This paper examines the architectural and security impact of using commercially available, popular terminal servers to support thin clients within the context of a high assurance multilevel network. Seven potential local area network architectures were analyzed for security and utility. Three secure configurations were identified: Multiple Terminal Servers in Series; Multiple Trusted Computing Base Extension-Enhanced Terminal Servers; and Terminal Servers on a High Assurance Virtual Machine MonitorApproved for public release; distribution is unlimited
Enforcement of a high-level statement of security policy may be difficult to discern when mapped thr...
Trust is a concept of increasing importance in today’s information systems where information storage...
Enforcement of a high-level statement of security policy may be difficult to discern when mapped thr...
This paper examines the architectural and security impact of using commercially available, popular t...
The Department of Defense and U.S. Government have an identified need to securely share information ...
The need for multilevel secure (MLS) systems still exists yet, the popularity of desktop systems has...
The need for multilevel secure (MLS) systems still exists yet, the popularity of desktop systems has...
We examine the concept of security as a dimension of Quality of Service in distributed systems. Impl...
Abstract — A high assurance architecture is described for the protection of distributed multilevel s...
Abstract — A high assurance architecture is described for the protection of distributed multilevel s...
Cloud networking receives a lot of attention from the research community, especially due to its abil...
High assurance MILS (multiple independent levels of security) and MLS (multilevel security) systems ...
Today most of the desktops, laptops are being shipped with the TPM and Virtualisation technology is ...
This paper discusses the modulation of security services in response to changes in network condition...
Organizations have many employees that lack the technical knowledge to securely operate their machin...
Enforcement of a high-level statement of security policy may be difficult to discern when mapped thr...
Trust is a concept of increasing importance in today’s information systems where information storage...
Enforcement of a high-level statement of security policy may be difficult to discern when mapped thr...
This paper examines the architectural and security impact of using commercially available, popular t...
The Department of Defense and U.S. Government have an identified need to securely share information ...
The need for multilevel secure (MLS) systems still exists yet, the popularity of desktop systems has...
The need for multilevel secure (MLS) systems still exists yet, the popularity of desktop systems has...
We examine the concept of security as a dimension of Quality of Service in distributed systems. Impl...
Abstract — A high assurance architecture is described for the protection of distributed multilevel s...
Abstract — A high assurance architecture is described for the protection of distributed multilevel s...
Cloud networking receives a lot of attention from the research community, especially due to its abil...
High assurance MILS (multiple independent levels of security) and MLS (multilevel security) systems ...
Today most of the desktops, laptops are being shipped with the TPM and Virtualisation technology is ...
This paper discusses the modulation of security services in response to changes in network condition...
Organizations have many employees that lack the technical knowledge to securely operate their machin...
Enforcement of a high-level statement of security policy may be difficult to discern when mapped thr...
Trust is a concept of increasing importance in today’s information systems where information storage...
Enforcement of a high-level statement of security policy may be difficult to discern when mapped thr...