MYSEA: The Monterey Security Architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while providing protection from malicious code and attacks devised by highly motivated adversaries. The MYSEA architecture uses com...
Gespeichert in:
Hauptverfasser: | , , , , , , , |
---|---|
Format: | Report |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Irvine, Cynthia E Nguyen, Thuy D Shifflett, David J Levin, Timothy E Khosalim, Jean Prince, Charles Clark, Paul C Gondree, Mark |
description | Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while providing protection from malicious code and attacks devised by highly motivated adversaries. The MYSEA architecture uses component security services and mechanisms to extend and inter-operate with commodity PCs, commodity client software, applications, trusted components, and legacy single level networks, providing new capabilities for composing secure, distributed multilevel secure solutions. This results in an architecture that meets two compelling requirements: first, that users have a familiar work environment, and, second, that critical mandatory security policies are enforced. |
format | Report |
fullrecord | <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_ADA518680</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>ADA518680</sourcerecordid><originalsourceid>FETCH-dtic_stinet_ADA5186803</originalsourceid><addsrcrecordid>eNrjZND0jQx2dbRSCMlIVfDNzytJLUqtVAhOTS4tyiypVHAsSs7ILElNLiktSuVhYE1LzClO5YXS3Awybq4hzh66KSWZyfHFJZl5qSXxji6OpoYWZhYGxgSkARhZJSw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>MYSEA: The Monterey Security Architecture</title><source>DTIC Technical Reports</source><creator>Irvine, Cynthia E ; Nguyen, Thuy D ; Shifflett, David J ; Levin, Timothy E ; Khosalim, Jean ; Prince, Charles ; Clark, Paul C ; Gondree, Mark</creator><creatorcontrib>Irvine, Cynthia E ; Nguyen, Thuy D ; Shifflett, David J ; Levin, Timothy E ; Khosalim, Jean ; Prince, Charles ; Clark, Paul C ; Gondree, Mark ; NAVAL POSTGRADUATE SCHOOL MONTEREY CA</creatorcontrib><description>Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while providing protection from malicious code and attacks devised by highly motivated adversaries. The MYSEA architecture uses component security services and mechanisms to extend and inter-operate with commodity PCs, commodity client software, applications, trusted components, and legacy single level networks, providing new capabilities for composing secure, distributed multilevel secure solutions. This results in an architecture that meets two compelling requirements: first, that users have a familiar work environment, and, second, that critical mandatory security policies are enforced.</description><language>eng</language><subject>ANTIINTRUSION DEVICES ; ATTACK ; AUTHENTICATION ; CLIENT SERVER SYSTEMS ; COMPUTER ACCESS CONTROL ; COMPUTER APPLICATIONS ; Computer Systems Management and Standards ; CRYPTOGRAPHY ; HIGH LEVEL ARCHITECTURE ; INFORMATION ASSURANCE ; INFORMATION FLOW CONTROLS ; Information Science ; INFORMATION SECURITY ; INTRUSION DETECTION(COMPUTERS) ; MANDATORY SECURITY POLICIES ; OPEN SOURCE ; SENSITIVITY</subject><creationdate>2009</creationdate><rights>Approved for public release; distribution is unlimited.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,776,881,27546,27547</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/ADA518680$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Irvine, Cynthia E</creatorcontrib><creatorcontrib>Nguyen, Thuy D</creatorcontrib><creatorcontrib>Shifflett, David J</creatorcontrib><creatorcontrib>Levin, Timothy E</creatorcontrib><creatorcontrib>Khosalim, Jean</creatorcontrib><creatorcontrib>Prince, Charles</creatorcontrib><creatorcontrib>Clark, Paul C</creatorcontrib><creatorcontrib>Gondree, Mark</creatorcontrib><creatorcontrib>NAVAL POSTGRADUATE SCHOOL MONTEREY CA</creatorcontrib><title>MYSEA: The Monterey Security Architecture</title><description>Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while providing protection from malicious code and attacks devised by highly motivated adversaries. The MYSEA architecture uses component security services and mechanisms to extend and inter-operate with commodity PCs, commodity client software, applications, trusted components, and legacy single level networks, providing new capabilities for composing secure, distributed multilevel secure solutions. This results in an architecture that meets two compelling requirements: first, that users have a familiar work environment, and, second, that critical mandatory security policies are enforced.