Implementing Middleware for Content Filtering and Information Flow Control

Size: px
Start display at page:

Download "Implementing Middleware for Content Filtering and Information Flow Control"

Transcription

1 Implementing Middleware for Content Filtering and Information Flow Control Jeffrey Choi Robinson, W. Scott Harrison, Nadine Hanebutte, Center for Secure and Dependable Systems University of Idaho Moscow, ID Paul Oman, and Jim Alves-Foss St. John Fisher College 3690 East Avenue Rochester, NY ABSTRACT This paper discusses the design and implementation of a middleware guard for purposes of content filtering and information flow control in the Multiple Independent Levels of Security (MILS) architecture. The MILS initiative is a joint research effort between academia, industry, and government to develop and implement a high assurance real-time architecture for embedded systems. The MILS architecture incorporates a separation kernel with formal system security policies that are evaluatable, non-bypassable, tamper-proof, and always invoked. Vendor specific high-level applications are assumed to be untrustworthy components; information flow control needs to be performed by middleware entities external to the applications. In the MILS architecture, a MILS Message Router and guards are placed between communicating entities to act as message content filters and enforce information flow control. As the MILS architecture does not restrict the protocols that can be employed for communications between applications, a distinct guard is needed for filtering messages within each protocol. Incorporating protocol specific guards in MILS embedded systems aids in the formal certification of those systems or the high-assurance safety critical formally-proven applications. The guards enable formally-proven security policies that guarantee information flow control, data isolation, predictable process control, damage limitation, and resource availability. An example is provided using a multi-level secure file server that uses a GIOP guard for fine-grained access control. The inclusion of a GIOP guard reduces the complexity and the effort necessary for system certification. Categories and Subject Descriptors C.3 [Special-Purpose and Application-Based Systems]: Realtime and embedded systems, D4.6 [Operating Systems]: Security and Protection-access controls, information flow controls, separation kernels. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. CSAW 07, November 2, 2007, Fairfax, Virginia, USA. Copyright 2007 ACM /07/ $5.00. General Terms Design, Reliability, Security. Keywords MLS, MILS, CORBA, GIOP, IIOP, Guards, Information Flow Control, High Assurance, Common Criteria, Safety, Security. 1. INTRODUCTION Designing and building secure systems is often a complex and challenging task. High-assurance systems require convincing evidence that they support critical safety as well as security properties. If systems fail to meet these critical requirements, the potential for security breaches increases which can lead to the loss of life [2][6]. This paper describes the design and implementation of a middleware guard that filters messages and enforces information flow. It is a modular component that is inserted into communication pathways of high assurance systems. The inclusion of the guard can reduce system complexity and make implementation and evaluation more feasible. The avionics community has addressed the need for safety-critical systems by developing the DO-178b and DO-255 standards, which provide a set of guidelines for the design, analysis, and evaluation of system safety [9][12]. Though adequate for the safety evaluation of airborne systems, neither is sufficient to address the security concerns of critical security systems, such as weapons systems that protect national security. Such highassurance systems require the rigorous specification and implementation requirements outlined in the Common Criteria (CC) [5]. The CC provides guidelines for the design, analysis, and evaluation of critical systems defined at seven Evaluation Assurance Levels (EAL). The higher the assurance level, the stricter the requirements mandated by the CC. At the highest levels (EAL 5-7), the CC requires the use of formal methods, mathematical models, and proofs [2]. Formal verification of code is often arduous and time-consuming. In fact, code-bases with a large number of lines of code (LOC) are considered to be unverifiable [7]. The majority of code-bases are developed with a large number of LOC. The goal for a verifiable software package destined for EAL5+ certification is under 4,000 LOC [7]. Thus, a design shift from monolithic code-bases to smaller modular components must occur. 47

2 Figure 1: The MILS Architecture One system architecture designed specifically for EAL 5+ certification is Multiple Independent Levels of Security (MILS) [3][6]. MILS is a joint initiative between government, industry, and academia, coordinated through the Air Force Research Lab's Information Directorate. The MILS approach to meeting the formal evaluation requirements of the CC is to separate system functionality into smaller, individually verifiable components. Dransfield et al. [14] state that the MILS architecture allows the system security engineer to build either a communications security or a safety critical system that uses a highly trusted mathematically verified software foundation to meet the necessary requirements. MILS aims to be the future of high-assurance system design by avoiding the high costs associated with verifying monolithic systems. The MILS architecture enables the enforcement of applicationlevel policies by using the security features of the kernel and other lower-level components to create entities that reside along the only authorized communication paths between partitions. A good example of a MILS security component is an application-level protocol filter called a guard. Guards enforce application-specific policies on communication messages. Since MILS guards can be verified independently of other components, they can be built once and inserted into the communication path of any MILS system that needs application-level message filtering. This paper describes the design and implementation of a guard that filters messages using Common Object Request Broker Architecture (CORBA) General Inter-Orb Protocol (GIOP) in a MILS system. The example presented in this paper shows how a GIOP guard can be used to enforce fine-grained access control in a multi-level secure file server, as well as the ease of integration into legacy applications. 2. THE MILS ARCHITECTURE MILS is a verifiably secure architecture for running different security level processes on the same high-assurance system. The MILS architecture accomplishes this by providing two types of separation. First, MILS enforces a separation policy that strictly controls communication between processes of different security levels. This prevents, for instance, a top-secret process from communicating with a neighboring unclassified process if it would violate security policy on that system. Second, MILS separates traditional kernel-level security functionalities into external modular components that are small enough for rigorous security evaluation using formal methods. Verifiable secure Figure 2: MILS Message Path systems are then built from multiple certified components that can be developed quickly without great expense by independent vendors. The foundation component of MILS is the Separation Kernel (SK). The SK segregates processes and their resources into isolated execution spaces called partitions. Processes running in different partitions can neither communicate nor infer each other's presence unless explicitly permitted by the SK in accordance with a security policy. The SK enforces data isolation, controlled information flow, periods processing, and damage limitation security policies on a single microprocessor. Within one or more partitions of each MILS system is the MILS Message Router (MMR). The primary function of the MMR is to route communication between partitions while supporting the data isolation, controlled data flow, periods processing, and damage limitation policy of the SK. The MMR also has the ability to grant or deny untrusted inter-partition communication according to a MLS policy, which it enforces in tandem with the SK. However, it should be noted that the MMR s role is only in place when there needs to be a routing decision made. For instance, communication between two partitions operating at the same level within the same system does not need to be routed through the MMR. This setup is referred to as trusted inter-partition communication or a trusted enclave. In addition to message flow control imposed by the SK and the MMR, a MILS system must also contain fine-grained applicationlevel filters. In a system which supports multiple communications protocols and message formats, it is necessary to write these filters in a very specialized fashion. Each specific protocol or communication type must be implemented in a specific software guard. Guards enforce detailed, protocol-specific policies on 48

