The Best Paper Awards Committee has chosen a study of a new theoretical approach to expressing security goals in operating systems as the winner of MITRE's Best Paper Award for 2005. This award recognizes a published technical article that appeared in refereed literature during the previous year for its importance and originality. The winning paper is:
In announcing the committee's choice, Corporate Chief Engineer Lou Metzger highlighted its contribution to advancing the usefulness of secure operating systems—important for many MITRE sponsor applications—and noted the impact that the paper has already had in the computer security community.
The paper, which results from research funded by the National Security Agency, describes a systematic method for analyzing secure operating systems to discover if they satisfy security goals for information flow. The authors presented an early version at the Workshop on Issues in the Theory of Security in 2003. Joshua Guttman notes that "The invitation to submit it to the JCS special issue was the fastest invitation we ever got, since the chairman asked us on the way out for the coffee break." The paper provides a clear research program for theorists to contribute to operating system security, a topic that had become moribund since the early 1990s. Although the temporal logic approach to expressing security goals is original, it has connections to methods in which computer scientists have invested heavily, and readers consider it natural. The concept of extracting a model of security behavior from configuration files is becoming increasingly popular, and is reflected in several recent publications, including some from Microsoft Research.
Thirty-six other papers received Incentive awards. A complete list of the winners follows.
Abran, Alain, and James W. Moore, 2004, executive editor, Guide to the Software Engineering Body of Knowledge (SWEBOK), Los Alamitos, CA: IEEE Computer Society.
Bayer, Samuel, 2005, "Building a Standards and Research Community With the Galaxy Communicator Software Infrastructure," in Practical Spoken Dialog Systems (Text, Speech, and Language Technology), Vol. 26, Deborah Dahl, ed., Dordrecht: Kluwer Academic Publishers, pp. 167–196.
Bhadra, Dipasis, Fall 2005, "Choice of Aircraft Fleets in the U.S. Domestic Scheduled Air Transportation System: Findings From a Multinomial Logit Analysis," Journal of the Transportation Research Forum, Fol. 44, No. 3, pp. 143–162.
Bhadra, Dipasis, Jennifer Gentry, Brendan Hogan, and Michael T. Wells, March–April 2005, "Future Air Traffic Timetable Estimator," Journal of Aircraft, Vol. 42, No. 2, pp. 320–328.
Bhadra, Dipasis, and Michael T. Wells, October 2005, "Air Travel by State: Its Determinants and Contributions in the United States," Public Works Management & Policy, Vol. 10, No. 2, pp. 119–137.
Blake, M. Brian, February 2005, "Integrating Large-Scale Group Projects and Software Engineering Approaches for Early Computer Science Courses," IEEE Transactions on Education, Vol. 48, No. 1, 63–72.
Blake, M. Brian and Hassan Gomaa, 2005, "Agent-oriented Compositional Approaches to Services-Based Cross-Organizational Workflow," Decision Support Systems, Vol. 40, pp. 31–50.
Bloedorn, Eric E., Lisa M. Talbot, and David D. DeBarr, 2005, "Data Mining Applied to Intrusion Detection: MITRE Experiences," in Machine Learning and Data Mining for Computer Security, Marcus A. Maloof, ed., New York: Springer Verlag.
Burns, Kevin J., 2005, "Dealing with TRACS: A Game of Chance and Choice," in Readings in Chance Discovery, Akinori Abe and Yukio Ohsawa, eds, Magill, Adelaide, South Australia: Advanced Knowledge International Pty Ltd, pp. 121–132.
Christou, Carol T., and Garry M. Jacyna, August 2005, "Simulation of the Beam Response of Distributed Signals," IEEE Transactions on Signal Processing, Vol. 58, No. 8, pp. 3023–3031.
Colosimo, Marc E., Alexander A. Morgan, Alexander S. Yeh , Jeffrey B. Colombe, and Lynette Hirschman, May 2005, "Data Preparation and Interannotator Agreement: BioCreAtIvE Task 1B," BMC Bioinformatics, Vol. 6 (Suppl. 1), BioMed Central.
Das, Shamik, Garrett S. Rose, Matthew M. Ziegler, Carl A. Picconatto, and James C. Ellenbogen, December 2005, "Architectures and Simulations for Nanoprocessor Systems Integrated on the Molecular Scale," Lecture Notes in Physics: Introducing Molecular Electronics, Vol. 680, pp. 479–513.
Goodman, Bradley A., Frank N. Linton, Robert D. Gaimari, Janet M. Hitzeman, Helen J. Ross, and Jeffrey Zarrella, 2005, "Using Dialogue Features to Predict Trouble During Collaborative Learning," User Modeling and User-Adapted Interaction, Vol. 15, 85–134.
Grace, Kevin H., John A. Stine, and Robert C. Durst, 2005, "An Approach for Modestly Directional Communications in Mobile Ad Hoc Networks," Telecommunication Systems, Vol. 28, No. 3, pp. 281–296.
Guttman, Joshua D., and Amy L. Herzog, February 2005, "Rigorous Automated Network Security Management," International Journal of Information Security, Vol. 4, No. 1–2, pp. 29–48.
Happel, Mark D., September 2005, "Neuroscience and the Detection of Deception," Review of Policy Research, Vol. 22, No. 5, pp. 667–686.
