Accession Number : ADA423605


Title :   Diamond High Assurance Security Program: Trusted Computing Exemplar


Descriptive Note : Research paper


Corporate Author : NAVAL POSTGRADUATE SCHOOL MONTEREY CA DEPT OF COMPUTER SCIENCE


Personal Author(s) : Irvine, Cynthia E ; Levin, Timothy E ; Dinolt, George W


Full Text : https://apps.dtic.mil/dtic/tr/fulltext/u2/a423605.pdf


Report Date : Sep 2002


Pagination or Media Count : 14


Abstract : Over the past decade, the U.S. Government has not been significantly involved in high assurance Trusted Computing acquisitions and research. During this time, the Government's focus on commercial off the shelf procurements helped to fuel explosive advances in commercial technology, but it also contributed to the lack of progress in the ability of commercial systems to appropriately protect themselves and the data with which they are entrusted. While industry has been driven to supply the latest technology at the fastest pace, it has not been motivated, either internally or externally via customer demand, to produce highly trustworthy computing systems. As a result, the National Information Infrastructure is weak; there are no high security, high assurance, off-the-shelf products available that can be used to strengthen it; and the National capability to design and construct such trusted computer systems and networks has atrophied. To address this downward spiral, the Center for INFOSEC Studies and Research (CISR) in Monterey, California, proposes a Trusted Computing Exemplar project that will provide an openly distributed worked example of how high assurance trusted computing components can be built. Completion of this project will be performed as part of CISR's Diamond High Assurance Security Program (Diamond HASP). The authors propose four related activities: (1) creation of a prototype framework for rapid high assurance system development, (2) development of a reference-implementation trusted computing component, (3) evaluation of the component for high assurance, and (4) open dissemination of deliverables related to the first three activities. The project's open development methodology will provide widespread availability of key high assurance enabling technologies and ensure transfer of knowledge and capabilities for trusted computing to the next generation of developers, evaluators, and educators. (1 figure, 9 refs.)


Descriptors :   *DATA PROCESSING SECURITY , *LOCAL AREA NETWORKS , *OFF THE SHELF EQUIPMENT , *OPEN SYSTEM ARCHITECTURE , *INFORMATION ASSURANCE , DEMONSTRATIONS , PROTOTYPES , PACKET SWITCHING , SOFTWARE TOOLS , INFORMATION SECURITY


Subject Categories : Computer Systems
      Computer Systems Management and Standards


Distribution Statement : APPROVED FOR PUBLIC RELEASE