This paper examines the architectural and security impact of using commercially available, popular terminal servers to support thin clients within the context of a high assurance multilevel network. Seven potential local area network architectures were analyzed for security and utility. Three secure configurations were identified: Multiple Terminal Servers in Series; Multiple Trusted Computing Base Extension-Enhanced Terminal Servers; and Terminal Servers on a High Assurance Virtual Machine MonitorApproved for public release; distribution is unlimited
The need for multilevel secure (MLS) systems still exists yet, the popularity of desktop systems has...
Many sorts of servers exists which incorporates both openly available servers and inside servers, fo...
Virtualization is increasingly being used in regular desktop PCs, data centers and server farms. One...
This paper examines the architectural and security impact of using commercially available, popular t...
A virtual machine monitor (VMM) allows multiple op-erating systems to run concurrently on virtual ma...
Today most of the desktops, laptops are being shipped with the TPM and Virtualisation technology is ...
The Department of Defense and U.S. Government have an identified need to securely share information ...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
International audienceA variety of applications are executing on a large untrusted computing base, w...
Over the last few years there has been immense progress in developing powerful security tools based ...
High assurance MILS (multiple independent levels of security) and MLS (multilevel security) systems ...
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...
Abstract—Network virtualization is a key technology that is necessary to support diverse protocol su...
As virtualization enhances the use of computing and scalability of computing resources it's importan...
The need for multilevel secure (MLS) systems still exists yet, the popularity of desktop systems has...
The need for multilevel secure (MLS) systems still exists yet, the popularity of desktop systems has...
Many sorts of servers exists which incorporates both openly available servers and inside servers, fo...
Virtualization is increasingly being used in regular desktop PCs, data centers and server farms. One...
This paper examines the architectural and security impact of using commercially available, popular t...
A virtual machine monitor (VMM) allows multiple op-erating systems to run concurrently on virtual ma...
Today most of the desktops, laptops are being shipped with the TPM and Virtualisation technology is ...
The Department of Defense and U.S. Government have an identified need to securely share information ...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
International audienceA variety of applications are executing on a large untrusted computing base, w...
Over the last few years there has been immense progress in developing powerful security tools based ...
High assurance MILS (multiple independent levels of security) and MLS (multilevel security) systems ...
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...
Abstract—Network virtualization is a key technology that is necessary to support diverse protocol su...
As virtualization enhances the use of computing and scalability of computing resources it's importan...
The need for multilevel secure (MLS) systems still exists yet, the popularity of desktop systems has...
The need for multilevel secure (MLS) systems still exists yet, the popularity of desktop systems has...
Many sorts of servers exists which incorporates both openly available servers and inside servers, fo...
Virtualization is increasingly being used in regular desktop PCs, data centers and server farms. One...