Security architecture-based system design

被引:0
作者
Schneider, EA [1 ]
机构
[1] Inst Def Anal, Alexandria, VA 22311 USA
来源
NEW SECURITY PARADIGM WORKSHOP, PROCEEDINGS | 2000年
关键词
security architecture; security policy; information domain; information system design;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a new view of information security based on concepts from the Defense Goal Security Architecture. This view looks at security according to the desire to protect and to share information without regard to either the hardware or the software architecture. The result is a separation of concerns and a security architecture that is based on system security requirements without including the network topology or the process interactions. The primary construct of the architecture is the information domain in which authorized users share information that has a common set of protection requirements. The system design is formed as a product of the security, the hardware, and the software architectures.
引用
收藏
页码:25 / 31
页数:7
相关论文
共 8 条
[1]   A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS [J].
ABADI, M ;
BURROWS, M ;
LAMPSON, B ;
PLOTKIN, G .
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1993, 15 (04) :706-734
[2]  
*DEF INF SYST AG C, 1996, GOAL SEC ARCH DGSA V
[3]  
EDWARD A, 1998, OPERATING SYSTEMS RE, V32, P3
[4]  
GARLAN D, 1993, ADV SOFTWARE ENG KNO
[5]  
GREENWALD S, 1996, P 1996 WORKSH NEW SE, P74
[6]   Applying the dod goal security architecture as a methodology for the development of system and enterprise security architectures [J].
Lowman, T ;
Mosier, D .
13TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1997, :183-193
[7]  
OLAWSKY D, 1996, P NEW SEC PAR WORKSH, P60
[8]  
SCHNEIDER EA, 1997, P3375 DGSA IDA