3 #$ % Because inter-orb communication is well defined and machine independent, ORBs from different vendors, written in different languages, and running on different platforms are designed to be interoperable. Likewise, this same interoperability is extended to CORBA clients and servants since ORBs always mediate their own communication. application-level messages sent between partitions. A guard exists for each application-level protocol supported in a MILS system. When routing untrusted inter-partition communication, the MMR may route messages through the appropriate guards and then permit or prohibit the message from reaching its destination based on the analysis of the guards. Figure 1 illustrates the MILS architecture and Figure 2 illustrates a message path through a MILS architecture. The message path in Figure 2 represents both the conceptual path of information flow from partition B to partition A and the actual path. In the actual message path, partition B s message is intercepted by the MMR and routed to guard 1 and guard 2 prior to being delivered to partition A. A key goal of the MILS design is transparency, wherein existing applications (e.g., legacy code) can be seamlessly integrated into a MILS environment. This is why there exist two levels of message processing: the MMR must intercept all untrusted communications (again, this must be facilitated by the SK) and the guard filters the communication content. The same principles which lead to message control also allow for integration of legacy code, in that the guard system can change message content. With MILS, system integration of legacy applications is possible without modification of the client applications. We will demonstrate these principles of design by discussing a GIOP guard and its design. 3. CORBA AND GIOP!" Figure 3: GIOP Message Flow CORBA is an open, vendor-independent standard for distributed object-oriented applications. It was introduced by the Object Management Group (OMG) in 1991 and has matured into an industrial strength standard for developing n-tier distributed applications. CORBA runs within the classic client/server application framework. Client applications employ the services of objects (called servants) that are owned by remote server processes (Figure 3). 3.1 CORBA ORBs Object Request Brokers (ORBs) mediate the communication between clients and servant objects. When a client wishes to invoke a servant object, it first sends the request to its own ORB. The client ORB then locates the servant object and forwards the request to the servant's ORB. Finally, the servant ORB relays the request to the servant object. The servant object's response is handled in similar fashion. Since ORBs are positioned between clients and objects, CORBA is often referred to as middleware. 3.2 GIOP and IIOP CORBA ORBs communicate using the General Inter-ORB Protocol (GIOP). GIOP is specifically designed to be a welldefined and machine-independent protocol to provide interoperability between all ORBs. OMG has done this by incorporating the following three core elements into the GIOP specification. 1. Common Data Representation (CDR) - GIOP defines an on-the-wire format for every CORBA Interface Definition Language (IDL) primitive. CORBA IDL is used to allow object compatibility and interaction across varied implementations, e.g., C++ and Java. This ensures that all data types passed between clients and servant objects have a consistent representation across different platforms and programming languages. 2. Message Formats - GIOP defines eight specific message types with which ORBs can communicate (described in the next subsection). 3. Transport Assumptions - Some assumptions are made about the network transport-layer protocol which GIOP runs above. The underlying transport mechanism must be a semi-reliable, connection-oriented, and byte (octet) stream protocol. GIOP can be mapped onto any transport-layer protocol that meets the transport assumptions. The most common mapping of GIOP is onto TCP/IP and is called Internet Inter-ORB Protocol (IIOP). Our research has focused solely on the IIOP variant of GIOP, so GIOP and IIOP are used interchangeably throughout the rest of this paper. 3.3 GIOP Messages GIOP messages are categorized according to their function as either administrative or for object invocation. Briefly, the administrative messages are: LocateRequest - locate a servant object LocateReply - response to a LocateRequest CancelRequest - cancel a pending Request CloseConnection - gracefully abort the connection MessageError - response to a malformed message The object invocation messages are, Request - invoke a servant object method Reply - response to a Request Fragment - for fragmenting large messages (does not exist in GIOP 1.0) 49

4 All GIOP messages have a common 12-byte GIOP header (Figure 4). The first four bytes of the header, called the magic number, are the ASCII characters of GIOP. The magic number is followed by the GIOP version, the message byte-ordering, the GIOP message type, and the message length in bytes. Immediately after the GIOP common header is the actual message, which has both a variable-length header and body. Figure 4: GIOP Message Header The Request and Reply messages are the primary messages used in the invocation of remote servant objects. For this reason they are discussed in further detail below. The Request message is sent by an ORB in order to invoke an object method on behalf of a client application. The Request message header is shown in Figure 5. Figure 5: GIOP Request Header The service context field contains service data passed between the client and the servant ORBs. The request ID is used by the client and the object to match corresponding Requests and Reply messages. Object key and method name are string fields that specify which object and method is to be invoked. The requesting principle is data needed by ORBs to support deprecated internal mechanisms of CORBA. Any parameters to the method are contained in the Request body. The Reply message is sent by an ORB on behalf of a servant object to relay the results of a method invocation back to a client application. Reply messages are always sent in response to a previous Request message. The Reply message header is shown in Figure 6. Figure 6: GIOP Reply Header The service context and request ID fields are the same as in the Request message. The reply status is an enumerated status code indicating the success or failure of the method invocation. Any results returned by the method are contained in the Reply body. 4. MIDDLEWARE SECURITY POLICY MECHANISMS GIOP does not have any built-in security mechanisms, such as identity verification. Further, as seen in the previous section, CORBA does not provide header space for security artifacts (e.g., checksums or keys) within a GIOP message packet. While the ability to distribute methods via CORBA is very convenient, this method of access is not well-suited for a high-assurance environment. It should be noted that OMG's CORBA Security Service (CORBASEC) is not a suitable solution in this case. Foremost, since the ORBS (and thus, CORBASEC itself) reside in the application process space, they are easily bypassed. Further, it can be argued that CORBASEC is a collection of security objects rather than a security architecture. Finally, CORBASEC implementations are too large to formally verify [1]. Consider the multi-level secure file server (MLSFS) introduced by Robinson and Alves-Foss [10][11]. The MLSFS is a trusted high assurance application designed to operate within a MILS architecture and store and distribute information with different security classifications, e.g., top secret, secret, confidential, and unclassified. Remote processes, e.g., user level applications, from different partitions can invoke read and write methods on the system. The MLSFS utilizes transparency that middleware services such as CORBA and GIOP offer in the MILS architecture. It is an assumption that the MLSFS exists on top of a secure and safe configuration of the MILS architecture and uses MILS components to provide requirements such as authentication. For instance, the MLSFS does not verify that a request message originates from the specified requester or that the requester has the security credentials claimed in the request message. In other words, the system does not check to see if request messages are spoofed. The MLSFS follows the assumption that services such as authentication occurs somewhere within the communication path by MILS components and that if a process sends a spoofed request message that it will be rejected. The GIOP protocol would fail to meet this requirement. A client classified to access secret data, e.g., Secret_Read(), could attempt to invoke a read method on top secret data, e.g., TopSecret_Read(). As previously mentioned, there is no stipulation in the GIOP protocol to prevent a low level user from invoking a higher level method. One solution to this problem would be to pull the authorization functionality into the MLSFS. However, doing so would complicate the system and introduce unwanted issues of code complexity and an unverifiable code-base. Instead, using MILS middleware guards to assist in this process provides the benefits of the component-wise certification process discussed in earlier sections. By pushing out requirements like authentication and relying on MILS middleware guards, it makes the verification process much easier [10]. 4.1 Implementing the MMR and GIOP Guard The introduction of MILS architecture greatly simplifies the verification requirements of the MLSFS. In this section, we discuss in more detail how to implement information control flow and message filtering through a combination of the MMR and GIOP guard. The GIOP guard exists outside of both the client and the servant object and has all GIOP messages routed through it by the MMR. The MMR need only recognize GIOP messages in order to route them to an appropriate guard. The MMR does not need to be capable to fully parse messages; it only needs to identify the type. When the GIOP guard receives a message from the MMR, it parses the message, consults a GIOP specific security 50

