A DOCTORAL PROGRAM WITH SPECIALIZATION IN INFORMATION SECURITY A High Assurance Constructive Security Approach
|
|
|
- Martina Bond
- 10 years ago
- Views:
Transcription
1 A DOCTORAL PROGRAM WITH SPECIALIZATION IN INFORMATION SECURITY A High Assurance Constructive Security Approach Cynthia E. Irvine and Timothy E. Levin Department of Computer Science, Naval Postgraduate School, Monterey, California Abstract: Key words: A doctoral program in computer science with a specialization in information security is described. The focus of the program is constructive security. Key elements of the program are the strong computer science core upon which it builds, coursework on the theory and principles of information assurance, and a unifying research project. The doctoral candidate is a member of the project team, whose research contributes to the goals of the project and to fundamental advancements in high assurance security. Information assurance, education, doctoral program 1. INTRODUCTION As computing platforms become smaller, increasingly pervasive, and highly networked, the rampant exploitation of system vulnerabilities represents a threat to our ability to safely use information technology. Those who choose to wreak havoc on our systems do so with impunity. Fear that flawed systems may invite problems ranging from the annoyances of spam, identity theft, and loss of productivity, to catastrophic damage to critical information is turning computing from an enabling to a disabling technology. We are faced with the prospect that Gresham s Law will once again hold: the bad will drive out the good. To address these problems in a military context, the Center for Information Systems Security Studies and Research (CISR) at the Naval Postgraduate School (NPS) has developed a program in Information Assurance and Security education that addresses a broad range of
2 Report Documentation Page Form Approved OMB No Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE A Doctoral Program With Specialization in Information Security 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School 833 Dyer Road Code SS/CP Monterey, CA PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR S ACRONYM(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release, distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 11. SPONSOR/MONITOR S REPORT NUMBER(S) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified 18. NUMBER OF PAGES 8 19a. NAME OF RESPONSIBLE PERSON Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18
3 2 Cynthia E. Irvine and Timothy E. Levin information security issues through education and research. An important element of that program is the nurture of doctoral students. 1.1 Computer Science Ph.D. Program Overview To conduct doctoral research in information security at NPS, one must look to the Computer Science Department. NPS started its Computer Science program in the mid 1970s and has offered Ph.D. degrees, i.e. research doctorates, for over two decades. The majority of students at the Naval Postgraduate School are engaged in a terminal Master s Degree program, while a smaller number are involved in the doctoral program. The Ph.D. program meets several objectives by providing educators to military universities, research-level personnel to oversee a wide range of technical projects in the military and government, and researchers in government laboratories. The duration of the Computer Science Ph.D. program is three years for full time students. This may seem short relative to the four to five years usually required for doctoral students at other U.S. institutions, however NPS students are atypical with respect to the benefits afforded them. First, their tuition is paid for in its entirety by a sponsoring entity such as one of the military services or the U.S. Government. Second, each student continues to receive a pre-student salary from the sponsoring organization. Thus, the students have the freedom to pursue their studies without the distraction caused by attempting to offset their educational costs through external employment. Their work is also accelerated because NPS is on a year-round calendar with four full quarters of teaching and research per year. In general, applicants to the Ph.D. program in Computer Science at NPS must have a Master s Degree in Computer Science or closely related field. Admission to NPS requires the submission of certified transcripts of all courses taken at the university level, both undergraduate and graduate. Graduate Record Examination scores are required for applicants not currently at NPS. It is expected that all grades and scores will be above average. Supporting material, such as Masters thesis, research reports, or published papers, that demonstrates the candidate s ability to conduct research is also encouraged. International students and non-native English speakers are required to score well on the TOEFL examination as a requirement for admission to the NPS Ph.D. program. A Master s degree in Computer Science is an expected prerequisite. In some fields, the Master s degree is considered a consolation prize for students failing to pass certain examinations for the doctoral degree. This means that these programs often admit students with the intent of taking them directly to the doctorate without stopping for a Master s degree. In
