Multi-Level Security Applications

نویسنده

  • Justin Marston
چکیده

BlueSpace is an enterprise software company, based in Austin, Texas, which creates multi-level secure (MLS) end user applications that can span multiple networks at different classification levels. BlueSpace's middleware strategy facilitates rapid application development, infrastructure consolidation and infrastructure neutrality. The continuing growth in the number of networks in the defense and intelligence communities has led to an increasing requirement for strategies that consolidate physical networks into logical networks running on consolidated infrastructure. This poster paper will survey Multi-Level Secure (MLS) applications that can be deployed on trusted desktops. MLS applications allow trusted desktop systems to go beyond infrastructure cost savings, delivering compelling capabilities for warfighters. Examples include an MLS email client that can provide a single inbox and calendar spanning multiple domains, an MLS search client that spans multiple networks, and an MLS C2 system that can provide a Unified Operating Picture, which consolidates separate Common Operating Pictures into a single view of the battle theater for joint and coalition operations. Multi level end-user applications will catalyse mission transformation in both communities, facilitating 'all-source' intelligence analysis, providing improved C2 awareness and orchestration, and ultimately reducing user frustration by enabling users to work seamlessly across network domains.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

The Private Access Channel: A Security Mechanism for Shared Distribution Objects

We present a security mechanism designed for use with object-based multi-user applications. This mechanism the private access channel provides the same level of fine grain object-based security as the capability scheme. Whereas capabilities have been applied only to limited sets of objects with identical operations, we propose a generic protection mechanism that can be applied to any object, wh...

متن کامل

A Design of Multi-level Structure Security Architecture on Database Ap- plication System

Database application system mainly exists three aspects of insecurity: insecurity of data storage, fragilities of database application, the risk of secret data in the database. Refer to these three factors,This paper presents a multi-level structure security system, which includes decision-making level, code level, and data encryption level. This design enhances security of database site, secur...

متن کامل

SLA-Based Continuous Security Assurance in Multi-Cloud DevOps

Multi-cloud applications, i.e. those that are deployed over multiple independent Cloud providers, pose a number of challenges to the security-aware development and operation. Security assurance in such applications is hard due to the lack of insights of security controls applied by Cloud providers and the need of controlling the security levels of all the components and layers at a time. This p...

متن کامل

Applying a Multi-level Security Mechanism to a Network Address Translation Scheduler

In this paper, we consider a scheduling algorithm being applied with multi-level security that allows two or more hierarchical classification levels of information to be processed simultaneously. There are various load scheduling algorithms pre-built into the Linux Virtual Server system that have been tested and proven effective for distributing the load among the real servers. While these algo...

متن کامل

ASITA: advanced security infrastructure for multi-agent applications in the telematic area

An approach to solve the security aspects raised by agent systems, especially with mobile code and in an open environment, in the context of telecommunication applications is presented. A scenario is given that represents a typical user approach to tomorrow’s integrated services. Typical applications and services are thoroughly characterized, electronic markets are introduced, the players in th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011