首页> 外文会议>Annual Computer Security Applications Conference >A comparison of trusted X security policies, architectures, and interoperability
【24h】

A comparison of trusted X security policies, architectures, and interoperability

机译:可信X安全策略,架构和互操作性的比较

获取原文

摘要

During the past several years, interest in architectures for multilevel secure versions of the X Window System (X) has grown dramatically, primarily in the compartmented mode workstation (CMW) community. The architectures and security policies implemented in existing CMWs are similar to each other, although they differ in certain key details. Alternatives to the current approaches are being investigated. Most notably, a TRW-led team of researchers has designed and prototyped a trusted X implementation aimed at the trusted computer systems evaluation criteria (TCSEC) B3 level. The architecture and security policies adopted by this implementation differ radically from those of all the existing CMWs. The architectures and security policies implemented in existing CMWs and the TRW prototype are surveyed, areas of commonality and divergence are identified, and areas where interoperability can be achieved are noted.
机译:在过去几年中,对X Window系统(X)的多级安全版本的架构的兴趣显着增加,主要是在隔间模式工作站(CMW)社区中。在现有CMW中实现的架构和安全策略相似,但它们在某些关键细节中不同。正在研究目前方法的替代方案。最值得注意的是,TRW-LED的研究人员已经设计和原型设计了一个可信赖的X实现,目标是可信计算机系统评估标准(TCSEC)B3级别。此实现采用的架构和安全策略与所有现有CMW的架构不同。调查在现有CMW和TRW原型中实现的架构和安全策略,鉴定了共性和发散区域,并注意到可以实现互操作性的区域。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号