MYSEA: The Monterey Security Architecture

Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while providing protection from malicious code and attacks devised by highly motivated adversaries. The MYSEA architecture uses com...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Irvine, Cynthia E, Nguyen, Thuy D, Shifflett, David J, Levin, Timothy E, Khosalim, Jean, Prince, Charles, Clark, Paul C, Gondree, Mark
Format: Report
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Irvine, Cynthia E
Nguyen, Thuy D
Shifflett, David J
Levin, Timothy E
Khosalim, Jean
Prince, Charles
Clark, Paul C
Gondree, Mark
description Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while providing protection from malicious code and attacks devised by highly motivated adversaries. The MYSEA architecture uses component security services and mechanisms to extend and inter-operate with commodity PCs, commodity client software, applications, trusted components, and legacy single level networks, providing new capabilities for composing secure, distributed multilevel secure solutions. This results in an architecture that meets two compelling requirements: first, that users have a familiar work environment, and, second, that critical mandatory security policies are enforced.
format Report
fullrecord <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_ADA518680</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>ADA518680</sourcerecordid><originalsourceid>FETCH-dtic_stinet_ADA5186803</originalsourceid><addsrcrecordid>eNrjZND0jQx2dbRSCMlIVfDNzytJLUqtVAhOTS4tyiypVHAsSs7ILElNLiktSuVhYE1LzClO5YXS3Awybq4hzh66KSWZyfHFJZl5qSXxji6OpoYWZhYGxgSkARhZJSw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>MYSEA: The Monterey Security Architecture</title><source>DTIC Technical Reports</source><creator>Irvine, Cynthia E ; Nguyen, Thuy D ; Shifflett, David J ; Levin, Timothy E ; Khosalim, Jean ; Prince, Charles ; Clark, Paul C ; Gondree, Mark</creator><creatorcontrib>Irvine, Cynthia E ; Nguyen, Thuy D ; Shifflett, David J ; Levin, Timothy E ; Khosalim, Jean ; Prince, Charles ; Clark, Paul C ; Gondree, Mark ; NAVAL POSTGRADUATE SCHOOL MONTEREY CA</creatorcontrib><description>Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while providing protection from malicious code and attacks devised by highly motivated adversaries. The MYSEA architecture uses component security services and mechanisms to extend and inter-operate with commodity PCs, commodity client software, applications, trusted components, and legacy single level networks, providing new capabilities for composing secure, distributed multilevel secure solutions. This results in an architecture that meets two compelling requirements: first, that users have a familiar work environment, and, second, that critical mandatory security policies are enforced.</description><language>eng</language><subject>ANTIINTRUSION DEVICES ; ATTACK ; AUTHENTICATION ; CLIENT SERVER SYSTEMS ; COMPUTER ACCESS CONTROL ; COMPUTER APPLICATIONS ; Computer Systems Management and Standards ; CRYPTOGRAPHY ; HIGH LEVEL ARCHITECTURE ; INFORMATION ASSURANCE ; INFORMATION FLOW CONTROLS ; Information Science ; INFORMATION SECURITY ; INTRUSION DETECTION(COMPUTERS) ; MANDATORY SECURITY POLICIES ; OPEN SOURCE ; SENSITIVITY</subject><creationdate>2009</creationdate><rights>Approved for public release; distribution is unlimited.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,776,881,27546,27547</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/ADA518680$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Irvine, Cynthia E</creatorcontrib><creatorcontrib>Nguyen, Thuy D</creatorcontrib><creatorcontrib>Shifflett, David J</creatorcontrib><creatorcontrib>Levin, Timothy E</creatorcontrib><creatorcontrib>Khosalim, Jean</creatorcontrib><creatorcontrib>Prince, Charles</creatorcontrib><creatorcontrib>Clark, Paul C</creatorcontrib><creatorcontrib>Gondree, Mark</creatorcontrib><creatorcontrib>NAVAL POSTGRADUATE SCHOOL MONTEREY CA</creatorcontrib><title>MYSEA: The Monterey Security Architecture</title><description>Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while providing protection from malicious code and attacks devised by highly motivated adversaries. The MYSEA architecture uses component security services and mechanisms to extend and inter-operate with commodity PCs, commodity client software, applications, trusted components, and legacy single level networks, providing new capabilities for composing secure, distributed multilevel secure solutions. This results in an architecture that meets two compelling requirements: first, that users have a familiar work environment, and, second, that critical mandatory security policies are enforced.