5 Figure 7: MLS File Server in MILS policy, and then notifies the MMR whether to allow or deny the message. If the message is allowed by the GIOP policy, the MMR sends the message on to its destination. Otherwise, the message is discarded. It should be noted, however, that simply discarding the message will generally be insufficient. If the client never receives a response from the server with a result, the client will likely continue to make the same request. Thus, one function of the GIOP guard is also to generate "error" packets, which look like standard GIOP error messages (e.g., OBJECT-NOT-EXIST). These will be sent back to the client. It should be noted that in a GIOP message, it must be specified whether a response is expected or not. If no response is expected, obviously, an error message need not be returned and the offending request can simply be dropped. We will illustrate the fine-grained access control with an example of the MMR and GIOP guard working together to enforce MLS and transport policies. Client A is a CORBA client application running in secret-level partition 1 and client B is a CORBA client running in unclassified-level partition 2. A CORBA MSLFS object is running in multi-level secure partition 3, which has both secret and top-secret clearances. The MLSFS object has two methods, Secret_Read() and TopSecret_Read(). Figure 7 illustrates this situation. The partitions which contain the MMR and GIOP guard are labeled as a MILS partition, as it has no specific security level itself. Table 1: MMR Communication Paths Source Partition Destination Partition Allowed Unclassified Secret No Unclassified MLSFS No Secret Unclassified No Secret MLSFS Yes MLSFS Unclassified No MLSFS Secret Yes The MLS policy, for this system, is that an unclassified process can only communicate with other unclassified processes, and that secret or top-secret processes can communicate with any higherlevel process. This is the portion of the policy which will be enforced by the MMR, and is shown in Table 1. The MLSFS access policy, however, requires that data access within the MLSFS must be done only by a client at an equal or dominated security level. Specifically, the Secret_Read() can only be called by a secret or top secret-level process, and the TopSecret_Read() can only be called by a top secret-level process. This is a GIOPspecific refinement of the overall communication policy, and this will be enforced by the GIOP guard. Table 2 illustrates the GIOP guard policy. The table lists only secret and top secret partitions. Figure 8: An Example Policy Since the MMR disallows communication between unclassified partitions and the MLSFS, unclassified source partitions are not explicitly addressed in the GIOP guard Policy. It is important to note that, for purposes of the GIOP policy, anything not explicitly allowed would be denied. In addition, while there is no top secret-level partition in Figure 7, the GIOP guard Policy is setup to support a top secret-level partition if it were introduced into the architecture. Table 2: GIOP Guard Policy Source Partition Destination Partition Method Allowed Secret MLSFS Secret_Read() Yes Secret MLSFS TopSecret_Read() No Top Secret MLSFS Secret_Read() Yes Top Secret MLSFS TopSecret_Read() Yes Figure 8 illustrates the MMR and GIOP guard working in unison to enforce the overall security policy. As shown, the MMR allows client A to communicate with the MLSFS object because partitions 1 and 3 both have secret clearance. The GIOP guard, however, restricts client A's communication with the MLSFS object to only invocations of the Secret_Read() method since A doesn't have the top-secret clearance required to invoke TopSecret_Read(). Client B is not allowed to access the MLSFS object at all, because of our policy that unclassified partitions are not allowed to communicate with any other partitions which are not unclassified. It should be noted that the applications are not aware that any of this filtering is taking place. The MMR is the only route (via SK mechanisms) by which communications can take place. Further, since only the MMR can access the guards, the guards and the filtering they perform are both non-bypassable and transparent to communicating partitions. 4.2 Legacy Applications A legacy application (one that was not written to perform access at different security levels) could easily be integrated into a MILS system. Assume there is a legacy client which existed in conjunction with a secret database. If the client and the database were in a secret-level system, there would be no need to create different types of read calls within the client, e.g., the only access to the database was Read(). If information in this secret-level database were integrated into the multi-level secure database as described above, it would not be easy, without the MILS components, to use this client, as the calls are different. The database is expecting a Secret_Read() and the 51