4 A Doctoral Program with Specialization in Information Security 3 contrast, a Master s degree in Computer Science is deemed a valuable terminal degree and is a generally expected milestone. The funding model for Ph.D. programs at NPS is quite different from that of most other U.S. universities. Military and government civilian students are sponsored by a military service or agency. Thus, all of tuition and salary (at the pre-student income level) is paid for by external sources and does not have to be sought by the faculty Ph.D. supervisor. Some doctoral students are existing employees who have been involved in ongoing research projects. In such cases, the dissertation advisor is obliged to seek continued research support for the dissertation research through scholarships or research grants from a variety of funding agencies such as the National Science Foundation, the Office of Naval Research, the Defense Advanced Projects Research Agency, etc. Support is also possible through industry as several of our ongoing research projects in cyber security involve industry partners. Usually these partnerships revolve around the use of specialized equipment or software, but they occasionally include financial support. We discourage doctoral students from engaging in proprietary or classified research, since the results would have restricted distribution and therefore not be considered a contribution to the overall body of knowledge in Computer Science, a requirement for a successful dissertation. Each doctoral candidate is required to demonstrate knowledge of core computer science by passing a written qualifying examination. In addition, students must meet requirements in a minor subject and must pass an oral qualifying examination, the latter before commencing dissertation research. Upon completion of the dissertation, the candidate must defend the work in an oral examination. 1.2 Information Assurance and Security Specialization Over the past decade, the thirteen quarter-long information security courses listed in Table 1 have been developed and are offered by the Computer Science Department. Many prerequisites are cumulative, i.e. Operating Systems requires Discrete Mathematics, Data Structures, Computer Architecture, and an appreciation of programming fundamentals. Table 1. Information Assurance and Security Courses with their Prerequisites Course Course Title Prerequisites Students MS Ph.D. CS3600 Introduction to Information Assurance Computer Architecture CS3640 Analysis of DoD Critical Infrastructure Protection CS3600 CS3670 Secure Management of CS3600
5 4 Cynthia E. Irvine and Timothy E. Levin Course Course Title Prerequisites Students MS Ph.D. Systems CS3675 Network Vulnerability Assessment CS3600 CS3690 Network Security CS3600, Networking CS4600 Secure Systems CS3600, Networking, Operating Systems CS4603 Database Security CS3600, Databases, Operating Systems CS4605 Security Policies, Models Discrete Mathematics, and Formal Methods CS3600, Algorithms CS4610 Information Ethics none CS4614 Advanced Topics in Computer Security CS3600, CS4600, CS4605 CS4677 Computer Forensics CS3600, CS3670, Computer Architecture CS4680 Introduction to Certification and CS3600, CS3670, CS3690 Accreditation CS4685 System Certification Case Studies CS3600, CS3670, CS4680 Masters students may enroll in all of the courses listed in Table 1, while doctoral students enroll in selected (checked) courses intended to prepare them for dissertation research. Candidates in the Information Assurance and Security specialization generally meet their minor requirements by enrolling in courses in Mathematics or Electrical and Computer Engineering. A more concrete binding to the minor is achieved by having the non-computer Science Dissertation Committee member come from one of those departments. Dissertation research consumes the vast majority of a doctoral candidate s time. While prior experience and learning may shorten the duration of a candidate s research program, there is currently no formal recognition of those achievements. For example, a candidate with significant experience in the use of formal methods for high assurance development would have a head start when embarking on a program of related research. Research for a Ph.D. requires that each student conduct dissertation research on an original topic that results in a new contribution to the field of computer science and, in this case, information security. The size of the dissertation is of less importance than its quality and contribution. (Louis de Broglie (1923) provides an example of high quality brevity.)
6 A Doctoral Program with Specialization in Information Security 5 2. UNIFYING HIGH ASSURANCE RESEARCH PROJECT Doctoral research is generally centered around a unifying research project being conducted by a member of the faculty. Currently CISR has embarked on the Trusted Computing Exemplar (TCX) Project (Irvine et al. 2004b), which provides a context for Masters theses and Ph.D. dissertation research. A brief motivation for and description of this effort follows. 2.1 Motivation Much of the global critical infrastructure has now been constructed using commodity systems and depends upon layered defenses for which there is no well-founded protection model (Schell 2001). Through a process of constructive security engineering it is possible to describe security architectures for which there is a concrete protection model (Irvine 2003). These architectures can combine both commodity elements and components at selected junctures that provide high assurance of correct policy enforcement as well as evidence that they have not been subverted (Irvine 2004a). The TCX project is motivated by a recognition that construction of high assurance systems has not been a priority in the commercial sector. Even during the 1970s and 1980s, only a few score people contributed to the construction of high assurance systems and information was insufficiently detailed at best (Gasser 1988, Schell et al. 1973). To exacerbate the esoteric nature of these systems, those that were successfully developed were classified or proprietary. Market-driven academic institutions have not invested in course materials that teach the concepts of high assurance secure systems development in a coherent manner. Thus, we lack the availability of high assurance trusted systems, developers who can create these systems, as well as public domain worked examples upon which new projects could be modeled. 2.2 Trusted Computing Exemplar Project The Trusted Computing Exemplar Project is intended to provide an openly distributed worked example of how high assurance trusted computing components can be built. It encompasses four related activities: creation of a prototype framework for rapid high assurance system development, development of a reference-implementation trusted computing component, evaluation of the component for high assurance, and open dissemination of results related to the first three activities. Each of these is discussed in greater detail below.
