Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1876

Hundreds of Students Dig into Embedded Security Competition

Student Voice
January 25, 2021
… Security Competition Kay M. Upham MITRE Cybersecurity Interns Looking for a stealthy way to penetrate a system. Lurking behind an innocent function waiting for an opportunity. Using a decoy to distract defenders while teammates snag a flag. Those sound like moves in a hot new video game. But they're actually educational—part of MITRE's embedded security … penetrating embedded security systems in everyday devices. The event—which took place entirely online with teams and individuals working remotely—lasted 14 weeks. This year's contest: design a …

Token and Identity Chaining Between Protected Resources in a Single ICAM Ecosystem Using OAuth Token Exchange

Publication
May 28, 2021
… of the user, client, and protected resources are propagated in the issued access tokens to make access decisions. The OAuth 2.0 standard is used ubiquitously across the Internet for … trust one authorization server. In a single ICAM ecosystem, each protected resource (PR1) will contact its authorization server to obtain an access token that can be used at another protected … with access token Token1 (Step 6 in Figure 1): GET /resource_PR1 HTTP/1.1 Host: rs1.example.com Authorization: Bearer [client-to-PR1-access-token] 2. Token Exchange request from PR1 to the …

Token and Identity Chaining Between Protected Resources in a Multiple ICAM Ecosystem Using OAuth Token Exchange

Publication
May 28, 2021
… of the user, client, and protected resources are propagated in the issued access tokens to make access decisions. The OAuth 2.0 standard is used ubiquitously across the Internet for … one authorization server. In a multiple ICAM ecosystem, each protected resource (PR1) will contact an authorization server to obtain an access token that can be used at another protected … request from Client to PR1 (Step 1 in Figure 3): GET /resource_PR1 HTTP/1.1 Host: rs1.example.com Authorization: Bearer [client-to-PR1-access-token] 2. Token Exchange request from PR1 to AS1 …

Method and apparatus for determining hazard levels of chemical/biological/nuclear agents in an environment

Tue, 08/27/2002 - 12:00
Patented
… Method and apparatus for determining hazard levels of chemical/biological/nuclear agents in an environment Method and apparatus for determining hazard levels of chemical/biological/nuclear agents in an environment Tue, 08/27/2002 - 12:00 Health Biotechnology Patented A system and method for …

A Space-Time Scan Statistic for Detection of TB Outbreaks in the San Francisco Homeless Population

Publication
December 01, 2006
… A Space-Time Scan Statistic for Detection of TB Outbreaks in the San Francisco Homeless Population Brandon Higgs Mojdeh Mohtashemi Jennifer Grinsdale L.M. … population. In this paper, we present a spatio-temporal outbreak detection technique applied to the time series and geospatial data obtained from extensive contact and laboratory investigation on TB cases in the SF homeless population. We examine the …

Rydberg Atom Electric Field Sensor: Enabling Novel Capabilities for Resilient Communications and Sensing

Fri, 10/06/2023 - 12:00
Copyrighted
… Rydberg atom electric field sensor is an emerging quantum sensor technology with the potential to offer both robust electronic protection and support as well as novel measurement capabilities … For more detailed information on MITRE’s Rydberg Atomic Field Sensor or licensing options, contact the MITRE Technology Transfer Office at techtransfer@mitre.org . … The Rydberg atom …

Innovation Toolkit

Fri, 01/26/2024 - 12:00
Copyrighted
… MITRE’s Innovation Toolkit is a collection of proven and repeatable problem-solving methods to help you and your team do something different that makes a difference. MITRE’s Innovation … with critical thinking tools and resources necessary to spur innovation and foster creativity in a fast, low-cost, approachable way. The outcome of the toolkit use brings innovation thinking … on the MITRE Innovation Toolkit, visit https://itk.mitre.org/.   For licensing options, contact MITRE’s Technology Transfer Office at  techtransfer@mitre.org .  … MITRE’s Innovation …

Transforming Software Health at the Software Wellness Center

Fact Sheet
September 10, 2024
… at the Software Wellness Center Erika Darling The Software Wellness Center™ (SWC) is dedicated to redefining healthy software systems by providing expert guidance that significantly reduces … early signs of trouble, timely diagnosis and resolution of issues, and continuous innovation in software engineering. The SWC offers a range of services, including healthy software … comprises a community of experts committed to elevating software health. For more information, contact swcenter@mitre.org . The Software Wellness Center Transforming Software Health at the …

Investment Value Management Framework

Wed, 10/09/2024 - 12:00
Copyrighted
… model The Investment Value Management Framework (IVMF) is a cost simulation model used to calculate estimates of return on investment (ROI) for dynamic program decisions throughout the … detailed information on MITRE’s Investment Value Management Framework or licensing options, contact the MITRE Technology Transfer Office at  techtransfer@mitre.org … Cost simulation model …

MITRE’s Response to the OMB RFI on Privacy Impact Assessments

Publication
April 05, 2024
… MITRE’s Response to the OMB RFI on Privacy Impact Assessments MITRE provided data-driven responses to an Office of … Impact Assessments April 1, 2024 For additional information about this response, please contact: Duane Blackburn Center for Data-Driven Policy The MITRE Corporation 7596 Colshire Drive … of Privacy. University of Pennsylvania Law Review 154, no. 3 (2006), p. 477, http://ssrn.com/abstract=667622. Last accessed March 25, 2024. 7 S. Shapiro. Privacy Risk Analysis Based on …
  • First page
  • Previous page
  • …
  • Page 58
  • Page 59
  • Page 60
  • Page 61
  • Current page 62
  • Page 63
  • Page 64
  • Page 65
  • Page 66
  • …
  • Next page
  • Last page
Displaying 611 - 620 of 1876
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links