Overview of a high assurance architecture for distributed multilevel security

A high assurance architecture is described for the protection of distributed multilevel secure computing environments from malicious code and other attacks. Component security services and mechanisms extend and interoperate with commodity PCs, commodity client software, applications, trusted compone...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Irvine, C.E., Levin, T.E., Nguyen, T.D., Shifflett, D., Khosalim, J., Clark, P.C., Wong, A., Afinidad, F., Bibighaus, D., Sears, J.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 45
container_issue
container_start_page 38
container_title
container_volume
creator Irvine, C.E.
Levin, T.E.
Nguyen, T.D.
Shifflett, D.
Khosalim, J.
Clark, P.C.
Wong, A.
Afinidad, F.
Bibighaus, D.
Sears, J.
description A high assurance architecture is described for the protection of distributed multilevel secure computing environments from malicious code and other attacks. Component security services and mechanisms extend and interoperate with commodity PCs, commodity client software, applications, trusted components, and legacy single level networks, providing new capabilities for composing secure, distributed multilevel security. This architecture results from the realization that unless a secure system offers users comfortable and familiar interfaces for handling routine information, it will fail due to lack of user acceptability.
doi_str_mv 10.1109/IAW.2004.1437795
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1437795</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1437795</ieee_id><sourcerecordid>1437795</sourcerecordid><originalsourceid>FETCH-LOGICAL-i217t-4607f3205d507f9b4e6014a1cb42b2308a40e17f2b5a49b7680f8311bbd8ef8b3</originalsourceid><addsrcrecordid>eNotj81KAzEYRQMiKHX2gpu8wIxf_ibJshR_Ci3dKC5LMvPFiUytJJmRvr0Fe7lw7urAJeSeQcMY2Mf18qPhALJhUmht1RWprDZwrjBK8_aGVDl_wTnCKqbULdnuZkxzxF96DNTRIX4O1OU8JffdIXWpG2LBrkwJaTgm2sdcUvRTwZ4eprHEEWccacZuSrGc7sh1cGPG6sIFeX9-elu91pvdy3q13NSRM11q2YIOgoPq1XlYL7EFJh3rvOSeCzBOAjIduFdOWq9bA8EIxrzvDQbjxYI8_HsjIu5_Ujy4dNpfTos_EhxNTQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Overview of a high assurance architecture for distributed multilevel security</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Irvine, C.E. ; Levin, T.E. ; Nguyen, T.D. ; Shifflett, D. ; Khosalim, J. ; Clark, P.C. ; Wong, A. ; Afinidad, F. ; Bibighaus, D. ; Sears, J.</creator><creatorcontrib>Irvine, C.E. ; Levin, T.E. ; Nguyen, T.D. ; Shifflett, D. ; Khosalim, J. ; Clark, P.C. ; Wong, A. ; Afinidad, F. ; Bibighaus, D. ; Sears, J.</creatorcontrib><description>A high assurance architecture is described for the protection of distributed multilevel secure computing environments from malicious code and other attacks. Component security services and mechanisms extend and interoperate with commodity PCs, commodity client software, applications, trusted components, and legacy single level networks, providing new capabilities for composing secure, distributed multilevel security. This architecture results from the realization that unless a secure system offers users comfortable and familiar interfaces for handling routine information, it will fail due to lack of user acceptability.</description><identifier>ISBN: 9780780385726</identifier><identifier>ISBN: 0780385721</identifier><identifier>DOI: 10.1109/IAW.2004.1437795</identifier><language>eng</language><publisher>IEEE</publisher><subject>Application software ; Communication system security ; Computer architecture ; Data security ; Distributed computing ; Information security ; Military computing ; Multilevel systems ; Personal communication networks ; Protection</subject><ispartof>Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004, 2004, p.38-45</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1437795$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,4036,4037,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1437795$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Irvine, C.E.</creatorcontrib><creatorcontrib>Levin, T.E.</creatorcontrib><creatorcontrib>Nguyen, T.D.</creatorcontrib><creatorcontrib>Shifflett, D.</creatorcontrib><creatorcontrib>Khosalim, J.</creatorcontrib><creatorcontrib>Clark, P.C.</creatorcontrib><creatorcontrib>Wong, A.</creatorcontrib><creatorcontrib>Afinidad, F.</creatorcontrib><creatorcontrib>Bibighaus, D.</creatorcontrib><creatorcontrib>Sears, J.</creatorcontrib><title>Overview of a high assurance architecture for distributed multilevel security</title><title>Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004</title><addtitle>IAW</addtitle><description>A high assurance architecture is described for the protection of distributed multilevel secure computing environments from malicious code and other attacks. Component security services and mechanisms extend and interoperate with commodity PCs, commodity client software, applications, trusted components, and legacy single level networks, providing new capabilities for composing secure, distributed multilevel security. This architecture results from the realization that unless a secure system offers users comfortable and familiar interfaces for handling routine information, it will fail due to lack of user acceptability.