7 6 Cynthia E. Irvine and Timothy E. Levin Rapid high assurance system development framework A prototype high assurance development framework is being created, and used to design and develop a reference implementation trusted computing component, the TCX Separation Kernel. High assurance methodologies and techniques are applied during the entire lifecycle. The TCX project is using openly available tools for the development framework; these tools are selected on the basis that they do not impose restrictive licensing requirements upon the results of the effort. The prototype framework for rapid high assurance development is intended to provide a set of interoperable tools and define a set of efficient, repeatable procedures for constructing trusted computing systems and components Reference-implementation trusted computing component We are developing a high assurance, embedded micro-kernel, and trusted application, as a reference implementation exemplar for trusted computing. The TCX Separation Kernel will enforce process and data-domain separation, while providing primitive operating system services sufficient to support simple applications High assurance Evaluation Under sponsorship from the National Security Agency, we are the lead writers of a Separation Kernel Protection Profile. This effort will result in an official NSA protection profile, which will be used for the evaluation not only of our Exemplar Separation Kernel, but also of a wide range of trusted separation kernels. This work is a key first step toward evaluation Open dissemination of results To provide materials to other educators who want to learn about and teach the techniques of high assurance design, development and engineering, we will make all of the results of our activities available. The documentation, source code, development framework and other evidence for a third-party evaluation will be made openly available as they are produced, providing previously unavailable examples of how-to for high assurance trusted computing. This will include not only the code and evaluation documentation, but descriptions of the analysis and decisions that took place in our efforts.
8 A Doctoral Program with Specialization in Information Security 7 A wide range of research topics has emerged from the TCX activities. Examples include surveys and applications of formal methods; modeling; hardware analysis; protocol analysis; development of materials related to Common Criteria evaluations; and tools design and implementation. The TCX project has already provided thesis areas for two graduated Masters students and, currently, the effort provides research topics for six Masters students and two doctoral candidates. The breadth and depth of the project will continue to accommodate future students. An advantage of the overarching project is the involvement of the student as part of a larger team tackling a wide range of project-related research and development. In choosing a model for a unifying research project, Multics (Corbato 1965) was viewed as a highly successful example. Even though the student may concentrate his or her thesis or dissertation research on a small, highly focused research topic, the exposure to the work of others and the appreciation of the challenges associated with high assurance secure technology contributes to a broader perspective. Often, the research projects benefit from the insights drawn from the operational experiences of the students. 3. CONCLUSION A research doctoral program has been described. It is based upon a core in computer science and provides both classes and research in computer and network security. A theme underlying all coursework and research is that of improving cyber security through constructive security engineering. Through a unifying research project doctoral research is given a context. The team approach provides a stimulating learning environment. REFERENCES de Broglie, M. L., 1923, Ondes et quanta, Comptes rendus, Vol. 177, pp Corbato, F.J. and Vyssotsky, V.A Introduction and Overview of the Multics System, Proceedings of AFIPS Federal Joint Computer Conference, pp Irvine, C.E., 2003, Teaching Constructive Security. IEEE Security and Privacy, 1(6):59 61, November. Irvine, C.E., Levin, T.E., Nguyen, T.D., Shifflett, D., Khosalim, J., Clark, P. C., Wong, A., Afinidad, F., Bibighaus, D. and Sears, J., 2004a, Overview of a High Assurance Architecture for Distributed Multilevel Security. To appear in Proceedings of of the 5 th IEEE Information Assurance Workshop, West Point, NY, June. Irvine, C.E., Levin, T.E., Nguyen, T.D., and Dinolt, G.W., 2004b, The Trusted Computing Exemplar Project, To appear in Proceedings of the 5 th IEEE Information Assurance Workshop, West Point, NY, June.
9 8 Cynthia E. Irvine and Timothy E. Levin M. Gasser, M, 1988, Building a Secure Computer System, Van Nostrand Reinhold, NY, NY. Schell, R. R Information Security: Science, Pseduoscience. Proceedings of the 17th Annual Computer Security Applications Conference, pp , New Orleans, LA, December. Schell, R.R., Downey, P.J., and G. J. Popek, G.J., 1973,, Preliminary Notes on the Design of Secure Military Computer Systems. Technical Report MCI-73-1, Electronic Systems Division, Air Force Systems Command, Hanscom AFB, Bedford, MA, 73.
