-
Notifications
You must be signed in to change notification settings - Fork 5
/
Copy pathdocument.120
executable file
·451 lines (451 loc) · 2.99 KB
/
document.120
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
Natural
Language
Processing
for
Information
Assurance
and
Security:
An
Overview
and
Implementations
Abstract
This
research
paper
explores
a
promising
interface
between
natural
language
processing
(NLP)
and
information
assurance
and
security
(IAS).
More
specificall~
it
is
devoted
to
possible
applications
to,
and
further
dedicated
development
of,
the
accumulated
considerable
resources
in
NLP
for,
IAS.
The
expected
and
partially
accomplished
result
is
in
harnessing
the
weird,
illogical
ways
natural
languages
encode
meaning,
the
very
ways
that
defy
all
the
usual
combinatorial
approaches
to
mathematical--and
computational--complexity
and
make
NLP
so
hard,
to
enhance
information
security.
The
paper
is
of
a
mixed
theoretical
and
empirical
nature.
Of
the
four
possible
venues
of
applications,
(i)
memorizing
randomly
generated
passwords
with
the
help
of
automatically
generated
funny
jingles,
(ii)
natural
language
watermarking,
(iii)
using
the
available
machine
translation
(MT)
systems
for
(additional)
encryption
of
text
messages,
and
(iv)
downgrading,
or
sanitizing
classified
information
in
networks,
two
venues,
(i)
and
(iv),
have
been
at
least
partially
implemented
and
the
remaining
two
(ii)
and
(iii)
are
being
implemented
to
the
proof-of-concept
level.
We
must
make
it
very
clear,
however,
that
we
have
done
very
little
experimentation
or
evaluation
at
this
point,
though
we
are
moving
quickly
in
that
direction.
The
merits
of
the
paper,
if
any,
are
in
its
venture
to
make
considerable
progress
achieved
recently
in
NLE
especially
in
knowledge
representation
and
meaning
analysis,
useful
for
IAS
needs.
The
NLP
approach
adopted
here,
ontological
semantics,
has
been
developed
by
two
of
the
coauthors;
watermarking
is
based
on
the
pioneering
research
by
another
coauthor
and
his
associates;
most
of
the
implementation
of
the
password
memorization
software
has
been
done
by
the
fourth
coauthor.
All
the
four
of
us
have
agonized
whether
we
should
report
this
research
now
or
wait
till
we
have
fully
implemented
all
or
at
least
some
of
the
systems
we
are
developing.
At
the
end
of
the
day,
we
have
reached
a
consensus
that
it
is
important,
even
at
this
early
stage,
to
review
for
the
information
security
community
what
NLP
can
do
for
it
and
to
invite
feedback
and
further
efforts
and
ideas
on
what
seems
likely
to
become
a
new
paradigm
in
information
security.
To
the
body
of
the
paper,
we
Mikhail
J.
Atallah,
Craig
J.
McDonough,
Victor
Raskin
Center
for
Education
and
Research
in
Information
Assurance
and
Security
(CERIAS,
www.cerias.purdue.edu)
Purdue
University
W.
Lafayette,
IN
47907
mja,
raskin,
mcdonoug@cerias.purdue.edu
Sergei
Nirenburg
Computing
Research
Laboratory,
New
Mexico
State
University
Las
Cruces,
NM
88003
sergei@crl.nmsu.edu
have
added
two
self-contained
deliberately
reference-free
appendices
on
NLP
and
ontological
semantics,
respectively,
primarily
for
the
benefit
of
those
IAS
readers,
who
are
interested
in
expanding
their
understanding
of
those
fields
and
further
exploring
their
possible
fruitful
interactions
with
IAS.