Title :
The effects of trusted technology on distributed applications
Author :
Joyce, Michael V.
Author_Institution :
Mitre Corp., McLean, VA, USA
Abstract :
The paper examines the effect of trusted technology on a distributed application being transitioned to a trusted system. Two styles of operation are examined: restricting the operation of all components of the application to a single sensitivity level and allowing the user interface components of the application to operate across a range of sensitivity levels. Within these operational styles, the effects of the trusted technology on the end user, the application administrator, and the developer are examined. The paper also offers suggestions for taking advantage of the enhanced security control features on trusted systems to address typical security weaknesses in distributed applications
Keywords :
distributed processing; military computing; safety-critical software; security of data; user interfaces; application administrator; distributed applications; security control features; security weaknesses; sensitivity level; trusted systems; trusted technology; user interface components; Application software; Communication system security; Control systems; Data security; High-speed networks; Occupational stress; Power system interconnection; Space technology; Terminology; Workstations;
Conference_Titel :
Computer Security Applications Conference, 1994. Proceedings., 10th Annual
Conference_Location :
Orlando, FL
Print_ISBN :
0-8186-6795-8
DOI :
10.1109/CSAC.1994.367302