Design and implementation of multilevel security subsystem based on XACML and WEB services

被引:0
作者
Jarmakiewicz, Jacek [1 ]
Podlasek, Tomasz [2 ]
机构
[1] Mil Univ Technol, Fac Elect, Warsaw, Poland
[2] Mil Commun Inst, Syst Dept C4I, Zegrze, Poland
来源
2015 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS) | 2015年
关键词
Information sharing; Multi Level Security; XACML; SOA; WEB Services; Common Operating Picture; C4I Systems;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Controlled sharing of confidential information in military environment, especially as a part of joint and coalition forces, is an important mean to achieve the network-centricity goals. During last few years a technology for building the Service-Oriented Architecture has been developed. The Service-Oriented Architecture maps the concept of distributed service-oriented processing. It is a good application framework for integration of heterogeneous military systems. However, these systems could process the confidential data divided onto hierarchical classification levels. We can rise up the question: can Service-Oriented Architecture serve as a middleware layer to integrate such systems? The paper presents selected cases of information systems cooperation in systems federation. We developed the functional mechanisms according to XACML architecture and we proposed necessary attributes for users and data, what enabled to control information exchange and to authorize users to access sensitive information resources. The developed MLS implementations were tested in terms of interoperability in the consortium and domestic test environment. In June 2012, both the implementations services were successfully tested in an international test environment during testing of interoperability with foreign partners (Germany) and NC3A agency in the NATO Secret network during CWIX 2012 exercises.
引用
收藏
页数:8
相关论文
共 18 条
[1]  
Anderson J., 1972, Computer security technology planning study
[2]  
[Anonymous], 1976, TECH REP
[3]  
[Anonymous], 2008, 801B DBBT SKW BBTI
[4]  
[Anonymous], 2005, EXT ACC CONTR MARK L
[5]  
[Anonymous], 2006, 801A DBBT SKW BBTI
[6]  
Banakhani G., 2006, WEB TRENDS TECHNILOG
[7]  
Boettcher C., 2008, DIG AV SYST C 2008 D
[8]  
Davis J., C PERF COMP COMM C 1
[9]  
Jarmakiewicz J., 2010, XML CONFIDENTIALITY
[10]  
Jarmakiewicz J., 2011, DESIGN TECHNICAL PRO