6 client only issues Read() calls. While the database can be rewritten to account for this, this requires increasing the LOC of the database, potentially making it unverifiable, as well as potentially having to add database functionality for every legacy client that will be integrated into the system. With MILS, none of this is necessary. Using the components described above, the legacy client can be placed in a secret partition. This allows the MMR to enforce basic communication policies transparently via the SK (which is possible with many commercial SKs). The GIOP guard, on analyzing a message from the legacy client can simply replace the Read() calls with Secret_Read() calls within the GIOP message. This is possible because the MMR is aware of where the message came from. Then, the MMR routes the message to the database. The database receives only Secret_Read() calls from the legacy client. When a call from a legacy client is received, the MLSFS responds and the GIOP guard must again change the content of the message, as the client is expecting a Read() response whereas the database is sending a Secret_Read() response. The guard, through looking up in a history table what this message was a response to, is able to then change the parameters of the response to a Read() response. Finally, in addition to changing object names, parameters may be added, deleted, or reordered to allow for the integration of legacy applications by the guard. 5. CONCLUSION In this paper we have demonstrated how a security policy can be enforced on GIOP messages sent between MILS partitions. A policy that allows or disallows method invocations based upon the requesting client partition, the servant object, and the object method can be used. We have also shown how guards can allow a MILS system to enforce both MLS and application-specific policies, thus providing fine-grained access control of interpartition communication. In creating the MILS GIOP guard, we have identified some issues that will be crucial in developing formally certified MILS applications. First, most application-level protocols employ an acknowledgment scheme for some or all messages sent. This implies that a guard must be seamlessly integrated into the protocol's communication scheme to provide policy enforcement for different protocol components. Second, simply having the MMR drop disallowed messages (even for the case when no reply was expected) is not a very graceful way to handle policy violations. In the case of protocols (including CORBA IIOP) that run over TCP/IP, dropped messages will be re-sent repeatedly until a timeout occurs at the TCP stack level. This can cause applications to hang until the timeout and could also be used in inference attacks. A better solution would be to send a "spoofed" error message to the application that sent the illegal message. The error message would be an application protocol error message, and would appear to have come from the illegal message's destination. This would make it impossible for the offending application to know that filtering by a guard is being performed, that is, the application has no knowledge which messages the guard allows or disallows. This prevents the application from hanging. The MILS initiative is devoted to finding an efficient way to build verifiable secure systems. By separating security functionality into modular components, high-assurance systems can be engineered and evaluated rapidly and independently, e.g., the MLSFS [10]. The MILS architecture is an approach to system design triggered by the DOD's increasing need for secure, high-assurance, embedded systems. Separation kernels, the lowest layer of the MILS architecture, are already being deployed by multiple realtime operating system vendors for embedded systems [4]. Common criteria protection profiles are currently being developed for both the separation kernel [8] and MILS components [13]. 6. ACKNOWLEDGMENTS This material is based on research sponsored by AFRL and DARPA under agreement number F and the NSF SFS grants DUE and DUE The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expresses or implied, of NSF, AFRL and DARPA or the U.S. Government. 7. REFERENCES [1] Alireza, A., Lang, U., Screiner, R., and Schumacher, M. The challenges of CORBA security. In Sicherheit in Netzen and Medienstroemen (Security in Networks and Streaming Media). Springer-Verlag, (Sep. 2000), [2] Alves-Foss, J., Harrison, W. S., Oman, P., and Taylor, C. The MILS Architecture for High Assurance Embedded Systems. In International Journal of Embedded Systems, in press. [3] Alves-Foss, J., Taylor, C., and Oman, P. A multi-layered approach to security in high assurance systems. In Proc. of the Hawaii International Conference on System Sciences (HICSS'37) (Big Island, Hawaii, January 5-8, 2004). [4] Ames, B. Real-time software goes modular. Military and Aerospace Electronics, 14, 9 (Sep. 2003), [5] C. C. R. Arrangement, Common criteria for information technology security evaluation version 2.1, [6] Harrison, W. S., Hanebutte, N., Oman, P., and Alves-Foss, J. The MILS Architecture for a Secure Global Information Grid. CrossTalk: Journal of Defense Software Engineering, 18, 10 (Oct. 2005), [7] MacLaren, L. New options in embedded computing security. In Boeing Technical Excellence Conference (BTEC 5), [8] National Security Agency. U.S. government protection profile for separation kernels in environments requiring high robustness (Version 0.621), [9] Requirements Specification for Avionics Computer Resource (ACR) (RTCA DO-255). RTCS Inc., [10] Robinson, J. C. A high assurance multi-level secure file server. M.S. Thesis, University of Idaho, Moscow, ID, Dec

7 [11] Robinson, J. C., and Alves-Foss, J. A high assurance MLS file server. ACM SIGOPS Operating System Review, 41, 1 (Jan. 2007), [12] RTCA (Radio Technical Commission for Aeronautics), Software Considerations in Airborne Systems and Equipment Certification (RTCA DO-178b). RTCA Inc., [13] University of Idaho, MILS CORBA Protection Profile, Version 0.52(draft), [14] Vanfleet, W., and Dransfield, M. Design guidance for the mils architecture to provide mls damage limitation (first draft). Technical Report, NSA - National Security Agency, Ft. Meade, MD,

Implementing Middleware for Content Filtering and Information Flow Control

Implementing Middleware for Content Filtering and Information Flow Control Implementing Middleware for Content Filtering and Information Flow Control ABSTRACT This paper discusses the design and implementation of a middleware guard for purposes of content filtering and information

More information

MILS Multiple Independent Levels of Security. Carol Taylor & Jim Alves-Foss University of Idaho Moscow, Idaho

MILS Multiple Independent Levels of Security. Carol Taylor & Jim Alves-Foss University of Idaho Moscow, Idaho MILS Multiple Independent Levels of Security Carol Taylor & Jim Alves-Foss University of Idaho Moscow, Idaho United states December 8, 2005 Taylor, ACSAC Presentation 2 Outline Introduction and Motivation

More information

MILS Middleware: High Assurance Security for Real-time, Distributed Systems

MILS Middleware: High Assurance Security for Real-time, Distributed Systems 2001 Objective Interface Systems, Inc. MILS Middleware: High Assurance Security for Real-time, Distributed Systems Bill Beckwith bill.beckwith@ois.com Objective Interface Systems, Inc. 13873 Park Center

More information

The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems

The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems Kevin Buesing Objective Interface Systems Field Applications Engineer kevin.buesing@ois.com Jeff Chilton Objective

More information

ANSAwise - CORBA Interoperability

ANSAwise - CORBA Interoperability Poseidon House Castle Park Cambridge CB3 0RD United Kingdom TELEPHONE: Cambridge (01223) 515010 INTERNATIONAL: +44 1223 515010 FAX: +44 1223 359779 E-MAIL: apm@ansa.co.uk Training ANSAwise - CORBA Interoperability

More information

Certification Requirements for High Assurance Systems

Certification Requirements for High Assurance Systems for High Assurance Systems Gordon M. Uchenick Senior Mentor/Principal Engineer Objective Interface Systems, Inc. and W. Mark Vanfleet Senior Cryptologic Mathematician/ Senior INFOSEC Analyst National Security

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 19500-2 This is a preview of "ISO/IEC 19500-2:2012". Click here to purchase the full version from the ANSI store. Second edition 2012-04-15 Information technology Object

More information

Multiple Independent Layers of Security (MILS) Network Subsystem Protection Profile (MNSPP) An Approach to High Assurance Networking Rationale

Multiple Independent Layers of Security (MILS) Network Subsystem Protection Profile (MNSPP) An Approach to High Assurance Networking Rationale Multiple Independent Layers of Security (MILS) Subsystem Protection Profile (MNSPP) An Approach to High Assurance ing Rationale 1 2008 Wind River Systems, Inc. The MILS Subsystem (MNS) is A class of subsystem

More information

Evaluating Multicore Architectures for Application in High Assurance Systems

Evaluating Multicore Architectures for Application in High Assurance Systems Evaluating Multicore Architectures for Application in High Assurance Systems Ryan Bradetich, Paul Oman, Jim Alves-Foss, and Theora Rice Center for Secure and Dependable Systems University of Idaho Contact:

More information

High-Assurance Security/Safety on HPEC Systems: an Oxymoron?