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE LCDR Chris Eagle, and John L. Clark Naval Postgraduate School Abstract: Key words: In this paper, we describe the Capture-the-Flag (CTF) activity
In June 1998 the Joint Military Intelligence. Intelligence Education for Joint Warfighting A. DENIS CLIFT
Defense Intelligence Analysis Center, home of JMIC. Intelligence Education for Joint Warfighting Courtesy Joint Military Intelligence College By A. DENIS CLIFT In June 1998 the Joint Military Intelligence
Pima Community College Planning Grant For Autonomous Intelligent Network of Systems (AINS) Science, Mathematics & Engineering Education Center
Pima Community College Planning Grant For Autonomous Intelligent Network of Systems (AINS) Science, Mathematics & Engineering Education Center Technical Report - Final Award Number N00014-03-1-0844 Mod.
Overview Presented by: Boyd L. Summers
Overview Presented by: Boyd L. Summers Systems & Software Technology Conference SSTC May 19 th, 2011 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection
DCAA and the Small Business Innovative Research (SBIR) Program
Defense Contract Audit Agency (DCAA) DCAA and the Small Business Innovative Research (SBIR) Program Judice Smith and Chang Ford DCAA/Financial Liaison Advisors NAVAIR 2010 Small Business Aviation Technology
Report Documentation Page
(c)2002 American Institute Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the
Asset Management- Acquisitions
Indefinite Delivery, Indefinite Quantity (IDIQ) contracts used for these services: al, Activity & Master Plans; Land Use Analysis; Anti- Terrorism, Circulation & Space Management Studies; Encroachment
EAD Expected Annual Flood Damage Computation
US Army Corps of Engineers Hydrologic Engineering Center Generalized Computer Program EAD Expected Annual Flood Damage Computation User's Manual March 1989 Original: June 1977 Revised: August 1979, February
DEFENSE CONTRACT AUDIT AGENCY
DEFENSE CONTRACT AUDIT AGENCY Fundamental Building Blocks for an Acceptable Accounting System Presented by Sue Reynaga DCAA Branch Manager San Diego Branch Office August 24, 2011 Report Documentation Page
Computer Science Graduate Degree Requirements
Computer Science Graduate Degree Requirements Duke University Department of Computer Science 1 Introduction 2 General Requirements This document defines the requirements set forth by the Department of
Guidelines and Proposal for the Master of Arts (MA) or Master of Science (MS) in Interdisciplinary Studies Degrees
Guidelines and Proposal for the Master of Arts (MA) or Master of Science (MS) in Interdisciplinary Studies Degrees California State University, Fresno Division of Graduate Studies SECTION I GUIDELINES
Cyber Security Training and Awareness Through Game Play
Cyber Security Training and Awareness Through Game Play Benjamin D. Cone, Michael F. Thompson, Cynthia E. Irvine, and Thuy D. Nguyen Naval Postgraduate School, Monterey, CA 93943, USA {bdcone,mfthomps,irvine,tdnguyen}@nps.edu
Meeting Cyber Security Challenges
Meeting Cyber Security Challenges Presented to Naval Postgraduate School Cyber Summit 29 October 2009 Cynthia Irvine, PhD, Professor Naval Postgraduate School UNCLASSIFIED Overview Challenges in Cyber
Computer Science Graduate Degree Requirements
Computer Science Graduate Degree Requirements Duke University Department of Computer Science 1 Introduction This document defines the requirements set forth by the Department of Computer Science for a
Computer Engineering Graduate Handbook. Administered by the Computer Science and the Charles L. Brown Department of Electrical & Computer Engineering
Computer Engineering Graduate Handbook Administered by the Computer Science and the Charles L. Brown Department of Electrical & Computer Engineering This document details the degree requirement and procedures
Graduate Catalog 2012-2013 Degree Requirements / 7. Degree Requirements
Graduate Catalog 2012-2013 Degree Requirements / 7 Degree Requirements The following section describes Graduate School regulations unique to the master s and the doctoral degrees. For Graduate School procedures
Mr. Steve Mayer, PMP, P.E. McClellan Remediation Program Manger Air Force Real Property Agency. May 11, 2011
Mr. Steve Mayer, PMP, P.E. McClellan Remediation Program Manger Air Force Real Property Agency May 11, 2011 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection
College of Engineering and Applied Science Department of Computer Science