Heaney, Jody, Duane Hybertson, Susan Chapin, Malcolm Kirwan, Jr., and Ann Reedy, 2005, "Patterns Scope and Enterprise Security," in Security Patterns: Integrating Security and Systems Engineering, Markus Schumacher, Eduardo Fernandez-Buglioni, Duane Hybertson, Frank Buschmann, and Peter Sommerlad, eds, 2005, Chichester, England: John Wiley & Sons, Ltd., pp. 47–58.
Hirschman, Lynette, and Christian Blaschke, May 2005, "Evaluation of Text Mining in Biology," in Text Mining for Biology and Medicine, Sophia Ananiadou and John McNaught, eds, Boston and London: Artech House, 2005, pp. 213–245.
Hirschman, Lynette, Marc E. Colosimo, Alexander A. Morgan, and Alexander S. Yeh, 24 May 2005, "Overview of BioCreAtIvE Task 1B: Normalized Gene Lists," BMC Bioinformatics, Vol. 6 (Suppl. 1), BioMed Central.
Hirschman, Lynette, Alexander S. Yeh, Christian Blaschke, and Alfonso Valencia, 24 May 2005, "Overview of BioCreAtIvE Task 1B: Critical Assessment of Information Extraction for Biology," BMC Bioinformatics, Vol. 6 (Suppl. 1), BioMed Central.
Kaplan, Elliott D., and Christopher Hegarty, eds, 2005, Understanding GPS: Principles and Applications, 2nd ed., Boston and London, Artech House.
Laskey, Kenneth J., 2005, "Metadata Concepts to Support a Net-centric Data Environment," in Net-Centric Approaches to Intelligence and National Security, Roy Ladner and Frederick E. Petry, eds, New York: Springer, pp. 29–54.
Li, Yingjiu, Vipin Swarup, and Sushil Jajodia, January–March 2005, "Fingerprinting Relational databases: Schemes and Specialties," IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 1, pp. 34–45.
Lindsay, Kenneth S., Steven M. Green, Stephane Nondoloni, and Mike Paglione, 2005, "Common Trajectory Modeling for National Airspace System Decision Support Tools," Air Traffic Control Quarterly, Vol. 13, No. 1, pp. 55–82.
Lindsay, Kenneth S., Daniel P. Greenbaum, and Craig R. Wanke, November–December 2005, "Predeparture Uncertainty and Prediction Performance in Collaborative Routing Coordination Tools," Journal of Guidance, Control, and Dynamics, Vol. 28, No. 6, pp. 1178–1186.
Longnecker, Jo L., December 2005, "Boots on the Ground: Use and Implications of War Metaphors in a Top Team," Organization and Management Journal, Vol. 2, No. 3, pp. 123–143.
Martin, Robert A., May 2005, "Transformational Vulnerability Management Through Standards," CrossTalk: The Journal of Defense Software Engineering, Vol. 18, No. 5, pp. 12–15.
Maybury, Mark T., 2005, "Human Language Technology Evaluation," in Encyclopedia of Language and Linguistics, 2nd ed., Keith Brown, ed., Amsterdam: Elsevier.
Maybury, Mark T., 2005, "Karen Sparck Jones: Professor of Computers and Information (emeritus) and Computing Pioneer," and "Karen Sparck Jones: Summarization Research," in Charting a New Course: Progress in Natural Language Processing and Information Retrieval: A Festschrift for Prof. Karen Sparck Jones, John Tait, ed., Amsterdam: Kluwer.
Moore, James W., 2005, Road Map to Software Engineering: A Standards-Based Guide, New York: John Wiley & Sons, Ltd.
Parsons, Doug, and Robert L. Wittman, Jr. (W906), January 2005, "Open Source Opens Opportunities for Army's Simulation System," CrossTalk: The Journal of Defense Software Engineering, Vol. 18, No. 1, pp. 11–14.
Schumacher, Markus, Eduardo Fernandez-Buglioni, Duane Hybertson, Frank Buschmann, and Peter Sommerlad, eds, 2005, Security Patterns: Integrating Security and Systems Engineering, Chichester, England: John Wiley & Sons, Ltd.
Shively, Curtis A., and Thomas T. Hsiao, Fall 2005, "Error and Availability Analysis of Category IIIb LAAS Augmented by Radar Altimeter," NAVIGATION: Journal of the Institute of Navigation, Vol. 52, No. 3, pp. 155–162.
Williams, Andrew B., Anand Padmanabhan, and M. Brian Blake, July 2005, "Experimentation with Local Consensus Ontologies with Implications for Automated Service Composition," IEEE Transactions on Knowledge and Data Engineering, Vol. 17, No. 7, pp. 1–13.
Wu, Haisang, Binoy Ravindran, E. Douglas Jensen, and Peng Li, September 2005, "Time/Utility Function Decomposition Techniques for Utility Accrual Scheduling Algorithms in Real-Time Distributed Systems," IEEE Transactions on Computers, Vol. 54, No. 9, pp. 1138–153.
Yeh, Alexander S., Alexander A. Morgan, Marc E. Colosimo, and Lynette Hirschman, 24 May 2005, "BioCreAtIvE Task 1A: Gene Mention Finding Evaluation," BMC Bioinformatics, Vol. 6 (Suppl. 1), BioMed Central.
Best Paper Archives
Papers for the previous year are posted during the second half of the current year.