High-Assurance Security/Safety on HPEC Systems: an Oxymoron? High-Assurance Security/Safety on HPEC Systems: an Oxymoron? Bill Beckwith Objective Interface Systems, Inc. Phone: 703-295-6519 Email Address: bill.beckwith@ois.com W. Mark Vanfleet National Security

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Blue Ridge Networks BorderGuard Centrally Managed Embedded PKI Virtual Private Network (VPN)

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Delta Security Technologies Sentinel Model III Computer Security System Report Number: CCEVS-VR-02-0023

More information

The Common Criteria, Formal Methods and ACL2

The Common Criteria, Formal Methods and ACL2 The Common Criteria, Formal Methods and ACL2 Raymond Richards, David Greve, Matthew Wilding Rockwell Collins Advanced Technology Center Cedar Rapids, Iowa 52498 USA {rjricha1,dagreve,mmwildin}@rockwellcollins.com

More information

Building High-Assurance Systems out of Software Components of Lesser Assurance Using Middleware Security Gateways

Building High-Assurance Systems out of Software Components of Lesser Assurance Using Middleware Security Gateways Building High-Assurance Systems out of Software Components of Lesser Assurance Using Middleware Security Gateways A PrismTech Product Line OMG's First Software Assurance Workshop: Working Together for

More information

CHAPTER 8 FIREWALLS. Firewall Design Principles

CHAPTER 8 FIREWALLS. Firewall Design Principles CHAPTER 8 FIREWALLS Firewalls can be an effective means of protecting a local system or network of systems from network-based security threats while at the same time affording access to the outside world

More information

Protecting the Hosted Application Server

Protecting the Hosted Application Server Protecting the Hosted Application Server Paola Dotti, Owen Rees Extended Enterprise Laboratory HP Laboratories Bristol HPL-1999-54 April, 1999 E-mail: {Paola_Dotti,Owen_Rees}@hpl.hp.com application server,

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Sun Java System Identity Manager v5.0 Report Number: CCEVS-VR-05-0117 Dated: 6 September

More information

Committee on National Security Systems. CNSS Policy No. 14 November 2002

Committee on National Security Systems. CNSS Policy No. 14 November 2002 Committee on National Security Systems CNSS Policy No. 14 November 2002 National Policy Governing the Release of Information Assurance (IA) Products and Services to Authorized U.S. Persons or Activities

More information

Secure Desktop KVM Switch Update. Keep classified information classified.

Secure Desktop KVM Switch Update. Keep classified information classified. Secure Desktop KVM Switch Update Keep classified information classified. Introduction Until recently, the National Information Assurance Partnership (NIAP) used Common Criteria Evaluation & Validation

More information

Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions

Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions Chapter 1: Solving Integration Problems Using Patterns 2 Introduction The Need for Integration Integration Challenges

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Microsoft Corporation Windows 2000 Report Number: CCEVS-VR-02-0025 Dated: 25 October 2002

More information

Sponsored by the Alliance for Telecommunications Industry Solutions. CORBA Implementation Profile for Electronic Communications

Sponsored by the Alliance for Telecommunications Industry Solutions. CORBA Implementation Profile for Electronic Communications Sponsored by the Alliance for Telecommunications Industry Solutions CORBA Implementation Profile for Electronic Communications TCIF-98-014 Issue 1 09/16/1999 Copyright Page TCIF Guideline CORBA Implementation

More information

SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS

SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS David Murotake, (SCA Technica, Inc. Nashua NH, USA; david.murotak@scatechnica.com) Antonio Martin (SCA Technica, Inc., Nashua NH, USA;

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE Digital Policy Management consists of a set of computer programs used to generate, convert, deconflict, validate, assess

More information

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways Firewalls 1 Overview In old days, brick walls (called firewalls ) built between buildings to prevent fire spreading from building to another Today, when private network (i.e., intranet) connected to public

More information

Distributed Systems Security: Java, CORBA, and COM+ April L. Moreno September 14, Abstract

Distributed Systems Security: Java, CORBA, and COM+ April L. Moreno September 14, Abstract Distributed Systems Security: Java, CORBA, and COM+ April L. Moreno September 14, 2002 Abstract Security can have varying levels of difficulty for implementation. One factor in determining the difficulty

More information

Lecture 15 Designing Trusted Operating Systems

Lecture 15 Designing Trusted Operating Systems Lecture 15 Designing Trusted Operating Systems Thierry Sans 15-349: Introduction to Computer and Network Security Anatomy of an operating system Concept of Kernel Definition Component that provides an

More information

National Information Assurance Partnership. Validation Report

National Information Assurance Partnership. Validation Report National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Xerox Corporation Xerox CopyCentre C2128/C2636/C3545 Copier and WorkCentre Pro C2128/C2636/C3545

More information

CS 268: Internet Architecture & E2E Arguments. Today s Agenda. Scott Shenker and Ion Stoica (Fall, 2010) Design goals.

CS 268: Internet Architecture & E2E Arguments. Today s Agenda. Scott Shenker and Ion Stoica (Fall, 2010) Design goals. CS 268: Internet Architecture & E2E Arguments Scott Shenker and Ion Stoica (Fall, 2010) 1 Today s Agenda Design goals Layering (review) End-to-end arguments (review) 2 1 Internet Design Goals Goals 0 Connect

More information

A Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction

A Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction A Data-Centric Approach for Modular Assurance Gabriela F. Ciocarlie, Heidi Schubert and Rose Wahlin Real-Time Innovations, Inc. {gabriela, heidi, rose}@rti.com Abstract. A mixed-criticality system is one

More information

Real-time Communications Security and SDN

Real-time Communications Security and SDN Real-time Communications Security and SDN 2016 [Type here] Securing the new generation of communications applications, those delivering real-time services including voice, video and Instant Messaging,

More information

Securing Federal Government Facilities A Primer on the Why, What and How of PIV Systems and PACS

Securing Federal Government Facilities A Primer on the Why, What and How of PIV Systems and PACS Securing Federal Government Facilities A Primer on the Why, What and How of PIV Systems and PACS Introduction The expectations and requirements on government contracts for safety and security projects

