Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Epstein, Jeremya; 2 | McHugh, Johnb; 2 | Orman, Hilariec; 2 | Pascale, Ritad; 2 | Marmor-Squires, Anne; 2 | Danner, Bonniee; 2 | Martin, Charles R.f; 2 | Branstad, Marthag; 2 | Benson, Glenng; 2 | Rothnie, Dougg; 2
Affiliations: [a] Cordant, Inc. | [b] Department of Computer Science, Portland State University, P.O. Box 751, Portland, OR97207-0751, USA | [c] University of Arizona | [d] ORA Corporation | [e] TRW Systems Division | [f] The University of North Carolina | [g] Trusted Information Systems, Inc.
Note: [1] This work is sponsored by the Defense Advanced Research Projects Agency under Contract No. MDA 972-89-C0029. Correspondence should be addressed to Ann Marmor-Squires, TRW Systems Division, Fairfax, VA. or by email to [email protected]. An earlier version of this paper was presented at the Seventh Annual Computer Security Applications Conference, San Antonio TX, December 1991.
Note: [2] Authors' current email addresses are: Epstein, [email protected]; McHugh, [email protected]; Orman, [email protected]; Pascale, [email protected]; Marmor-Squires, [email protected]; Martin, [email protected]. Branstad, [email protected]; Benson, [email protected]; Rothnie, [email protected].
Abstract: This paper describes the architecture of a prototype multilevel secure windowing system based on the X Window System. The prototype, known as TX, is designed to meet the class B3 architectural requirements of the Trusted Computer System Evaluation Criteria (TCSEC). The architecture and prototype described here demonstrate that high assurance windowing technology is feasible. The TX architecture is based on the encapsulation of untrusted functionality, such as that contained in an ordinary X server, using a relatively small amount of trusted applications code. The untrusted functionality is then polyinstantiated or replicated once for each active sensitivity level. This leads to a combination of high assurance and complex functionality while reducing the evaluation effort to a tractable level. The architecture of TX is described, and its information flow and visible labeling security policies are discussed. The trade-offs that were made to maintain assurance while achieving other software engineering goals are considered. TX is compared with several other trusted windowing systems.
DOI: 10.3233/JCS-1993-22-306
Journal: Journal of Computer Security, vol. 2, no. 2-3, pp. 159-190, 1993
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]