DocumentCode :
319319
Title :
Using Web technologies in two MLS environments: a security analysis
Author :
Niemeyer, Robert E.
Author_Institution :
Comput. Sci. Corp., MD, USA
fYear :
1997
fDate :
8-12 Dec 1997
Firstpage :
205
Lastpage :
214
Abstract :
Presents an analysis of the use of the HyperText Transfer Protocol (HTTP) and other Web technologies for multi-level secure (MLS) systems that are connected to single-level network environments (e.g. Internet-like and intranet-like environments). Multiple single-level networks may be connected to these MLS systems. This analysis considers two examples of MLS systems. Known HTTP and Web security vulnerabilities are considered in the context of multi-level operations planned for an MLS database server to be accessed by Web browser software and for an MLS infrastructure supporting Web browsing on multiple Webs that each have a different security sensitivity level. The analysis focuses on the transfer of information across security boundaries where the security classification of information on one side of the boundary differs from that of the other side (a high-to-low or low-to-high transfer of information). The transfer of information is initiated by the Web browser (a network client) and the bulk of information transferred is data returned from the Web server. The analysis also focuses on threats from the less secure side of the boundary, including the threats of insertion of malicious code (e.g. virus or Trojan horse code) and denial-of-service attacks. The applications are referred to as the “high-to-low” example and the “low-to-high” example, denoting the direction of primary information flow
Keywords :
Internet; client-server systems; distributed databases; hypermedia; security of data; transport protocols; HTTP; HyperText Transfer Protocol; Internet; Trojan horse code; Web browser software; Web server; World Wide Web technologies; computer viruses; database server; denial of service attacks; information transfer; intranet; malicious code insertion; multi-level secure systems; network client; primary information flow direction; security boundaries; security classification; security sensitivity level; security vulnerabilities; single-level network environments; threats; Data security; Databases; Information analysis; Information security; Internet; Invasive software; Multilevel systems; Network servers; Protocols; Web server;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 1997. Proceedings., 13th Annual
Conference_Location :
San Diego, CA
ISSN :
1063-9527
Print_ISBN :
0-8186-8274-4
Type :
conf
DOI :
10.1109/CSAC.1997.646191
Filename :
646191
Link To Document :
بازگشت