More information

Oracle Tuxedo. Interoperability 12c Release 1 (12.1.1) June 2012

Oracle Tuxedo. Interoperability 12c Release 1 (12.1.1) June 2012 Oracle Tuxedo Interoperability 12c Release 1 (12.1.1) June 2012 Oracle Tuxedo Interoperability, 12c Release 1 (12.1.1) Copyright 1996, 2012, Oracle and/or its affiliates. All rights reserved. This software

More information

[MS-WDSC]: Windows Deployment Services Control Protocol. Intellectual Property Rights Notice for Open Specifications Documentation

[MS-WDSC]: Windows Deployment Services Control Protocol. Intellectual Property Rights Notice for Open Specifications Documentation [MS-WDSC]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,

More information

Analysis of Passive CORBA Fault Tolerance Options for Real-Time Applications Robert A. Kukura, Raytheon IDS Paul V. Werme, NSWCDD

Analysis of Passive CORBA Fault Tolerance Options for Real-Time Applications Robert A. Kukura, Raytheon IDS Paul V. Werme, NSWCDD Analysis of Passive CORBA Fault Tolerance Options for Real-Time Applications Robert A. Kukura, Raytheon IDS Paul V. Werme, NSWCDD PASSIVE CORBA FAULT TOLERANCE All clients send method invocations only

More information

Abstract. 1. Introduction

Abstract. 1. Introduction Towards Safety Critical Middleware for Avionics Applications D.A. Haverkamp, R.J. Richards, Ph.D., Rockwell Collins Advanced Technology Center, Advanced Computing Systems Department, Cedar Rapids, IA {dahaverk,

More information

Computer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the

Computer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the Mobile IP (IPv4 and IPv6) Dr. John Keeney 3BA33 Elements of a wireless Wired infrastructure wireless hosts laptop, PDA, IP phone run applications may be stationary (nonmobile) or mobile wireless does not

More information

Page 1 of Matthews Mint Hill Road, Suite C; Matthews, NC Phone Fax

Page 1 of Matthews Mint Hill Road, Suite C; Matthews, NC Phone Fax 1. PURPOSE The Loss Prevention Foundation, ( the foundation, LPF, the examiner ) makes high-stakes retail loss prevention certification Exams publicly available for the purpose of earning certification

More information

Appendix A - Glossary(of OO software term s)

Appendix A - Glossary(of OO software term s) Appendix A - Glossary(of OO software term s) Abstract Class A class that does not supply an implementation for its entire interface, and so consequently, cannot be instantiated. ActiveX Microsoft s component

More information

[MC-SMP]: Session Multiplex Protocol. Intellectual Property Rights Notice for Open Specifications Documentation

[MC-SMP]: Session Multiplex Protocol. Intellectual Property Rights Notice for Open Specifications Documentation [MC-SMP]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,

More information

Software Paradigms (Lesson 10) Selected Topics in Software Architecture

Software Paradigms (Lesson 10) Selected Topics in Software Architecture Software Paradigms (Lesson 10) Selected Topics in Software Architecture Table of Contents 1 World-Wide-Web... 2 1.1 Basic Architectural Solution... 2 1.2 Designing WWW Applications... 7 2 CORBA... 11 2.1

More information

Oracle Tuxedo. CORBA Technical Articles 11g Release 1 ( ) March 2010

Oracle Tuxedo. CORBA Technical Articles 11g Release 1 ( ) March 2010 Oracle Tuxedo CORBA Technical Articles 11g Release 1 (11.1.1.1.0) March 2010 Oracle Tuxedo CORBA Technical Articles, 11g Release 1 (11.1.1.1.0) Copyright 1996, 2010, Oracle and/or its affiliates. All rights

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION ITU-T Q.774 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (06/97) SERIES Q: SWITCHING AND SIGNALLING Specifications of Signalling System. 7 Transaction capabilities

More information

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 27. Firewalls and Virtual Private Networks Paul Krzyzanowski Rutgers University Fall 2013 November 25, 2013 2013 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions

[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions [MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open

More information

TEITP User and Evaluator Expectations for Trusted Extensions. David Hardin Rockwell Collins Advanced Technology Center Cedar Rapids, Iowa USA

TEITP User and Evaluator Expectations for Trusted Extensions. David Hardin Rockwell Collins Advanced Technology Center Cedar Rapids, Iowa USA TEITP 2010 User and Evaluator Expectations for Trusted Extensions David Hardin Rockwell Collins Advanced Technology Center Cedar Rapids, Iowa USA Outline What Does a Security Evaluation Entail? Example:

More information

RID IETF Draft Update

RID IETF Draft Update RID IETF Draft Update Kathleen M. Moriarty INCH Working Group 5 August 2004 This work was sponsored by the Air Force under Air Force Contract Number F19628-00-C-0002. "Opinions, interpretations, conclusions,

More information

Request for Comments: 1038 January 1988

Request for Comments: 1038 January 1988 Network Working Group Request for Comments: 1038 M. St. Johns IETF January 1988 Draft Revised IP Security Option Status of this Memo This RFC is a pre-publication draft of the revised Internet Protocol

More information

HAMES Review at SRI, 7 October 2008 partly based on Layered Assurance Workshop 13, 14 August 2008, BWI Hilton and based on Open Group, 23 July 2008,

HAMES Review at SRI, 7 October 2008 partly based on Layered Assurance Workshop 13, 14 August 2008, BWI Hilton and based on Open Group, 23 July 2008, HAMES Review at SRI, 7 October 2008 partly based on Layered Assurance Workshop 13, 14 August 2008, BWI Hilton and based on Open Group, 23 July 2008, Chicago Component Security Integration John Rushby Computer

More information

Wide Area Network Device Presence Protocol (WAN DPP)

Wide Area Network Device Presence Protocol (WAN DPP) [MS-GRVWDPP]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,

More information

Configuring Cache Services Using the Web Cache Communication Protocol

Configuring Cache Services Using the Web Cache Communication Protocol Configuring Cache Services Using the Web Cache Communication Protocol Finding Feature Information, page 1 Prerequisites for WCCP, page 1 Restrictions for WCCP, page 2 Information About WCCP, page 3 How

More information

CSC Network Security

CSC Network Security CSC 474 -- Security Topic 9. Firewalls CSC 474 Dr. Peng Ning 1 Outline Overview of Firewalls Filtering Firewalls Proxy Servers CSC 474 Dr. Peng Ning 2 Overview of Firewalls CSC 474 Dr. Peng Ning 3 1 Internet

More information

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control Last time Security Policies and Models Bell La-Padula and Biba Security Models Information Flow Control Trusted Operating System Design Design Elements Security Features 10-1 This time Trusted Operating