</description><subject>ANTIINTRUSION DEVICES</subject><subject>ATTACK</subject><subject>AUTHENTICATION</subject><subject>CLIENT SERVER SYSTEMS</subject><subject>COMPUTER ACCESS CONTROL</subject><subject>COMPUTER APPLICATIONS</subject><subject>Computer Systems Management and Standards</subject><subject>CRYPTOGRAPHY</subject><subject>HIGH LEVEL ARCHITECTURE</subject><subject>INFORMATION ASSURANCE</subject><subject>INFORMATION FLOW CONTROLS</subject><subject>Information Science</subject><subject>INFORMATION SECURITY</subject><subject>INTRUSION DETECTION(COMPUTERS)</subject><subject>MANDATORY SECURITY POLICIES</subject><subject>OPEN SOURCE</subject><subject>SENSITIVITY</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>2009</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNrjZND0jQx2dbRSCMlIVfDNzytJLUqtVAhOTS4tyiypVHAsSs7ILElNLiktSuVhYE1LzClO5YXS3Awybq4hzh66KSWZyfHFJZl5qSXxji6OpoYWZhYGxgSkARhZJSw</recordid><startdate>200901</startdate><enddate>200901</enddate><creator>Irvine, Cynthia E</creator><creator>Nguyen, Thuy D</creator><creator>Shifflett, David J</creator><creator>Levin, Timothy E</creator><creator>Khosalim, Jean</creator><creator>Prince, Charles</creator><creator>Clark, Paul C</creator><creator>Gondree, Mark</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>200901</creationdate><title>MYSEA: The Monterey Security Architecture</title><author>Irvine, Cynthia E ; Nguyen, Thuy D ; Shifflett, David J ; Levin, Timothy E ; Khosalim, Jean ; Prince, Charles ; Clark, Paul C ; Gondree, Mark</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_ADA5186803</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>2009</creationdate><topic>ANTIINTRUSION DEVICES</topic><topic>ATTACK</topic><topic>AUTHENTICATION</topic><topic>CLIENT SERVER SYSTEMS</topic><topic>COMPUTER ACCESS CONTROL</topic><topic>COMPUTER APPLICATIONS</topic><topic>Computer Systems Management and Standards</topic><topic>CRYPTOGRAPHY</topic><topic>HIGH LEVEL ARCHITECTURE</topic><topic>INFORMATION ASSURANCE</topic><topic>INFORMATION FLOW CONTROLS</topic><topic>Information Science</topic><topic>INFORMATION SECURITY</topic><topic>INTRUSION DETECTION(COMPUTERS)</topic><topic>MANDATORY SECURITY POLICIES</topic><topic>OPEN SOURCE</topic><topic>SENSITIVITY</topic><toplevel>online_resources</toplevel><creatorcontrib>Irvine, Cynthia E</creatorcontrib><creatorcontrib>Nguyen, Thuy D</creatorcontrib><creatorcontrib>Shifflett, David J</creatorcontrib><creatorcontrib>Levin, Timothy E</creatorcontrib><creatorcontrib>Khosalim, Jean</creatorcontrib><creatorcontrib>Prince, Charles</creatorcontrib><creatorcontrib>Clark, Paul C</creatorcontrib><creatorcontrib>Gondree, Mark</creatorcontrib><creatorcontrib>NAVAL POSTGRADUATE SCHOOL MONTEREY CA</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Irvine, Cynthia E</au><au>Nguyen, Thuy D</au><au>Shifflett, David J</au><au>Levin, Timothy E</au><au>Khosalim, Jean</au><au>Prince, Charles</au><au>Clark, Paul C</au><au>Gondree, Mark</au><aucorp>NAVAL POSTGRADUATE SCHOOL MONTEREY CA</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>MYSEA: The Monterey Security Architecture</btitle><date>2009-01</date><risdate>2009</risdate><abstract>Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while providing protection from malicious code and attacks devised by highly motivated adversaries. The MYSEA architecture uses component security services and mechanisms to extend and inter-operate with commodity PCs, commodity client software, applications, trusted components, and legacy single level networks, providing new capabilities for composing secure, distributed multilevel secure solutions. This results in an architecture that meets two compelling requirements: first, that users have a familiar work environment, and, second, that critical mandatory security policies are enforced.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_dtic_stinet_ADA518680 |
source | DTIC Technical Reports |
subjects | ANTIINTRUSION DEVICES ATTACK AUTHENTICATION CLIENT SERVER SYSTEMS COMPUTER ACCESS CONTROL COMPUTER APPLICATIONS Computer Systems Management and Standards CRYPTOGRAPHY HIGH LEVEL ARCHITECTURE INFORMATION ASSURANCE INFORMATION FLOW CONTROLS Information Science INFORMATION SECURITY INTRUSION DETECTION(COMPUTERS) MANDATORY SECURITY POLICIES OPEN SOURCE SENSITIVITY |
title | MYSEA: The Monterey Security Architecture |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T04%3A36%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=MYSEA:%20The%20Monterey%20Security%20Architecture&rft.au=Irvine,%20Cynthia%20E&rft.aucorp=NAVAL%20POSTGRADUATE%20SCHOOL%20MONTEREY%20CA&rft.date=2009-01&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EADA518680%3C/dtic_1RU%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |