Multilevel security in tightly coupled military systems: Virtualization as a path to MLS

نویسندگان

  • Diana L. Hecht
  • Warren A. Rosen
چکیده

Security is a major cost driver in military systems and is of particular concern when using commercial network protocols in the military environment. MLS systems may be employed to reduce the amount of application software that must be secured and certified at the highest level, avoiding the expense and complexity associated with maintaining the entire system at the highest level of security. The major problem with MLS systems is that the limited demand for them (primarily military and government agencies) does not compensate for the high costs of development and certification. Virtualization, on the other hand, is rapidly becoming a standard technology capable of supporting security while also providing scalability, flexibility, increased utilization, lower cost, and availability for today’s IT infrastructure.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improvement of Navigation Accuracy using Tightly Coupled Kalman Filter

In this paper, a mechanism is designed for integration of inertial navigation system information (INS) and global positioning system information (GPS). In this type of system a series of mathematical and filtering algorithms with Tightly Coupled techniques with several objectives such as application of integrated navigation algorithms, precise calculation of flying object position, speed and at...

متن کامل

An Architecture for Multilevel Secure Interoperability

As computer systems become distributed and heterogeneous, there is strong movement in the commercial sector to ease the problems of interoperability and security. Many standards have been proposed for these problems. However, the commercial sector has not shown strong interest in providing cost-effective high-assurance multilevel security (MLS) solutions to the relatively small communities (e.g...

متن کامل

Kernelized Database Systems Security

There are two main types of security in database systems: discretionary security and mandatory security. Discretionary security restricts access to data items at the discretion of the owner. Most commercial database management systems (DBMS) employ some form of discretionary security by controlling access privileges and modes of data users (Griffiths & Wade, 1976). Discretionary security is not...

متن کامل

Improving E-business Customer Relationship Management Systems with Multilevel Secure Data Models

Customer Relationship Management (CRM) leverages technology to coordinate business-customer interactions with the objective of building long-term loyalty. Multilevel Secure (MLS) data models were originally developed as database models for the management of information in environments with a strict hierarchy of security levels, such as military institutions and government security agencies. Thi...

متن کامل

Event Detection in Multilevel Secure Active Databases

The event-condition-action paradigm (also known as triggers or rules) is a powerful technology. It gives a database “active” capabilities – the ability to react automatically to changes in the database or in the environment. One potential use of this technology is in the area of multilevel secure (MLS) data processing, such as, military, where the subjects and objects are classified into differ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007