DocumentCode :
3263846
Title :
A comparison of trusted X security policies, architectures, and interoperability
Author :
Picciotto, Jeffrey ; Epstein, Jeremy
Author_Institution :
Mitre Corp., Bedford, MA, USA
fYear :
1992
fDate :
30 Nov-4 Dec 1992
Firstpage :
142
Lastpage :
152
Abstract :
During the past several years, interest in architectures for multilevel secure versions of the X Window System (X) has grown dramatically, primarily in the compartmented mode workstation (CMW) community. The architectures and security policies implemented in existing CMWs are similar to each other, although they differ in certain key details. Alternatives to the current approaches are being investigated. Most notably, a TRW-led team of researchers has designed and prototyped a trusted X implementation aimed at the trusted computer systems evaluation criteria (TCSEC) B3 level. The architecture and security policies adopted by this implementation differ radically from those of all the existing CMWs. The architectures and security policies implemented in existing CMWs and the TRW prototype are surveyed, areas of commonality and divergence are identified, and areas where interoperability can be achieved are noted
Keywords :
graphical user interfaces; open systems; security of data; software reliability; X Window System; compartmented mode workstation; interoperability; security policies; trusted X security policies; trusted computer systems evaluation criteria; Computer architecture; Displays; Electrical equipment industry; Keyboards; Mice; Protocols; Prototypes; Security; Supercomputers; Workstations;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 1992. Proceedings., Eighth Annual
Conference_Location :
San Antonio, TX
Print_ISBN :
0-8186-3115-5
Type :
conf
DOI :
10.1109/CSAC.1992.228225
Filename :
228225
Link To Document :
بازگشت