There are two components in the scheduler for multilevel-secure databases which use the replicated architecture; global and local schedulers. Since the global...
naval research lab washington dc center for high assurance computing systems (chacs), 2005
This paper traces the ten plus year history of the Naval Research Laboratory's Pump idea. The Pump was theorized, designed, and built at the Naval Research...
naval research lab washington dc center for high assurance computing systems (chacs), 1995
In this paper, we discuss why message acknowledgements are an appropriate engineering approach to meet system functionality. The data replication problem in...
naval research lab washington dc information technology div, 1994
We discuss the difficulties of satisfying high-assurance system requirements without sacrificing system capabilities. To alleviate this problem, we show how...
naval research lab washington dc information technology div, 1994
Since protection and assurance are the primary concerns in MLS databases, performance has often been sacrificed in some known MLS database approaches....
naval research lab washington dc information technology div, 1993
Communication from a low- to a high-level system without acknowledgements will be unreliable; with acknowledgements, it can be insecure. We propose to provide...
naval research lab washington dc information technology div, 1998
Distributed computing owes its success to the development of infrastructure, middleware, and standards (e.g., CORBA) by the computing industry. This community...
naval research lab washington dc center for high assurance computing systems (chacs), 1997
As computer systems become distributed and heterogeneous, there is strong movement in the commercial sector to ease the problems of interoperability and...
naval research lab washington dc center for high assurance computing systems (chacs), 1996
Our timed Z-channel (a general case of the Z-channel) appears as the basis for a large class of covert channels. Golomb analyzed the Z-channel, a memoryless...
A designer of reliable multi-level secure (MLS) networks must consider covert channels and denial of service attacks in addition to traditional network...
Publication gouvernementale
Filtrer vos résultats
Opération réussie
L’élément a été sauvegardé.
Opération réussie
Cet élément a été retiré.
Erreur
Vous avez dépassé le nombre maximal de 100 résultats sauvegardés.
Erreur
Impossible de sauvegarder l’élément. Veuillez réessayer. Si le problème persiste, il pourrait y avoir un problème avec l’élément.
Erreur
Impossible de supprimer l’article demandé. Veuillez réessayer plus tard.