Accession Number : ADA259682


Title :   The ECA Critical Requirements Model


Descriptive Note : Final rept.


Corporate Author : NAVAL RESEARCH LAB WASHINGTON DC


Personal Author(s) : Payne, Jr , Charles N ; Mihelcic, David M ; Moore, Andrew P ; Hayman, Kenneth J


Full Text : https://apps.dtic.mil/dtic/tr/fulltext/u2/a259682.pdf


Report Date : 28 Dec 1992


Pagination or Media Count : 12


Abstract : The ECA is an embedded computing device that processes message traffic for a network that must enforce end-to-end user message confidentiality. The ECA uses a commercial, off-the-shelf cryptographic device to transform sensitive data from the Red Domain of the network so that it can be transmitted over the untrusted communication links of the Black Domain. For transmission purposes, certain parts of a message, namely the message header, must be bypassed around the cryptographic device. The primary critical requirement for the ECA, Restricted Red-to-Black Flow (RRTBF), requires that the bypassed portion of each message must satisfy certain format restrictions, and that the rate of bypass must be constrained. In this report, we present an informal model of the ECA's critical requirements together with the assumptions under which the model was constructed. We than formalize this model by using the CSP Trace Model of computation.


Descriptors :   *COMPUTERIZED SIMULATION , *DATA PROCESSING SECURITY , *COMMUNICATIONS TRAFFIC , *COMPUTER NETWORKS , *MESSAGE PROCESSING , REQUIREMENTS , COMPUTATIONS , OFF THE SHELF EQUIPMENT , RATES , SENSITIVITY , FORMATS , EMBEDDING , FLOW


Subject Categories : Computer Programming and Software
      Computer Systems Management and Standards


Distribution Statement : APPROVED FOR PUBLIC RELEASE