Overview of a high assurance architecture for distributed multilevel security
A high assurance architecture is described for the protection of distributed multilevel secure computing environments from malicious code and other attacks. Component security services and mechanisms extend and interoperate with commodity PCs, commodity client software, applications, trusted compone...
Gespeichert in:
Hauptverfasser: | , , , , , , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 45 |
---|---|
container_issue | |
container_start_page | 38 |
container_title | |
container_volume | |
creator | Irvine, C.E. Levin, T.E. Nguyen, T.D. Shifflett, D. Khosalim, J. Clark, P.C. Wong, A. Afinidad, F. Bibighaus, D. Sears, J. |
description | A high assurance architecture is described for the protection of distributed multilevel secure computing environments from malicious code and other attacks. Component security services and mechanisms extend and interoperate with commodity PCs, commodity client software, applications, trusted components, and legacy single level networks, providing new capabilities for composing secure, distributed multilevel security. This architecture results from the realization that unless a secure system offers users comfortable and familiar interfaces for handling routine information, it will fail due to lack of user acceptability. |
doi_str_mv | 10.1109/IAW.2004.1437795 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1437795</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1437795</ieee_id><sourcerecordid>1437795</sourcerecordid><originalsourceid>FETCH-LOGICAL-i217t-4607f3205d507f9b4e6014a1cb42b2308a40e17f2b5a49b7680f8311bbd8ef8b3</originalsourceid><addsrcrecordid>eNotj81KAzEYRQMiKHX2gpu8wIxf_ibJshR_Ci3dKC5LMvPFiUytJJmRvr0Fe7lw7urAJeSeQcMY2Mf18qPhALJhUmht1RWprDZwrjBK8_aGVDl_wTnCKqbULdnuZkxzxF96DNTRIX4O1OU8JffdIXWpG2LBrkwJaTgm2sdcUvRTwZ4eprHEEWccacZuSrGc7sh1cGPG6sIFeX9-elu91pvdy3q13NSRM11q2YIOgoPq1XlYL7EFJh3rvOSeCzBOAjIduFdOWq9bA8EIxrzvDQbjxYI8_HsjIu5_Ujy4dNpfTos_EhxNTQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Overview of a high assurance architecture for distributed multilevel security</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Irvine, C.E. ; Levin, T.E. ; Nguyen, T.D. ; Shifflett, D. ; Khosalim, J. ; Clark, P.C. ; Wong, A. ; Afinidad, F. ; Bibighaus, D. ; Sears, J.</creator><creatorcontrib>Irvine, C.E. ; Levin, T.E. ; Nguyen, T.D. ; Shifflett, D. ; Khosalim, J. ; Clark, P.C. ; Wong, A. ; Afinidad, F. ; Bibighaus, D. ; Sears, J.</creatorcontrib><description>A high assurance architecture is described for the protection of distributed multilevel secure computing environments from malicious code and other attacks. Component security services and mechanisms extend and interoperate with commodity PCs, commodity client software, applications, trusted components, and legacy single level networks, providing new capabilities for composing secure, distributed multilevel security. This architecture results from the realization that unless a secure system offers users comfortable and familiar interfaces for handling routine information, it will fail due to lack of user acceptability.</description><identifier>ISBN: 9780780385726</identifier><identifier>ISBN: 0780385721</identifier><identifier>DOI: 10.1109/IAW.2004.1437795</identifier><language>eng</language><publisher>IEEE</publisher><subject>Application software ; Communication system security ; Computer architecture ; Data security ; Distributed computing ; Information security ; Military computing ; Multilevel systems ; Personal communication networks ; Protection</subject><ispartof>Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004, 2004, p.38-45</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1437795$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,4036,4037,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1437795$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Irvine, C.E.</creatorcontrib><creatorcontrib>Levin, T.E.</creatorcontrib><creatorcontrib>Nguyen, T.D.</creatorcontrib><creatorcontrib>Shifflett, D.</creatorcontrib><creatorcontrib>Khosalim, J.</creatorcontrib><creatorcontrib>Clark, P.C.</creatorcontrib><creatorcontrib>Wong, A.</creatorcontrib><creatorcontrib>Afinidad, F.</creatorcontrib><creatorcontrib>Bibighaus, D.</creatorcontrib><creatorcontrib>Sears, J.</creatorcontrib><title>Overview of a high assurance architecture for distributed multilevel security</title><title>Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004</title><addtitle>IAW</addtitle><description>A high assurance architecture is described for the protection of distributed multilevel secure computing environments from malicious code and other attacks. Component security services and mechanisms extend and interoperate with commodity PCs, commodity client software, applications, trusted components, and legacy single level networks, providing new capabilities for composing secure, distributed multilevel security. This architecture results from the realization that unless a secure system offers users comfortable and familiar interfaces for handling routine information, it will fail due to lack of user acceptability.