College of Engineering and Applied Science Department of Computer Science Guidelines for Doctor of Philosophy in Engineering Focus Area: Computer Science Last Updated: December 2014 I. INTRODUCTION The
Graduate Programs in Engineering
Graduate Programs in Engineering The College of Engineering offers a Master of Science in Engineering, a Master of Science in Engineering Management and a Ph.D. in Engineering and Applied Sciences, allowing
Using the Advancement Degree of Difficulty (AD 2 ) as an input to Risk Management
Using the Advancement Degree of Difficulty (AD 2 ) as an input to Risk Management James W. Bilbro JB Consulting International Huntsville, AL Multi-dimensional Assessment of Technology Maturity Technology
Graduate Program Handbook M.S. and Ph.D. Degrees
Graduate Program Handbook M.S. and Ph.D. Degrees Department of Computer Science University of New Hampshire updated: Summer 2012 1 Overview The department offers both an M.S. in Computer Science and a
THE MIMOSA OPEN SOLUTION COLLABORATIVE ENGINEERING AND IT ENVIRONMENTS WORKSHOP
THE MIMOSA OPEN SOLUTION COLLABORATIVE ENGINEERING AND IT ENVIRONMENTS WORKSHOP By Dr. Carl M. Powe, Jr. 2-3 March 2005 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden
ELECTRONIC HEALTH RECORDS. Fiscal Year 2013 Expenditure Plan Lacks Key Information Needed to Inform Future Funding Decisions
United States Government Accountability Office Report to Congressional July 2014 ELECTRONIC HEALTH RECORDS Fiscal Year 2013 Expenditure Plan Lacks Key Information Needed to Inform Future Funding Decisions
An Application of an Iterative Approach to DoD Software Migration Planning
An Application of an Iterative Approach to DoD Software Migration Planning John Bergey Liam O Brien Dennis Smith September 2002 Product Line Practice Initiative Unlimited distribution subject to the copyright.
FIRST IMPRESSION EXPERIMENT REPORT (FIER)
THE MNE7 OBJECTIVE 3.4 CYBER SITUATIONAL AWARENESS LOE FIRST IMPRESSION EXPERIMENT REPORT (FIER) 1. Introduction The Finnish Defence Forces Concept Development & Experimentation Centre (FDF CD&E Centre)
ADMISSION REQUIREMENTS PROGRAM REQUIREMENTS. Of interest to PH.D. IN COMPUTER SCIENCE PROGRAM DEGREE PROGRAMS APPLICATIONS REGISTRATION
PH.D. IN COMPUTER SCIENCE PROGRAM ADMISSION REQUIREMENTS PROGRAM REQUIREMENTS ADMISSION REQUIREMENTS FOR THE PH.D. IN COMPUTER SCIENCE A student can be admitted into one of the following graduate degree
Graduate Degree Requirements
Graduate Degree Requirements Duke University Department of Computer Science Last revision: May 2007 Introduction To earn a graduate degree in Computer Science, students must successfully complete a program
Headquarters U.S. Air Force
Headquarters U.S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e Air Force Technology Readiness Assessment (TRA) Process for Major Defense Acquisition Programs LtCol Ed Masterson Mr
The minimum background expected of any student entering the M.S.C.S. program is coursework equivalent to the following:
West Virginia University 1 Computer Science Degrees Offered Master of Science in Computer Science (M.S.C.S) Doctor of Philosophy in Computer Science (Ph.D.) Program Description The Masters of Science in
College of Engineering and Applied Science Department of Computer Science
College of Engineering and Applied Science Department of Computer Science Guidelines for Doctor of Philosophy in Engineering Focus Area: Security Last Updated October 2012. I. INTRODUCTION The College
Master of Science (MS) in Computer Science
Master of Science (MS) in Computer Science Overview of Degree The Master of Science degree in Computer Science at The University of Georgia is a comprehensive program of study intended to give qualified
TITLE: The Impact Of Prostate Cancer Treatment-Related Symptoms On Low-Income Latino Couples
AD Award Number: W81WH-07-1-0069 TITLE: The Impact Of Prostate Cancer Treatment-Related Symptoms On Low-Income Latino Couples PRINCIPAL INVESTIGATOR: Sally L. Maliski, Ph.D., R.N. CONTRACTING ORGANIZATION:
73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation
73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation 21-23 June 2005, at US Military Academy, West Point, NY 712CD For office use only 41205 Please complete this form 712CD as your cover
COMPUTER SCIENCE & COMPUTER ENGINEERING GRADUATE STUDENT HANDBOOK Fall 2015
