Technology Islamabad, Islamabad 44000, Pakistan; [email protected] or [email protected] 3 Cyber and Information Security Lab, Institute of Space Technology Islamabad, Islamabad 44000, Pakistan * Correspondence: [email protected] Received: 12 October 2018; Accepted: 7 November 2018; Published: 30 November 2018 Abstract: In this research article, we propose a new structure namely inverse left almost semigroup (LA-semigroup) by adding confusion in our proposed image encryption scheme along with discrete and continuous chaotic systems in order to complement the diffusion characteristics. The performance analysis was conducted in terms of the correlation analysis, the pixels uniformity analysis, the sensitivity analysis, the information entropy analysis, and pixels difference based measurements. The results show that the proposed algorithm has better information security properties, which can provide strong security and a high performance. Keywords: inverse left almost semigroup; confusion and diffusion; chaotic systems; statistical analysis 1. Introduction The existing world demands fast and secure communication. The bandwidth is increasing every day due to third generation, fourth generation and fifth generation technologies. Digital contents can be easily accessed through any geographical remote area because of the ideology of a global village. By advancing the technologies, smart and simple to access information from any remote station creates a massive insecurity of digital information.
    [Show full text]
  • Internet of Underwater Things and Big Marine Data Analytics – a Comprehensive Survey
    ACCEPTED BY IEEE COMMUNICATION SURVEYS & TUTORIALS, 2021 1 Internet of Underwater Things and Big Marine Data Analytics – A Comprehensive Survey Mohammad Jahanbakht , Student Member, IEEE, Wei Xiang , Senior Member, IEEE, Lajos Hanzo , Fellow, IEEE, and Mostafa Rahimi Azghadi , Senior Member, IEEE Abstract—The Internet of Underwater Things (IoUT) is an as well as to make informed decisions and set regulations related emerging communication ecosystem developed for connecting to the maritime and underwater environments around the world. underwater objects in maritime and underwater environments. The IoUT technology is intricately linked with intelligent boats and ships, smart shores and oceans, automatic marine trans- Index Terms—Internet of Things, Big Data, Underwater Net- portations, positioning and navigation, underwater exploration, work Architecture, Data Acquisition, Marine and Underwater disaster prediction and prevention, as well as with intelligent Databases/Datasets, Underwater Wireless Sensor Network, Image monitoring and security. The IoUT has an influence at various and Video Processing, Machine Learning, Deep Neural Networks. scales ranging from a small scientific observatory, to a mid- sized harbor, and to covering global oceanic trade. The network architecture of IoUT is intrinsically heterogeneous and should be sufficiently resilient to operate in harsh environments. This NOMENCLATURE creates major challenges in terms of underwater communications, ASIC Application-Specific Integrated Circuit whilst relying on limited energy resources. Additionally, the AUV Autonomous Underwater Vehicles volume, velocity, and variety of data produced by sensors, hydrophones, and cameras in IoUT is enormous, giving rise BER Bit Error Rate to the concept of Big Marine Data (BMD), which has its BMD Big Marine Data own processing challenges.
    [Show full text]
  • Secure Embedded Computer Design Using Emerging Technologies
    University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Doctoral Dissertations Graduate School 12-2019 Secure Embedded Computer Design using Emerging Technologies Md Badruddoja Majumder University of Tennessee Follow this and additional works at: https://trace.tennessee.edu/utk_graddiss Recommended Citation Majumder, Md Badruddoja, "Secure Embedded Computer Design using Emerging Technologies. " PhD diss., University of Tennessee, 2019. https://trace.tennessee.edu/utk_graddiss/5753 This Dissertation is brought to you for free and open access by the Graduate School at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Doctoral Dissertations by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. To the Graduate Council: I am submitting herewith a dissertation written by Md Badruddoja Majumder entitled "Secure Embedded Computer Design using Emerging Technologies." I have examined the final electronic copy of this dissertation for form and content and recommend that it be accepted in partial fulfillment of the equirr ements for the degree of Doctor of Philosophy, with a major in Electrical Engineering. Garrett Rose, Major Professor We have read this dissertation and recommend its acceptance: Nicole McFarlane, Jinyuan Sun, Hoon Hwangbo Accepted for the Council: Dixie L. Thompson Vice Provost and Dean of the Graduate School (Original signatures are on file with official studentecor r ds.) Secure Embedded Computer Design using Emerging Technologies A Dissertation Presented for the Doctor of Philosophy Degree The University of Tennessee, Knoxville Md Badruddoja Majumder December 2019 c by Md Badruddoja Majumder, 2019 All Rights Reserved. ii I would like to dedicate this work to my parents who always encouraged me for higher studies and gave every support in the way.
