منابع مشابه
Multi-Level Security Applications
BlueSpace is an enterprise software company, based in Austin, Texas, which creates multi-level secure (MLS) end user applications that can span multiple networks at different classification levels. BlueSpace's middleware strategy facilitates rapid application development, infrastructure consolidation and infrastructure neutrality. The continuing growth in the number of networks in the defense a...
متن کاملDiscovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce security policies that govern against the misuse of data. Often security policies are not known, too imprecise or simply have been disabled because of changing requirements. Recently several proposals have been made to us...
متن کاملHiding Information in Multi Level Security Systems
In this paper we analyze the possibility for malicious agents to transmit an information possibly hidden in a Multi Level Security System via a covert channel. We give a framework for which we get two decidability results. Firstly, given a code and a system one can decide whether the system allows a covert channel for this code. Secondly, one can decide whether there exists a code to transmit o...
متن کاملExtending Linux for Multi-Level Security
LinuxTM distributions have received numerous Common Criteria certifications in the last few years. Building on the recent Controlled Access Protection Profile (CAPP) certifications, an Open Source development effort to make Linux compliant with the Labeled Security Protection Profile (LSPP) and Role-Based Access Control Protection Profile (RBACPP) has been ongoing for almost two years. Developm...
متن کاملMulti-Level Security in Multiagent Systems
Whenever agents deal with con dential information, it is important that they comply with a principled security policy. We show how the database concept of multi-level security can be applied to inter-agent communication. This includes the case where an unauthorized agent is misinformed on purpose in order to protect con dential information.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering Applied Sciences and Technology
سال: 2019
ISSN: 2455-2143
DOI: 10.33564/ijeast.2019.v03i11.009