COMPUTER SCIENCE & COMPUTER ENGINEERING GRADUATE STUDENT HANDBOOK Fall 2015 University of Arkansas JBHT 504 Fayetteville, Arkansas 72701 www.csce.uark.edu telephone 479-575-6197 fax 479-575-5339 Graduate
Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett
Issue Paper Center for Strategic Leadership, U.S. Army War College May 2003 Volume 04-03 Wargaming Homeland Security and Army Reserve Component Issues By Professor Michael Pasquarett Background The President
Graduate Study in History
Graduate Study in History Degrees and Options The History Program in the Department of History and Social Sciences at Pittsburg State University offers a graduate program leading to the MASTER OF ARTS
The University of Mississippi. Doctoral Degrees
The University of Mississippi Doctoral Degrees GENERAL REQUIREMENTS FOR ALL HIGHER DEGREES Degrees higher than the baccalaureate are granted at The University of Mississippi because of special attainments
Cancellation of Nongroup Health Insurance Policies
Cancellation of Nongroup Health Insurance Policies Bernadette Fernandez Specialist in Health Care Financing Annie L. Mach Analyst in Health Care Financing November 19, 2013 Congressional Research Service
The Ph.D. program in Computer and Information Sciences
The Ph.D. program in Computer and Information Sciences The Ph.D. program in Computer and Information Sciences offers an opportunity for exceptional students to pursue research in the computer and information
PREPARED FOR: U.S. Army Medical Research and Materiel Command Fort Detrick, Maryland 21702-5012
AD Award Number: W81XWH-10-1-0957 TITLE: PRINCIPAL INVESTIGATOR: Andrea L. Behrman, Ph.D., P.T. CONTRACTING ORGANIZATION: University of Florida Gainesville, FL 32611 REPORT DATE: October 2011 TYPE OF REPORT:
AFRL-RX-WP-TP-2008-4023
AFRL-RX-WP-TP-2008-4023 HOW KILLDEER MOUNTAIN MANUFACTURING IS OPTIMIZING AEROSPACE SUPPLY CHAIN VISIBILITY USING RFID (Postprint) Jeanne Duckett Killdeer Mountain Manufacturing, Inc. FEBRUARY 2008 Final
DEFENSE BUSINESS PRACTICE IMPLEMENTATION BOARD
Defense Business Practice Implementation Board DEFENSE BUSINESS PRACTICE IMPLEMENTATION BOARD Report to the Senior Executive Council, Department of Defense MANAGEMENT INFORMATION TASK GROUP Report FY02-3
DEPARTMENT OF COMPUTER SCIENCE
DEPARTMENT OF COMPUTER SCIENCE Faculty of Engineering DEPARTMENT OF COMPUTER SCIENCE MSc REGULATIONS AND PROCEDURES (Revised: September 2013) TABLE OF CONTENTS 1. MSC ADMISSION REQUIREMENTS 1.1 Application
Graduate Studies Policies Manual
Graduate Studies Policies Manual Policy Number GP-03 02-Mar-2014 Responsible Office: DVC Research & Grad. Studies Page of this Policy 1 of 1 3. Overview Outlines the framework that governs students pathway
GENERAL PROCEDURES AND GUIDELINES
Graduate Program Electrical and Computer Engineering Wallace H. Coulter School of Engineering GENERAL PROCEDURES AND GUIDELINES Revised: August 18, 2010 Table of Contents I. INTRODUCTION.. 1 II. ADMINISTRATIVE
RT 24 - Architecture, Modeling & Simulation, and Software Design
RT 24 - Architecture, Modeling & Simulation, and Software Design Dennis Barnabe, Department of Defense Michael zur Muehlen & Anne Carrigy, Stevens Institute of Technology Drew Hamilton, Auburn University
John Mathieson US Air Force (WR ALC) Systems & Software Technology Conference Salt Lake City, Utah 19 May 2011
John Mathieson US Air Force (WR ALC) Systems & Software Technology Conference Salt Lake City, Utah 19 May 2011 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the
Rules for the PhD Program in Engineering and Applied Sciences at Reykjavík University
Rules for the PhD Program in Engineering and Applied Sciences at Reykjavík University 1. Introduction These rules describe the objectives and requirements of the PhD program at the School of Science and
Admission ADMISSION. Requirements for Admission
ADMISSION T he admission of graduate students to the College of Graduate Studies of the University of Toledo Health Science Campus is determined by the recommendation of the program Admissions Committees
The Harvey Mudd Guide to Graduate School in Computer Science
The Harvey Mudd Guide to Graduate School in Computer Science 1 Introduction This guide is intended for Harvey Mudd students who are considering graduate school in computer science. The guide is intended
How To Get A Master S Degree At Duke
Chapter 8 Master s Programs Contents A. The A.M. and M.S. Programs... 2 B. Time Limits... 3 C. Transfer of Credit... 3 D. Courses Below 500-Level for Master s Degree Credit... 4 E. Retroactive Credit...