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of Firewall Enterprise v8.2.0 and Firewall Enterprise Control Center v5.2.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common

More information

Paul A. Karger

Paul A. Karger Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program Paul A. Karger karger@watson.ibm.com Outline Identify specific problem with FIPS 201 Problem of

More information

OTS 1.1 vs. OTS 1.2 Approvers Function Name Approvers comments Reviewers Function Name Reviewers comments

OTS 1.1 vs. OTS 1.2 Approvers Function Name Approvers comments Reviewers Function Name Reviewers comments Approvers Function Name Approvers comments Reviewers Function Name Reviewers comments REFERENCE : 000xxx CLASSIFICATION: Information OWNER : Arjuna Lab CONTENTS Page 1 Introduction... 3 1.1 Scope... 3

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA 95134-1706 Cisco Catalyst 2K/3K

More information

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT Introduction Amazon Web Services (AWS) provides Infrastructure as a Service (IaaS) cloud offerings for organizations. Using AWS,

More information

Operational Security Capabilities for IP Network Infrastructure

Operational Security Capabilities for IP Network Infrastructure Operational Security Capabilities F. Gont for IP Network Infrastructure G. Gont (opsec) UTN/FRH Internet-Draft September 1, 2008 Intended status: Informational Expires: March 5, 2009 Status of this Memo

More information

Check Point Endpoint Security Media Encryption

Check Point Endpoint Security Media Encryption National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Check Point Endpoint Security Media Encryption Report Number: CCEVS-VR-VID10231-2010 Dated:

More information

Configuring Virtual Servers

Configuring Virtual Servers 3 CHAPTER This section provides an overview of server load balancing and procedures for configuring virtual servers for load balancing on an ACE appliance. Note When you use the ACE CLI to configure named

More information

Component-Level Design. Slides copyright 1996, 2001, 2005, 2009 by Roger S. Pressman. For non-profit educational use only

Component-Level Design. Slides copyright 1996, 2001, 2005, 2009 by Roger S. Pressman. For non-profit educational use only Chapter 10 Component-Level Design Slide Set to accompany Software Engineering: A Practitioner s Approach, 7/e by Roger S. Pressman Slides copyright 1996, 2001, 2005, 2009 by Roger S. Pressman For non-profit

More information

[MS-WFDAA]: Intellectual Property Rights Notice for Open Specifications Documentation

[MS-WFDAA]: Intellectual Property Rights Notice for Open Specifications Documentation [MS-WFDAA]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,

More information

Network Working Group. Category: Informational February 1997

Network Working Group. Category: Informational February 1997 Network Working Group K. Hamzeh Request for Comments: 2107 Ascend Communications Category: Informational February 1997 Status of this Memo Ascend Tunnel Management Protocol - ATMP This memo provides information

More information

Administrative Guideline. SMPTE Metadata Registers Maintenance and Publication SMPTE AG 18:2017. Table of Contents

Administrative Guideline. SMPTE Metadata Registers Maintenance and Publication SMPTE AG 18:2017. Table of Contents SMPTE AG 18:2017 Administrative Guideline SMPTE Metadata Registers Maintenance and Publication Page 1 of 20 pages Table of Contents 1 Scope 3 2 Conformance Notation 3 3 Normative References 3 4 Definitions

More information

Configuring Web Cache Services By Using WCCP

Configuring Web Cache Services By Using WCCP CHAPTER 44 Configuring Web Cache Services By Using WCCP This chapter describes how to configure your Catalyst 3560 switch to redirect traffic to wide-area application engines (such as the Cisco Cache Engine

More information

Data Flow Oriented Software Design in a FACE Architecture

Data Flow Oriented Software Design in a FACE Architecture Data Flow Oriented Software Design in a FACE Architecture US Army Aviation FACE TIM Paper by: David Heath Georgia Tech Research Institute Trevor Stittleburg Georgia Tech Research Institute November, 2015

More information

FIPA Agent Software Integration Specification

FIPA Agent Software Integration Specification FOUNDATION FOR INTELLIGENT PHYSICAL AGENTS FIPA Agent Software Integration Specification Document title FIPA Agent Software Integration Specification Document number XC00079A Document source FIPA Architecture

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Report Number: CCEVS-VR-06-0023 Dated: 28 April 2006 Version: 1.0 National Institute of

More information

Connecting ESRI to Anything: EAI Solutions

Connecting ESRI to Anything: EAI Solutions Connecting ESRI to Anything: EAI Solutions Frank Weiss P.E., ESRI User s Conference 2002 Agenda Introduction What is EAI? Industry trends Key integration issues Point-to-point interfaces vs. Middleware

More information

A Cost Effective High Assurance Layered Solution for MLS Test Training and LVC

A Cost Effective High Assurance Layered Solution for MLS Test Training and LVC A Cost Effective High Assurance Layered Solution for MLS Test Training and LVC 2014 Layered Assurance Workshop 8-Dec, 2014 James Marek 2014 Rockwell 2014 Collins. Rockwell Collins. Introduction Solution

More information

Distributed Object-Based Systems The WWW Architecture Web Services Handout 11 Part(a) EECS 591 Farnam Jahanian University of Michigan.

Distributed Object-Based Systems The WWW Architecture Web Services Handout 11 Part(a) EECS 591 Farnam Jahanian University of Michigan. Distributed Object-Based Systems The WWW Architecture Web Services Handout 11 Part(a) EECS 591 Farnam Jahanian University of Michigan Reading List Remote Object Invocation -- Tanenbaum Chapter 2.3 CORBA

More information

COMPOSABILITY, PROVABILITY, REUSABILITY (CPR) FOR SURVIVABILITY

COMPOSABILITY, PROVABILITY, REUSABILITY (CPR) FOR SURVIVABILITY AFRL-IF-RS-TR-2002-61 Final Technical Report April 2002 COMPOSABILITY, PROVABILITY, REUSABILITY (CPR) FOR SURVIVABILITY Kestrel Institute Sponsored by Defense Advanced Research Projects Agency DARPA Order

More information

IDENTITY ASSURANCE PRINCIPLES

IDENTITY ASSURANCE PRINCIPLES IDENTITY ASSURANCE PRINCIPLES PRIVACY AND CONSUMER ADVISORY GROUP (PCAG) V3.1 17 th July 2014 CONTENTS 1. Introduction 3 2. The Context of the Principles 4 3. Definitions 6 4. The Nine Identity Assurance

More information

[MS-RDPECLIP]: Remote Desktop Protocol: Clipboard Virtual Channel Extension

[MS-RDPECLIP]: Remote Desktop Protocol: Clipboard Virtual Channel Extension [MS-RDPECLIP]: Remote Desktop Protocol: Clipboard Virtual Channel Extension Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications

