Multi-level systems security and interoperability between differently classified networks

被引:0
|
作者
Burns, JG [1 ]
机构
[1] Sandia Natl Labs, Albuquerque, NM 87185 USA
关键词
multi-level security; computer; network; Trusted Gate; authentication; encryption; system security; Secure ID; XDM; data guard;
D O I
10.1117/12.336964
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper discusses technical challenges and concerns that must be resolved in order to implement a computer network security architecture for accessing differently classified data from a single network computer. Most multi-level security approaches utilize a trusted operating system (OS) to maintain data separation between differently classified data. The goal is to enable simultaneous or multiplexed viewing of differently classified data through a windows manager. However, application development costs are expensive due to strict compliance requirements imposed by secure (trusted) OS procedures. Furthermore, security mechanisms employed in a trusted OS sometimes preclude customer required features, and integrating government off-the-shelf(GOTS) software from competing vendors on one application server can be problematic. A computer system security architecture provides a superior alternative to the cumbersome and costly trusted OS approach for displaying differently classified data on the same computer screen. Given the proper security architecture, the system should be accredited for government use, liberating software programmers to apply modern development techniques without excessive concern over security. This will leave the developer more time to concentrate on code functionality and reduce the cost of GOTS applications.
引用
收藏
页码:188 / 199
页数:12
相关论文
共 50 条
  • [1] Multi-level Interoperability for Pervasive Communication Networks
    Zender, Raphael
    Dressler, Enrico
    Lucke, Ulrike
    Tavangarian, Djamshid
    2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 366 - 368
  • [2] MULTI-LEVEL SECURITY IN DATABASE MANAGEMENT SYSTEMS.
    Dwyer, Patricia A.
    Jelatis, George D.
    Thuraisingham, Bhavani M.
    Computers and Security, 1987, 6 (03): : 252 - 260
  • [3] Multi-Level security model in distributed database systems
    Bakir, Cigdem
    Guclu, Mehmet
    PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI, 2022, 28 (02): : 266 - 276
  • [4] Multi-level models for data security in networks and in the Internet of things
    Logrippo, Luigi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [5] Realistic Modeling of Tactical Networks with Multi-Level Security in VAN Testbeds
    Poylisher, Alex
    Lu, Taichuan
    Serban, Constantin
    Lee, John
    Chadha, Ritu
    Chiang, Cho-Yu Jason
    Jakubowski, Kimberly
    Whittaker, Keith
    Bauer, Rocio
    MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010), 2010, : 160 - 165
  • [6] Multi-level systems
    Lin, Yi, 1875, Taylor and Francis Ltd. (20):
  • [7] MULTI-LEVEL SYSTEMS
    LIN, Y
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 1989, 20 (10) : 1875 - 1889
  • [8] Towards the Integration of Multi-Level and Multi-View Modelling for Interoperability
    Fu, Yuhong
    Grossmann, Georg
    Kaur, Karamjit
    Selway, Matt
    Stumptner, Markus
    2023 ACM/IEEE INTERNATIONAL CONFERENCE ON MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS COMPANION, MODELS-C, 2023, : 679 - 688
  • [9] Extending linux for multi-level security
    Wilson, George
    Weidner, Klaus
    Salem, Loulwa
    PROCEEDINGS OF THE THIRD ANNUAL SECURITY ENHANCED LINUX SYMPOSIUM, 2007, : 101 - 109
  • [10] Multi-level security requirements for hypervisors
    Karger, PA
    21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 240 - 248