</description><subject>Application software</subject><subject>Communication system security</subject><subject>Computer architecture</subject><subject>Data security</subject><subject>Distributed computing</subject><subject>Information security</subject><subject>Military computing</subject><subject>Multilevel systems</subject><subject>Personal communication networks</subject><subject>Protection</subject><isbn>9780780385726</isbn><isbn>0780385721</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj81KAzEYRQMiKHX2gpu8wIxf_ibJshR_Ci3dKC5LMvPFiUytJJmRvr0Fe7lw7urAJeSeQcMY2Mf18qPhALJhUmht1RWprDZwrjBK8_aGVDl_wTnCKqbULdnuZkxzxF96DNTRIX4O1OU8JffdIXWpG2LBrkwJaTgm2sdcUvRTwZ4eprHEEWccacZuSrGc7sh1cGPG6sIFeX9-elu91pvdy3q13NSRM11q2YIOgoPq1XlYL7EFJh3rvOSeCzBOAjIduFdOWq9bA8EIxrzvDQbjxYI8_HsjIu5_Ujy4dNpfTos_EhxNTQ</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Irvine, C.E.</creator><creator>Levin, T.E.</creator><creator>Nguyen, T.D.</creator><creator>Shifflett, D.</creator><creator>Khosalim, J.</creator><creator>Clark, P.C.</creator><creator>Wong, A.</creator><creator>Afinidad, F.</creator><creator>Bibighaus, D.</creator><creator>Sears, J.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2004</creationdate><title>Overview of a high assurance architecture for distributed multilevel security</title><author>Irvine, C.E. ; Levin, T.E. ; Nguyen, T.D. ; Shifflett, D. ; Khosalim, J. ; Clark, P.C. ; Wong, A. ; Afinidad, F. ; Bibighaus, D. ; Sears, J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i217t-4607f3205d507f9b4e6014a1cb42b2308a40e17f2b5a49b7680f8311bbd8ef8b3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Application software</topic><topic>Communication system security</topic><topic>Computer architecture</topic><topic>Data security</topic><topic>Distributed computing</topic><topic>Information security</topic><topic>Military computing</topic><topic>Multilevel systems</topic><topic>Personal communication networks</topic><topic>Protection</topic><toplevel>online_resources</toplevel><creatorcontrib>Irvine, C.E.</creatorcontrib><creatorcontrib>Levin, T.E.</creatorcontrib><creatorcontrib>Nguyen, T.D.</creatorcontrib><creatorcontrib>Shifflett, D.</creatorcontrib><creatorcontrib>Khosalim, J.</creatorcontrib><creatorcontrib>Clark, P.C.</creatorcontrib><creatorcontrib>Wong, A.</creatorcontrib><creatorcontrib>Afinidad, F.</creatorcontrib><creatorcontrib>Bibighaus, D.</creatorcontrib><creatorcontrib>Sears, J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Irvine, C.E.</au><au>Levin, T.E.</au><au>Nguyen, T.D.</au><au>Shifflett, D.</au><au>Khosalim, J.</au><au>Clark, P.C.</au><au>Wong, A.</au><au>Afinidad, F.</au><au>Bibighaus, D.</au><au>Sears, J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Overview of a high assurance architecture for distributed multilevel security</atitle><btitle>Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004</btitle><stitle>IAW</stitle><date>2004</date><risdate>2004</risdate><spage>38</spage><epage>45</epage><pages>38-45</pages><isbn>9780780385726</isbn><isbn>0780385721</isbn><abstract>A high assurance architecture is described for the protection of distributed multilevel secure computing environments from malicious code and other attacks. Component security services and mechanisms extend and interoperate with commodity PCs, commodity client software, applications, trusted components, and legacy single level networks, providing new capabilities for composing secure, distributed multilevel security. This architecture results from the realization that unless a secure system offers users comfortable and familiar interfaces for handling routine information, it will fail due to lack of user acceptability.</abstract><pub>IEEE</pub><doi>10.1109/IAW.2004.1437795</doi><tpages>8</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9780780385726 |
ispartof | Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004, 2004, p.38-45 |
issn | |
language | eng |
recordid | cdi_ieee_primary_1437795 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Application software Communication system security Computer architecture Data security Distributed computing Information security Military computing Multilevel systems Personal communication networks Protection |
title | Overview of a high assurance architecture for distributed multilevel security |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T04%3A43%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Overview%20of%20a%20high%20assurance%20architecture%20for%20distributed%20multilevel%20security&rft.btitle=Proceedings%20from%20the%20Fifth%20Annual%20IEEE%20SMC%20Information%20Assurance%20Workshop,%202004&rft.au=Irvine,%20C.E.&rft.date=2004&rft.spage=38&rft.epage=45&rft.pages=38-45&rft.isbn=9780780385726&rft.isbn_list=0780385721&rft_id=info:doi/10.1109/IAW.2004.1437795&rft_dat=%3Cieee_6IE%3E1437795%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1437795&rfr_iscdi=true |