More information

MULTIPLEXER / DEMULTIPLEXER IMPLEMENTATION USING A CCSDS FORMAT

MULTIPLEXER / DEMULTIPLEXER IMPLEMENTATION USING A CCSDS FORMAT MULTIPLEXER / DEMULTIPLEXER IMPLEMENTATION USING A CCSDS FORMAT Item Type text; Proceedings Authors Grebe, David L. Publisher International Foundation for Telemetering Journal International Telemetering

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of EMC Celerra Network Server Version 5.5 running on EMC Celerra NSX and EMC Celerra NS series Issued by: Communications Security Establishment Certification Body

More information

IT Security Evaluation and Certification Scheme Document

IT Security Evaluation and Certification Scheme Document IT Security Evaluation and Certification Scheme Document June 2015 CCS-01 Information-technology Promotion Agency, Japan (IPA) IT Security Evaluation and Certification Scheme (CCS-01) i / ii Table of Contents

More information

CORBA Firewall Security: Increasing the Security of CORBA Applications 1. Abstract

CORBA Firewall Security: Increasing the Security of CORBA Applications 1. Abstract CORBA Firewall Security: Increasing the Security of CORBA Applications 1 Habtamu Abie Norwegian Computing Center P. O. Box 114 Blindern, 0314 Oslo, Norway abie@nr.no, http://www.nr.no/~abie January 2000

More information

Layered Architecture

Layered Architecture 1 Layered Architecture Required reading: Kurose 1.7 CSE 4213, Fall 2006 Instructor: N. Vlajic Protocols and Standards 2 Entity any device capable of sending and receiving information over the Internet

More information

handled appropriately. The design of MILS/MSL systems guaranteed to perform correctly with respect to security considerations is a daunting challenge.

handled appropriately. The design of MILS/MSL systems guaranteed to perform correctly with respect to security considerations is a daunting challenge. A Separation Kernel Formal Security Policy David Greve, Matthew Wilding, and W. Mark Vanfleet Rockwell Collins Advanced Technology Center Cedar Rapids, IA 52498 USA fdagreve,mmwilding@rockwellcollins.com

More information

Introduction to Proof-Carrying Code

Introduction to Proof-Carrying Code Introduction to Proof-Carrying Code Soonho Kong Programming Research Lab. Seoul National University soon@ropas.snu.ac.kr 7 August 2009 ROPAS Show & Tell Proof-Carrying Code Code Code Producer Code Consumer

More information

A Report on RMI and RPC Submitted by Sudharshan Reddy B

A Report on RMI and RPC Submitted by Sudharshan Reddy B A Report on RMI and RPC Submitted by Sudharshan Reddy B Abstract: This report mainly explains the RMI and RPC technologies. In the first part of the paper the RMI technology is briefly explained and in

More information

Distributed Object-based Systems CORBA

Distributed Object-based Systems CORBA CprE 450/550x Distributed Systems and Middleware Distributed Object-based Systems CORBA Yong Guan 3216 Coover Tel: (515) 294-8378 Email: guan@ee.iastate.edu March 30, 2004 2 Readings for Today s Lecture!

More information

DFARS Cyber Rule Considerations For Contractors In 2018

DFARS Cyber Rule Considerations For Contractors In 2018 Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com DFARS Cyber Rule Considerations For Contractors

More information

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to 1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats

More information

UNIT 4 CORBA 4/2/2013 Middleware 59

UNIT 4 CORBA 4/2/2013 Middleware 59 UNIT 4 CORBA 4/2/2013 Middleware 59 CORBA AN OBJECT ORIENTED RPC MECHANISM HELPS TO DEVELOP DISTRIBUTED SYTEMS IN DIFF. PLATFORMS OBJECTS WRITTEN IN DIFF., LANG, CAN BE CALLED BY OBJECTS WRITTEN IN ANOTHER

More information

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure Change Control Date Version Description of changes 15-December- 2016 1-December- 2016 17-March- 2016 4-February- 2016 3-February-

More information

Configuring Dynamic ARP Inspection

Configuring Dynamic ARP Inspection 21 CHAPTER This chapter describes how to configure dynamic Address Resolution Protocol inspection (dynamic ARP inspection) on the Catalyst 3560 switch. This feature helps prevent malicious attacks on the

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM Trusted Computing Group (TCG) Personal Computer (PC) Specific Trusted Building Block (TBB)

More information

Compositional Security Evaluation: The MILS approach

Compositional Security Evaluation: The MILS approach Compositional Security Evaluation: The MILS approach John Rushby and Rance DeLong Computer Science Laboratory SRI International Menlo Park CA USA Primary affiliation: LynuxWorks John Rushby, Rance DeLong,

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report for the Cisco Jabber 11.8 for Windows 10 Report Number: CCEVS-VR-10802-2017 Dated: 6/13/2017

More information

RID IETF Draft Update

RID IETF Draft Update RID IETF Draft Update Kathleen M. Moriarty INCH Working Group 29 March 2005 This work was sponsored by the Air Force under Air Force Contract Number F19628-00-C-0002. "Opinions, interpretations, conclusions,

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Secure Systems Limited Silicon Data Vault Laptop Version SDV18A03-A2-0003 and Desktop Version

More information

2 nd UML 2 Semantics Symposium: Formal Semantics for UML

2 nd UML 2 Semantics Symposium: Formal Semantics for UML 2 nd UML 2 Semantics Symposium: Formal Semantics for UML Manfred Broy 1, Michelle L. Crane 2, Juergen Dingel 2, Alan Hartman 3, Bernhard Rumpe 4, and Bran Selic 5 1 Technische Universität München, Germany

More information

Man in the Middle Attacks and Secured Communications

Man in the Middle Attacks and Secured Communications FEBRUARY 2018 Abstract This document will discuss the interplay between Man in The Middle (MiTM/ MITM) attacks and the security technologies that are deployed to prevent them. The discussion will follow

More information

Choosing a sophisticated locking system: Where security is an issue, compromise is simply not an option

Choosing a sophisticated locking system: Where security is an issue, compromise is simply not an option Choosing a sophisticated locking system: Where security is an issue, compromise is simply not an option In a world increasingly challenged by mounting security threats, the need for comprehensive locking

More information

Content Management for the Defense Intelligence Enterprise

Content Management for the Defense Intelligence Enterprise Gilbane Beacon Guidance on Content Strategies, Practices and Technologies Content Management for the Defense Intelligence Enterprise How XML and the Digital Production Process Transform Information Sharing

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. for

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. for National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report for Report Number: CCEVS-VR-10746-2016 Dated: November 10, 2016 Version: 1.0 National Institute

More information