Applications to Support Normal and Critical Operations in a Tactical MLS System Applications to Support Normal and Critical Operations in a Tactical MLS System

Applications to Support Normal and Critical Operations in a Tactical MLS System

Cybersecurity

    • $1.99
    • $1.99

Publisher Description

The ability for first responders to access sensitive and critical information during an emergency can help save lives and reduce damages. This may be information normally unavailable to first responders, due to a lack of appropriate vetting in advance or due to lack of “need-to-know.” The Transient Tactical Access to Sensitive Information (T-TASI) system employed an emergency access control policy and a scalable security system to grant extraordinary access to sensitive information. The T-TASI system allows some coordinating authority to extend (temporary, controlled) access to sensitive information to authorized first responders, during emergencies. The T-TASI system design is based on a least privilege separation kernel (LPSK) that provides the security policy enforcement underlying the ability to allow extraordinary access with transient trust. The current T-TASI system prototype, however, lacks applications demonstrating its capabilities. The motivation of this thesis is to develop applications that will better showcase the transient trust property, and to design an application development framework that will facilitate future development for the T-TASI system.

GENRE
Computing & Internet
RELEASED
2010
31 December
LANGUAGE
EN
English
LENGTH
160
Pages
PUBLISHER
PublishDrive
SELLER
PublishDrive Inc.
SIZE
761
KB
Practical Microcontroller Engineering with ARM­ Technology Practical Microcontroller Engineering with ARM­ Technology
2015
VSAM Demystified VSAM Demystified
2022
IMS-DB Basic Training For Application Developers IMS-DB Basic Training For Application Developers
2019
Using IBM CICS Transaction Server Channels and Containers Using IBM CICS Transaction Server Channels and Containers
2015
Computers as Components Computers as Components
2022
The Virtualization Cookbook for IBM z Systems Volume 1: IBM z/VM 6.3 The Virtualization Cookbook for IBM z Systems Volume 1: IBM z/VM 6.3
2016