DocumentCode :
1994140
Title :
Redrawing the security perimeter of a trusted system
Author :
Sterne, Daniel F. ; Benson, Glenn S. ; Tajalli, Homayoon
Author_Institution :
Trusted Inf. Syst. Inc., Glenwood, MD, USA
fYear :
1994
fDate :
14-16 Jun 1994
Firstpage :
162
Lastpage :
174
Abstract :
According to the trusted systems evaluation criteria (TCSEC) paradigm, if untrusted subjects are constrained by the trusted computer base (TCB), they may safely execute software of unknown assurance while accessing sensitive information. Untrusted subjects, however, can leak sensitive information, undermine the TCB´s accountability mechanisms, and destroy information integrity. Hence, the security properties needed by many organizations cannot be enforced at the TCSEC security perimeter, i.e., the TCB interface. We propose an alternative approach that redraws the security perimeter of a trusted system so that it encompasses not only a TCSEC TCB but the Controlled Application Set (CAS), a collection of software components for which some assurance of benign behavior has been obtained. Non-CAS components may also be present on a system bird may be used to manipulate only non-sensitive information. The approach advocates a form of balanced assurance in which the assurance sought for CAS components is commensurate with residual security risks they present. We propose practical assurance requirements, including new functional requirements for TCBs. Examples illustrate the applicability of the approach to confidentiality, accountability, and integrity
Keywords :
data integrity; security of data; Controlled Application Set; accountability; accountability mechanisms; confidentiality; information integrity; integrity; security perimeter; sensitive information; trusted computer base; trusted systems evaluation criteria; Access control; Authentication; Content addressable storage; Control systems; Information security; Information systems; Lattices; Robust control; Software safety; Variable speed drives;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings
Conference_Location :
Franconia, NH
ISSN :
1063-6900
Print_ISBN :
0-8186-6230-1
Type :
conf
DOI :
10.1109/CSFW.1994.315938
Filename :
315938
Link To Document :
بازگشت