Division of Electrical & Computer Engineering
School of Electrical Engineering & Computer Science Division of Electrical & Computer Engineering GRADUATE HANDBOOK Effective Spring 2015 This handbook gathers into one place most of the academic regulations
ELECTRICAL ENGINEERING GRADUATE STUDENT HANDBOOK
ELECTRICAL ENGINEERING GRADUATE STUDENT HANDBOOK Master of Science Doctor of Philosophy Department of Electrical and Computer Engineering College of Engineering North Carolina A&T State University McNair
Guide to Using DoD PKI Certificates in Outlook 2000
Report Number: C4-017R-01 Guide to Using DoD PKI Certificates in Outlook 2000 Security Evaluation Group Author: Margaret Salter Updated: April 6, 2001 Version 1.0 National Security Agency 9800 Savage Rd.
PhD IN MARKETING MANAGEMENT (code 07267041) PhD THESIS INFORMATION
DEPARTMENT OF MARKETING MANAGEMENT PhD IN MARKETING MANAGEMENT (code 07267041) PhD THESIS INFORMATION 1. INTRODUCTION The value-adding advantage of this degree lies in the exposure to independent research
Joint PhD Programs Guidelines
Joint PhD Programs Guidelines Contents: PART A - Overview PART B - Overarching Joint PhD Agreement template to be prepared initially PART C - Checklist to be used in developing a Joint PhD Program for
IISUP-. NAVAL SUPPLY SVSTE:MS COMMAND. Ready. Resourceful. Responsive!
~ IISUP-. NAVAL SUPPLY SVSTE:MS COMMAND Ready. Resourceful. Responsive! Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated
Annual Review of Doctoral Students Guidelines Department of Computer Science College of William & Mary July 2014
Annual Review of Doctoral Students Guidelines Department of Computer Science College of William & Mary July 2014 The faculty reviews the progress of each PhD student toward his/her degree at least once
Physics Graduate Program Handbook
Carnegie Mellon University Department of Physics November 14, 2012 Version 1.1 Physics Graduate Program Handbook This document presents the rules and requirements governing the Graduate Program in the
University of Delaware. Program Policy Document
University of Delaware Ph.D. in Economic Education A Joint Program of the Department of Economics and the School of Education Program Policy Document Fall 2009 GRADUATE PROGRAM POLICY STATEMENT FOR PH.D
2010 2011 Military Health System Conference
2010 2011 Military Health System Conference Population Health Management The Missing Element of PCMH Sharing The Quadruple Knowledge: Aim: Working Achieving Together, Breakthrough Achieving Performance
Degree Requirements for the Graduate Program in Chemistry and Biochemistry 2014-15
Degree Requirements for the Graduate Program in Chemistry and Biochemistry 2014-15 University of Oregon Contents PH.D. DEGREE REQUIREMENTS... 2 Examination Requirements... 2 Cumulative Examinations...
College of Engineering and Applied Science Department of Computer Science
College of Engineering and Applied Science Department of Computer Science Guidelines for Doctor of Philosophy in Engineering Focus Area: Security Last Updated December 2014. I. INTRODUCTION The College
Change to Program/Graduate Diploma Academic Requirements Proposal Template
230 York Lanes - 4700 Keele Street 1 Change to Program/Graduate Diploma Academic Requirements Proposal Template 1. Program/Graduate Diploma: Computer Science and Engineering 2. Effective Session of Proposed
How To Get A Computer Science Degree At Mississippi State
Mississippi State University 1 Computer Science and Engineering Department Head: Dr. Donna Reese Graduate Coordinator: Dr. T.J. Jankun-Kelly 300 Butler Hall Box 9637 Mississippi State, MS 39762-9637 Telephone:
INTRODUCTION. Ph.D. PROGRAM. Doctor of Philosophy Degree Requirements
1 of 8 7/17/2006 2:22 PM Approved by Graduate Council on June 22, 2006 Doctor of Philosophy Degree Requirements I. INTRODUCTION The recipient of a Ph.D. degree in Electrical and Computer Engineering (ECE)
Electrical and Electronics Engineering Department Graduate Handbook
Electrical and Electronics Engineering Department Graduate Handbook Published on: January 18, 2012 Latest version is in effect until a new revised document is published 1. Introduction The purpose of this
MS Information Security (MSIS)
MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in
REGULATIONS FOR THE DEGREES OF MPHIL AND PHD. These regulations are approved by Senate. They were most recently updated in July 2014.
