KSOS-Computer network applications
نویسنده
چکیده
The need for multilevel security in computer systems has become well known. In the military, lacking such systems makes costs higher than they should be because of the need either to replicate facilities or perform "color changes" (shutting down and purging systems between uses at varying levels) in order to deny less-cleared users access to highly-classified information, and desirable functions which would require the controlled intermixing of data at different security levels are simply not yet done. The Government's concern with such matters is amply reflected in Reference 9. Outside the military, it is clear that most if not all funds transfer systems, for example, would benefit from the other side of the security coin-that is, although the major military threat is compromise of data, the major finanCial threat is alteration of data. In both broad areas, a free-standing multilevel secure operating system would be a distinct -asset. The Kernelized Secure Operating System is meant to be just such a system, and in these terms alone is of considerable interest. This paper, though, will address potential applications of KSOS in areas other than as a free-standing system. Aside from use as a free-standing system,12 it is essentially the case that all other currently-envisioned applications of KSOS will involve intercomputer network environments. Under current consideration at varying levels of intensity are the use of KSOS as a containing operating system for communications subnetwork processors ("packet switches") themselves, Network Front-Ends, Network "Front Doors" (in which case the associated Host plays a "Back-End" roie), mini-Hosts (to support users at terminals), and nodes for the processing of military messages. Although only the last of these has at present been analyzed in considerable detail, all are interesting and all will be touched upon in some detail. KSOS's use in such applications is, as the title suggests, the main theme of this paper. However, it should be obvious that the mere act of inserting a secure component into a network architecture does not mystically make the network itself secure. Therefore, another important consideration which must be addressed is that the broad issue of just how to make a network secure is a complex one, and not nec-
منابع مشابه
KSOS-Development methodology for a secure operating system*
The goal of the Department of Defense Kernelized Secure Operating System (KSOS) project is to design, implement and prove a secure operating system. Specifically, it is desired that KSOS be designed and proven to enforce a security model, derived from the security practices of the Department of Defense, referred to as "multilevel security." The proof required for KSOS is rigorous proof in the m...
متن کاملComputer Network Time Synchronization using a Low Cost GPS Engine
Accurate and reliable time is necessary for financial and legal transactions, transportation, distribution systems, and many other applications. Time synchronization protocols such as NTP (the Network Time Protocol) have kept clocks of such applications synchronized to each other for many years. Nowadays there are many commercial GPS based NTP time server products at the market but they almost ...
متن کاملApplications for multilevel secure operating systems
Specification of a Muitics Security Kernel," ESD-TR-77-259. Vols. I-III, The MITRE Corporation, Bedford, Massachusetts. 12. Ames. S. R., J. K. Millen. "Interface Verification for A Security Ker-nel," INFOTECH State of the Art Report: System Reliability and Integrity. Vol. 2, INFOTECH International, pp. 1-22. 13. Popek, G. J., et al.. "UCLA Data Secure UNIX-A Securable OperatingSystem: S...
متن کاملP2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...
متن کاملNetwork Resource Management for Improving Users Quality of experience in Software Defined Network by Weighted Fuzzy Petri-NetMethod
The rapid rise in popularity of multimedia applications, such as VoIP, IPTV and Video Conferencing, intensifies the need to consider resource management for user satisfaction. Furthermore, improving Quality of Experience (QoE) in Software Defined Networks (SDNs) services is one of the important issues to be addressed by provisioning optimum resource management. In this paper, resource allocatio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010