{"title":"Observations on integrating multilevel secure components into system high distributed systems","authors":"R. Niemeyer, V. Ashby","doi":"10.1109/CSAC.1991.213001","DOIUrl":null,"url":null,"abstract":"The implementation of distributed systems includes an extensive component integration effort. Integrating secure components into a distributed system is a task more difficult than standard integration. Current system high distributed secure systems will be transitioned to multilevel secure systems as multilevel secure components become available. Considerations and changes that are required for successful integration of these components are discussed. These changes fall into the categories of concept of operations, security policy, and security architecture.<<ETX>>","PeriodicalId":108621,"journal":{"name":"Proceedings Seventh Annual Computer Security Applications Conference","volume":"202 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1991-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings Seventh Annual Computer Security Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSAC.1991.213001","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The implementation of distributed systems includes an extensive component integration effort. Integrating secure components into a distributed system is a task more difficult than standard integration. Current system high distributed secure systems will be transitioned to multilevel secure systems as multilevel secure components become available. Considerations and changes that are required for successful integration of these components are discussed. These changes fall into the categories of concept of operations, security policy, and security architecture.<>