DocumentCode
2696536
Title
Configuring a trusted system using the TNI
Author
Powanda, E. Jane ; Genovese, James W.
Author_Institution
Unisys Corp., Paoli, PA, USA
fYear
1988
fDate
12-16 Dec 1988
Firstpage
256
Lastpage
261
Abstract
The authors summarize a study performed to identify and evaluate alternatives for achieving an acceptable level of risk in a distributed system by utilizing computer components with the lowest TCSEC (trusted computer system evaluation criteria) ratings acceptable under DoD guidelines. The security implications of connecting equipments that handle differing sensitivity levels of data are examined together with the consequences of using equipments using trusted system technology, utilizing personnel with higher clearances, and separating data by sensitivity level as ways of achieving a desired level of trust in a multilevel system. The rationale for choosing this system is that it is large enough to demonstrate the implications of the guidelines given in the trusted network interpretation (TNI), yet small enough to easily verify the validity of the results
Keywords
computer networks; military computing; security of data; DoD; TNI; computer components; distributed system; lowest TCSEC; risk; sensitivity level; trusted computer system evaluation criteria; trusted system; trusted system technology; Books; Costs; Data security; Distributed computing; Government; Guidelines; Information security; Joining processes; Performance evaluation; Personnel;
fLanguage
English
Publisher
ieee
Conference_Titel
Aerospace Computer Security Applications Conference, 1988., Fourth
Conference_Location
Orlando, FL
Print_ISBN
0-8186-0895-1
Type
conf
DOI
10.1109/ACSAC.1988.113345
Filename
113345
Link To Document