    [Show full text]
  • Cryptanalysis of Bivium Using a Boolean All Solution Solver
    Cryptanalysis of Bivium using a Boolean all solution solver Virendra Sule Anmol Yadav [email protected] [email protected] Dept. of Electrical Engg. Dept. of Aerospace Engg. Indian Institute of Technology Bombay Mumbai 400076 India March 2, 2018 Abstract Cryptanalysis of Bivium is presented with the help of a new Boolean system solver algorithm. This algorithm uses a Boolean equation model of Bivium for a known keystream. The Boolean solver uses implicant based computation of satisfying assignments and is distinct from well known CNF-satisfiability solvers or algebraic cryptanalysis methods. The solver is also inherently parallel and returns all satisfying assignments of the system of equations in terms of implicants. Crypt- analysis of Bivium is classified in four categories of increasing strength and it is shown that the solver algorithm is able to complete the key recovery in category 2 in 48 hours by a Python code. (This benchmark is improved to 3 hours by a C++ code). Computational algorithms for formation of equations and symbolic operations are also developed afresh for handling Boolean functions and presented. Limitations of these implementations are determined with respect to Bivium model and its cryptanalysis which shall be useful for cryptanalysis of general stream ciphers. 1 Introduction This paper reports 80 bit key recovery of the Bivium cipher from an output stream with a given IV using a Boolean system solver algorithm developed recently by one of the authors and announced in [4]. This solver is based on Boolean computations and is principally different from existing algebraic or 1 CNF-satisfiability (SAT) based solvers of Boolean systems.
    [Show full text]
  • Security Trade-Offs in Cloud Storage Systems
    Security Trade-Offs in Cloud Storage Systems vorgelegt von Dipl.-Wirt.-Inf. Steffen Muller¨ geb. in Bielefeld von der Fakultat¨ IV - Elektrotechnik und Informatik der Technischen Universitat¨ Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Florian Tschorsch Gutachter: Prof. Dr. Stefan Tai Gutachter: Prof. Dr. Alexander Pretschner Gutachter: Prof. Dr. Hannes Hartenstein Tag der wissenschaftlichen Aussprache: 07.07.2017 Berlin 2017 Abstract Securing software systems, is of paramount importance today. This is especi- ally true for cloud systems, as they can be attacked nearly anytime from every- where over the Internet. Ensuring security in general, however, typically has a negative impact on performance, usability, and increases the system’s complex- ity. For cloud systems, which are built for high performance and availability as well as elastic scalability, security, therefore, may annihilate many of these ori- ginal quality properties. Consequently, security, especially for cloud systems, can be understood as a trade-off problem where security mechanisms, applied to protect the system from specific threats and to achieve specific security goals, trade in security for other quality properties. For Cloud Storage Systems (CSS)—i.e., distributed storage systems that repli- cate data over a cluster of nodes in order to manage huge data amounts, highly volatile query load (elastic scalability), and extraordinary needs for availability and fault-tolerance—this trade-off problem is particularly prominent. Already, the different original quality properties of CSS cannot be provided at the same time and, thus, lead to fundamental trade-offs such as the trade-off between consistency, availability, and partition tolerance (see, e.g.: [53]).
    [Show full text]
  • Secure Communications One Time Pad Cipher
    Cipher Machines & Cryptology Ed. 6.2 – Dec 18, 2014 © 2009 - 2015 D. Rijmenants http://users.telenet.be/d.rijmenants THE COMPLETE GUIDE TO SECURE COMMUNICATIONS WITH THE ONE TIME PAD CIPHER DIRK RIJMENANTS Abstract : This paper provides standard instructions on how to protect short text messages with one-time pad encryption. The encryption is performed with nothing more than a pencil and paper, but provides absolute message security. If properly applied, it is mathematically impossible for any eavesdropper to decrypt or break the message without the proper key. Keywords : cryptography, one-time pad, encryption, message security, conversion table, steganography, codebook, covert communications, Morse cut numbers. 1 Contents Section Page I. Introduction 2 II. The One-time Pad 3 III. Message Preparation 4 IV. Encryption 5 V. Decryption 6 VI. The Optional Codebook 7 VII. Security Rules and Advice 8 VIII. Appendices A through H 17 I. Introduction One-time pad encryption is a basic yet solid method to protect short text messages. This paper explains how to use one-time pads, how to set up secure one-time pad communications and how to deal with its various security issues. It is easy to learn to work with one-time pads, the system is transparent, and you do not need special equipment or any knowledge about cryptographic techniques or math. One-time pad encryption is basically an equation with two unknowns, which is mathematically impossible to solve. If properly used, the system provides truly unbreakable encryption. Without the proper key, it will be impossible to decrypt a one-time pad encrypted message by whatever type of cryptanalytic attack, even with infinite computational power and infinite time.