</description><subject>ANTIINTRUSION DEVICES</subject><subject>ATTACK</subject><subject>AUTHENTICATION</subject><subject>CLIENT SERVER SYSTEMS</subject><subject>COMPUTER ACCESS CONTROL</subject><subject>COMPUTER APPLICATIONS</subject><subject>Computer Systems Management and Standards</subject><subject>CRYPTOGRAPHY</subject><subject>HIGH LEVEL ARCHITECTURE</subject><subject>INFORMATION ASSURANCE</subject><subject>INFORMATION FLOW CONTROLS</subject><subject>Information Science</subject><subject>INFORMATION SECURITY</subject><subject>INTRUSION DETECTION(COMPUTERS)</subject><subject>MANDATORY SECURITY POLICIES</subject><subject>OPEN SOURCE</subject><subject>SENSITIVITY</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>2009</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNrjZND0jQx2dbRSCMlIVfDNzytJLUqtVAhOTS4tyiypVHAsSs7ILElNLiktSuVhYE1LzClO5YXS3Awybq4hzh66KSWZyfHFJZl5qSXxji6OpoYWZhYGxgSkARhZJSw</recordid><startdate>200901</startdate><enddate>200901</enddate><creator>Irvine, Cynthia E</creator><creator>Nguyen, Thuy D</creator><creator>Shifflett, David J</creator><creator>Levin, Timothy E</creator><creator>Khosalim, Jean</creator><creator>Prince, Charles</creator><creator>Clark, Paul C</creator><creator>Gondree, Mark</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>200901</creationdate><title>MYSEA: The Monterey Security Architecture</title><author>Irvine, Cynthia E ; Nguyen, Thuy D ; Shifflett, David J ; Levin, Timothy E ; Khosalim, Jean ; Prince, Charles ; Clark, Paul C ; Gondree, Mark</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_ADA5186803</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>2009</creationdate><topic>ANTIINTRUSION DEVICES</topic><topic>ATTACK</topic><topic>AUTHENTICATION</topic><topic>CLIENT SERVER SYSTEMS</topic><topic>COMPUTER ACCESS CONTROL</topic><topic>COMPUTER APPLICATIONS</topic><topic>Computer Systems Management and Standards</topic><topic>CRYPTOGRAPHY</topic><topic>HIGH LEVEL ARCHITECTURE</topic><topic>INFORMATION ASSURANCE</topic><topic>INFORMATION FLOW CONTROLS</topic><topic>Information Science</topic><topic>INFORMATION SECURITY</topic><topic>INTRUSION DETECTION(COMPUTERS)</topic><topic>MANDATORY SECURITY POLICIES</topic><topic>OPEN SOURCE</topic><topic>SENSITIVITY</topic><toplevel>online_resources</toplevel><creatorcontrib>Irvine, Cynthia E</creatorcontrib><creatorcontrib>Nguyen, Thuy D</creatorcontrib><creatorcontrib>Shifflett, David J</creatorcontrib><creatorcontrib>Levin, Timothy E</creatorcontrib><creatorcontrib>Khosalim, Jean</creatorcontrib><creatorcontrib>Prince, Charles</creatorcontrib><creatorcontrib>Clark, Paul C</creatorcontrib><creatorcontrib>Gondree, Mark</creatorcontrib><creatorcontrib>NAVAL POSTGRADUATE SCHOOL MONTEREY CA</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Irvine, Cynthia E</au><au>Nguyen, Thuy D</au><au>Shifflett, David J</au><au>Levin, Timothy E</au><au>Khosalim, Jean</au><au>Prince, Charles</au><au>Clark, Paul C</au><au>Gondree, Mark</au><aucorp>NAVAL POSTGRADUATE SCHOOL MONTEREY CA</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>MYSEA: The Monterey Security Architecture</btitle><date>2009-01</date><risdate>2009</risdate><abstract>Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while providing protection from malicious code and attacks devised by highly motivated adversaries. The MYSEA architecture uses component security services and mechanisms to extend and inter-operate with commodity PCs, commodity client software, applications, trusted components, and legacy single level networks, providing new capabilities for composing secure, distributed multilevel secure solutions. This results in an architecture that meets two compelling requirements: first, that users have a familiar work environment, and, second, that critical mandatory security policies are enforced.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_dtic_stinet_ADA518680
source DTIC Technical Reports
subjects ANTIINTRUSION DEVICES
ATTACK
AUTHENTICATION
CLIENT SERVER SYSTEMS
COMPUTER ACCESS CONTROL
COMPUTER APPLICATIONS
Computer Systems Management and Standards
CRYPTOGRAPHY
HIGH LEVEL ARCHITECTURE
INFORMATION ASSURANCE
INFORMATION FLOW CONTROLS
Information Science
INFORMATION SECURITY
INTRUSION DETECTION(COMPUTERS)
MANDATORY SECURITY POLICIES
OPEN SOURCE
SENSITIVITY
title MYSEA: The Monterey Security Architecture
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T04%3A36%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=MYSEA:%20The%20Monterey%20Security%20Architecture&rft.au=Irvine,%20Cynthia%20E&rft.aucorp=NAVAL%20POSTGRADUATE%20SCHOOL%20MONTEREY%20CA&rft.date=2009-01&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EADA518680%3C/dtic_1RU%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true