Considerations for a shipboard multilevel secure local area network
Riley, John W.
Boger, Dan C.
MetadataShow full item record
This thesis investigates the possibility of implementing a multilevel secure local area network on a medium-sized ship. In particular it focuses on medium-sized ship communications suite connectivity to a GateGuard computer system, and then on incorporating systems that have been developed under the Navy's transition plan for the Defense Message System; specifically the Multilevel Mail Server being installed at Navy Telecommunications Centers. A review of data communications security considerations as well as DoD and Navy directives is provided for background on the accreditation requirements of multilevel secure systems. Additionally two commercially available products, the VERDIX Secure Local Area Network and Trusted Information Systems' XENIX trusted operating system arc reviewed and then shown how they could potentially be integrated into a shipboard local area network. A potential configuration is provided with recommendation for further studs of system application compatibility.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Integrating a trusted computing base extension server and secure session server into the Linux operating system Glover, Mark V. (Monterey, California. Naval Postgraduate School, 2001-09);Multilevel Secure Local Area Network (MLS LAN) Project at the Naval Postgraduate SchoolÎ±s, Center for Information Security (INFOSEC) Studies and Research (NPS CISR) is building a trusted network system that is both necessary ...
Turan, Bora (Monterey, California. Naval Postgraduate School, 2000-03);Agencies, institutions, individuals are demanding the use of commercial-off-the-shelf systems and cannot enforce mandatory security policies with these systems, which are equipped only with discretionary access controls. ...
Hackerson, Jason X. (Monterey, California. Naval Postgraduate School, 1998-09);United States policy requires that access to and dissemination of classified information be controlled. Separate networks and workstations for each classification do not meet user requirements. Users also need commercially ...