1994
DOI: 10.21236/ada465588
|View full text |Cite
|
Sign up to set email alerts
|

A Practical Approach to High Assurance Multilevel Secure Computing Service

Abstract: Researchers, system developers, and system integrators have long sought ways to provide acceptable, affordable multilevel secure (MLS) computing services. By "multilevel secure computing service" we mean a single service that permits users with different clearances to have access to computerized data and programs for which they are authorized and prevents them from gaining access to those for which they aren't.Although the history of efforts to provide MLS computing service is entering its third decade, curren… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

1996
1996
2010
2010

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Replication architectures [48] provide a simple technique to achieve near-term multilevel security by copying all information at low security levels to all dominating levels. MYSEA rejects this approach because, when considering many documents or security levels, replication scales so poorly as to be infeasible.…”
Section: Related Workmentioning
confidence: 99%
“…Replication architectures [48] provide a simple technique to achieve near-term multilevel security by copying all information at low security levels to all dominating levels. MYSEA rejects this approach because, when considering many documents or security levels, replication scales so poorly as to be infeasible.…”
Section: Related Workmentioning
confidence: 99%
“…AE Print the first m prime numbersae [3] " AE Fill table p with the first m prime numbersae [11]; AE Print table pae [8] This macro is invoked in definition 2.…”
Section: Understanding the Problemmentioning
confidence: 99%
“…Henceforth, the phrase valid characters refers only to those characters of even parity received before an over ow. 8 …”
Section: Top-level Requirements Structurementioning
confidence: 99%
“…P sat S holds if process P satis es trace speci cation S. Viewing process P as the set of traces in which P may engage and S as the set of acceptable traces, the sat predicate is equivalent to the subset predicate, i.e., process P may engage only in traces allowed by S 7. The parameter a represents the alphabet of all possible repeater events; a^* represents all possible traces formed from these events 8. outbit is the name of the repeater's output port; inbit is the name of the input port.…”
mentioning
confidence: 99%