REGULATIONS FOR THE DEGREES OF MPHIL AND PHD These regulations are approved by Senate. They were most recently updated in July 2014. Effective date: July 2014 Institute of Education University of London
GRADUATE PROGRAM, DEPARTMENT OF GEOLOGY AND PLANETARY SCIENCE UNIVERSITY OF PITTSBURGH
DOCTOR OF PHILOSOPHY DEGREE Consult the latest Bulletin of the Graduate Programs of the Faculty of Arts and Sciences (http://www.pitt.edu/~graduate/) for general regulations. The material presented here
REPORT DOCUMENTATION PAGE *
REPORT DOCUMENTATION PAGE * Form Approved OMBNo. 07040188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
Mathematics and Statistics
Mississippi State University 1 Mathematics and Statistics Department Head: Dr. Mohsen Razzaghi Graduate Coordinator: Dr. Corlis Johnson 410 Allen Hall Drawer MA Mississippi State, MS 39762 Telephone: 662-325-3414
Graduate Programs in Education and Human Development
Graduate Programs in Education and Human Development Department of Curriculum and Instruction Two master s degree options and a doctorate degree are offered in Curriculum and Instruction. The Master of
DOCTORAL DEGREES ADMISSION REQUIREMENTS
DOCTORAL DEGREES Ball State University offers programs leading to the doctor of philosophy degree (PhD), the doctor of education degree (EdD), the doctor of arts degree (DA), and the doctor of audiology
Tulane University. Graduate Program in. Student Handbook
Tulane University Graduate Program in Student Handbook Contents Earth and Environmental Sciences Graduate Program Procedures for Graduate Study 3 Admission Requirements 3 Financial Support 3 Categories
Department of Information Systems and Cyber Security
The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association
GOING TO GRADUATE SCHOOL IN THE MATHEMATICAL SCIENCES
GOING TO GRADUATE SCHOOL IN THE MATHEMATICAL SCIENCES By Ricardo Cortez and Colette Patt. Produced by the Physical Sciences Student Diversity Program, Dean's Office of the College of Letters and Science,
ADVANCED NETWORK SECURITY PROJECT
AFRL-IF-RS-TR-2005-395 Final Technical Report December 2005 ADVANCED NETWORK SECURITY PROJECT Indiana University APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AIR FORCE RESEARCH LABORATORY INFORMATION
GRADUATE AND POSTBACCALAUREATE ADMISSIONS
CAL POLY POMONA CATALOG 2011-2012 GRADUATE AND POSTBACCALAUREATE ADMISSIONS APPLICATION PROCEDURES All graduate and postbaccalaureate applicants (e.g., master s degree applicants, those seeking credentials,
GIRNE AMERICAN UNIVERSITY TEACHING AND EXAMINATION BY LAW FOR ASSOCIATE AND BACHELOR S DEGREES
GIRNE AMERICAN UNIVERSITY TEACHING AND EXAMINATION BY LAW FOR ASSOCIATE AND BACHELOR S DEGREES Name 1. This by law is referred to as the Girne American University Teaching and Examination By law for Associate
ENGLISH DEPARTMENT GRADUATE HANDBOOK UNIVERSITY OF TEXAS AT ARLINGTON JANUARY 2015
ENGLISH DEPARTMENT GRADUATE HANDBOOK UNIVERSITY OF TEXAS AT ARLINGTON JANUARY 2015 2 TABLE OF CONTENTS General Information...3 Academic Calendar...4 Forms...4 Registering for Courses...4 General Courses...4
Applicants new to graduate study at the University of Kansas must submit the following materials to the department s graduate admissions coordinator:
Doctoral Degrees in Curriculum and Instruction Department of Curriculum and Teaching University of Kansas Joseph R. Pearson Hall, Room 321 Lawrence, KS 66045-3101 (785)864-4435 The Department of Curriculum
Ph.D. Description. About the Gulf Studies Program
Ph.D. Description About the Gulf Studies Program The Gulf Studies PhD Program, launched in Fall 2015, offers students the unparalleled opportunity to study the Gulf while living in the region itself, and
REGULATION for MASTER S EDUCATION Approved on 27/05/2013 by Academic Board - Decision 2 (Appendix :1)
INTERNATIONAL BLACK SEA UNIVERSITY QUALITY MANAGEMENT SYSTEM DOCUMENTS REGULATION for MASTER S EDUCATION Approved on 27/05/2013 by Academic Board - Decision 2 (Appendix :1) Approvals The signatures below
Policy Statement for the Master of Public Administration (MPA) Program School of Public Policy and Administration University of Delaware
Policy Statement for the Master of Public Administration (MPA) Program School of Public Policy and Administration University of Delaware (Revised October, 2015) Part I: Context and Program History The