</description><subject>Application software</subject><subject>Communication system security</subject><subject>Computer architecture</subject><subject>Data security</subject><subject>Distributed computing</subject><subject>Information security</subject><subject>Military computing</subject><subject>Multilevel systems</subject><subject>Personal communication networks</subject><subject>Protection</subject><isbn>9780780385726</isbn><isbn>0780385721</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj81KAzEYRQMiKHX2gpu8wIxf_ibJshR_Ci3dKC5LMvPFiUytJJmRvr0Fe7lw7urAJeSeQcMY2Mf18qPhALJhUmht1RWprDZwrjBK8_aGVDl_wTnCKqbULdnuZkxzxF96DNTRIX4O1OU8JffdIXWpG2LBrkwJaTgm2sdcUvRTwZ4eprHEEWccacZuSrGc7sh1cGPG6sIFeX9-elu91pvdy3q13NSRM11q2YIOgoPq1XlYL7EFJh3rvOSeCzBOAjIduFdOWq9bA8EIxrzvDQbjxYI8_HsjIu5_Ujy4dNpfTos_EhxNTQ</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Irvine, C.E.</creator><creator>Levin, T.E.</creator><creator>Nguyen, T.D.</creator><creator>Shifflett, D.</creator><creator>Khosalim, J.</creator><creator>Clark, P.C.</creator><creator>Wong, A.</creator><creator>Afinidad, F.</creator><creator>Bibighaus, D.</creator><creator>Sears, J.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2004</creationdate><title>Overview of a high assurance architecture for distributed multilevel security</title><author>Irvine, C.E. ; Levin, T.E. ; Nguyen, T.D. ; Shifflett, D. ; Khosalim, J. ; Clark, P.C. ; Wong, A. ; Afinidad, F. ; Bibighaus, D. ; Sears, J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i217t-4607f3205d507f9b4e6014a1cb42b2308a40e17f2b5a49b7680f8311bbd8ef8b3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Application software</topic><topic>Communication system security</topic><topic>Computer architecture</topic><topic>Data security</topic><topic>Distributed computing</topic><topic>Information security</topic><topic>Military computing</topic><topic>Multilevel systems</topic><topic>Personal communication networks</topic><topic>Protection</topic><toplevel>online_resources</toplevel><creatorcontrib>Irvine, C.E.</creatorcontrib><creatorcontrib>Levin, T.E.</creatorcontrib><creatorcontrib>Nguyen, T.D.</creatorcontrib><creatorcontrib>Shifflett, D.</creatorcontrib><creatorcontrib>Khosalim, J.</creatorcontrib><creatorcontrib>Clark, P.C.</creatorcontrib><creatorcontrib>Wong, A.</creatorcontrib><creatorcontrib>Afinidad, F.</creatorcontrib><creatorcontrib>Bibighaus, D.</creatorcontrib><creatorcontrib>Sears, J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Irvine, C.E.</au><au>Levin, T.E.</au><au>Nguyen, T.D.</au><au>Shifflett, D.</au><au>Khosalim, J.</au><au>Clark, P.C.</au><au>Wong, A.</au><au>Afinidad, F.</au><au>Bibighaus, D.</au><au>Sears, J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Overview of a high assurance architecture for distributed multilevel security</atitle><btitle>Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004</btitle><stitle>IAW</stitle><date>2004</date><risdate>2004</risdate><spage>38</spage><epage>45</epage><pages>38-45</pages><isbn>9780780385726</isbn><isbn>0780385721</isbn><abstract>A high assurance architecture is described for the protection of distributed multilevel secure computing environments from malicious code and other attacks. Component security services and mechanisms extend and interoperate with commodity PCs, commodity client software, applications, trusted components, and legacy single level networks, providing new capabilities for composing secure, distributed multilevel security. This architecture results from the realization that unless a secure system offers users comfortable and familiar interfaces for handling routine information, it will fail due to lack of user acceptability.</abstract><pub>IEEE</pub><doi>10.1109/IAW.2004.1437795</doi><tpages>8</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9780780385726
ispartof Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004, 2004, p.38-45
issn
language eng
recordid cdi_ieee_primary_1437795
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Application software
Communication system security
Computer architecture
Data security
Distributed computing
Information security
Military computing
Multilevel systems
Personal communication networks
Protection
title Overview of a high assurance architecture for distributed multilevel security
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T04%3A43%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Overview%20of%20a%20high%20assurance%20architecture%20for%20distributed%20multilevel%20security&rft.btitle=Proceedings%20from%20the%20Fifth%20Annual%20IEEE%20SMC%20Information%20Assurance%20Workshop,%202004&rft.au=Irvine,%20C.E.&rft.date=2004&rft.spage=38&rft.epage=45&rft.pages=38-45&rft.isbn=9780780385726&rft.isbn_list=0780385721&rft_id=info:doi/10.1109/IAW.2004.1437795&rft_dat=%3Cieee_6IE%3E1437795%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1437795&rfr_iscdi=true