DocumentCode :
3467484
Title :
Tools to support secure enterprise computing
Author :
Kang, Myong H. ; Eppinger, Brian J. ; Froscher, Judith N.
Author_Institution :
Div. of Inf. Technol., Naval Res. Lab., Washington, DC, USA
fYear :
1999
fDate :
1999
Firstpage :
143
Lastpage :
152
Abstract :
Secure enterprise programming is a difficult and tedious task. Programmers need tools that support different levels of abstraction and that track all the components that participate in distributed enterprises. Those components must cooperate in a distributed environment to achieve higher level goals. A special case of secure enterprise computing is multilevel secure (MLS) computing. Components that may reside in different security domains have to cooperate to achieve higher-level missions. To ease the programmer´s burden, we are developing an MLS workflow management system (WFMS), called MLS METEOR. A programmer can specify a distributed programming logic through a GUI based workflow design tool. Based on the programming logic, MLS METEOR will generate a distributed runtime system that handles communication among different hosts, even those that reside in different classification domains, The multilevel security enforcement of MLS METEOR does not depend on the WFMS itself but rather on the underlying MLS infrastructure and a few security critical components. The paper concentrates on the system organization of MLS METEOR and the rationale for this structure. We explain which portions of the system can be used in generic enterprise computing and which portions are specific to MLS computing
Keywords :
business data processing; distributed programming; graphical user interfaces; security of data; workflow management software; GUI based workflow design tool; MLS METEOR; MLS computing; MLS infrastructure; MLS workflow management system; WFMS; abstraction levels; classification domains; distributed enterprises; distributed environment; distributed programming logic; distributed runtime system; generic enterprise computing; higher level goals; higher-level missions; multilevel secure computing; multilevel security enforcement; programming logic; secure enterprise computing; secure enterprise programming; security critical components; security domains; Communication system security; Globalization; Information technology; Laboratories; Logic design; Logic programming; Military computing; Multilevel systems; Programming profession; Tellurium;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 1999. (ACSAC '99) Proceedings. 15th Annual
Conference_Location :
Phoenix, AZ
ISSN :
1063-9527
Print_ISBN :
0-7695-0346-2
Type :
conf
DOI :
10.1109/CSAC.1999.816022
Filename :
816022
Link To Document :
بازگشت