    [Show full text]
  • DAU Cloud Acquisition Guidebook
    Defense Acquisition University DoD Cloud Computing Acquisition Guidebook November 2019 Version 1.2 This page intentionally left blank DOCUMENT CHANGE HISTORY Version Date Change 1.0 18 December 2018 Initial Version 1.1 20 April 2019 Updated with latest DoD Cloud Strategy (references, executive summary and 4.2.1) Updated Financial Audit Requirements (added paragraph 4.2.3.4) to include Special Organization Considerations (SOC) Added additional strategic contracting considerations in paragraph 4.2.5 Added paragraph (4.2.7) on using Services Contracts (DoD 5000.74) for acquiring Cloud Services 1.2 5 November 2019 Added sections 4.3.4.5 Testing and 4.4.6 Cybersecurity T&E Added additional Testing considerations in applicable areas such as in definitions, references, and Service level agreements (SLAs) Added DoD Digital Modernization Strategy to References Updated status of ISO/IEC 19086-1:2016 Standard (Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts) Added (DRAFT) NIST Special Publication 800-171B Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations Enhanced Security Requirements for Critical Programs and High Value Assets Added CIO Cloud Smart Application Rationalization Playbook to references Updated references for DoD Enterprise DevSecOps Added “Reference Design Version 1.0 12 August 2019 (public)” and the DoD A&S and CIO signed memo “Software Development, Security, and Operations for Software Agility” Added Navy Cloud Broker Information and Air Force Cloud One Information to Section 6.0 DoD Cloud Acquisition Guidebook ACKNOWLEDGEMENTS / LEGAL STATEMENT: The following DoD/Federal government personnel (or FFRDC support) provided content to this Guidebook: Author: Ardis B.
    [Show full text]
  • Name Street City State Zip Code 1 Academic
    NAME STREET CITY STATE ZIP CODE 1 ACADEMIC TUTORING 2550 CORPORATE PLACE SUITE C108 MONTEREY PARK CA 91754 1 TO 1 TUTOR JD FACTORS, LLC PALOS VERDES CA 90274 1 WORLD GLOBES AND MAPS 1605 SOUTH JACKSON ST. SEATTLE WA 98144 1:1 ONLINE TUTORING SERVICES 37303 CAROUSEL CIR PALMDALE CA 93552 1060 TECHNOLOGIES 1406 77TH STREET DARIEN IL 60561 10-S TENNIS SUPPLY 1400 NW 13TH AVE POMPANO BEACH FL 33069 1ST IN PADLOCKS 100 FACTORY ST NASHUA NH 3060 1STOP CLARINET & SAX SHOP 11186 SPRING HILL DRIVE SPRING HILL FL 34609 24 HOUR TUTORING LLC 2637 E ATLANTIC BLVD #20686 POMPANO BEACH FL 33062 24/7 ONLINE EDUCATION PO BOX 10431 CANOGA PARK CA 91309 2ND WIND EXERCISE, INC. 4412 A/B EAST NEW YORK ST. AURORA IL 60504 3M CENTER 2807 PAYSPHERE CIR CHICAGO IL 60674-0000 4IMPRINT 25303 NETWORK PLACE CHICAGO IL 60673-1253 4MD MEDICAL SOLUTIONS 15 AMERICA AVE. SUITE 207 LAKEWOOD NJ 8701 4N6 FANATICS 253 WREN RIDGE DRIVE EAGLE POINT KS 97524 5- MINUTE KIDS 3580 CRESTWOOD DRIVE LAPEER MI 48446 59 AUTO REPAIR 24010 WEST RENWICK PLANIFIELD IL 60544 8 to 18 MEDIA, INC. 1801 S. MEYERS RD. SUITE 300 OAKBROOK IL 60181 9TH PLANET, LLC 5865 NEAL AVENUE NORTH, NO 214 STILLWATER MN 55082 A & E HOME VIDEO P.O. BOX 18753 NEWARK NJ 7191 A & E TELEVISION NETWORKS 235 EAST 45TH ST. NEW YORK NY 10017 A & M PHOTO WORLD 337 E. 89TH ST. BROOKLYN NY 11236 A & M RESOURCES 215 N. ARLINGTON HEIGHTS ROAD ARLINGTON HEIGHTS IL 60004 A & R DIAGNOSTIC SERVICE INC.
    [Show full text]
  • Manual One Time Pads
    The Manual One -time Pad Thanks to Dirk Rijmenants http://users.telenet.be/d.rijmenants/en/otp.htm This page is a guideline to the use of one-time pads and how to set up one-time pad communications in only four steps. One-time pad encryption is unbreakable if properly applied. However, the security of the system entirely depends on the correct use of the one-time pads and the their secure distribution. To obtain the highest level of security it's an absolute must to strictly follow all rules without exception. These rules are not negotiable. One-time pad is not a practical encryption system. However, if properly used, it will be absolutely secure and unbreakable. One-time Pad Communication in Four Steps ° Step 1: Creating One-time Pads ° Step 2: Preparing the Message ° Step 3: Encryption and Decryption ° Step 4: Important Security Issues ° A Software Number Generator ° Summary Step 1 - Creating One-time Pads The basis of the system are the one-time pad pads. A one-time pad can be a single sheet, a booklet, a roll of paper tape or a paper strip that contains series of random numbers. These could be stored in tamper-proof sealed containers (plastic, metal or cardboard) to ensure that the series of numbers are used one by one and to prevent or at least detect unallowed disclosure of unused numbers. The numbers must absolutely be truly random. To generate these random numbers, the most practical option is to purchase a hardware based generator with random noise source (PC card or USB device).
    [Show full text]