skip to main content
research-article

Design and Assurance Strategy for the NRL Pump

Published: 01 April 1998 Publication History

Abstract

In the past 20 years, only a handful of high-assurance, multilevel, secure computers have been built, and even these are rarely used in operational environments. Such systems suffer a host of disadvantages: They cost too much, lack user-friendly features and development environments, take too much time to evaluate and certify, and do not scale well for secure distributed computing. This lack of satisfactory security solutions is disturbing in light of the trend toward open and distributed computing, which increases a system's vulnerability to attack. The authors propose basing security solutions instead on a multiple single-level security architecture, which uses commercial (nonsecure) products for general-purpose computing and special- purpose high-assurance devices to separate data at different security levels. A multiple single-level architecture is a viable and practical solution to distributed multilevel secure computing. The keystone of this architecture is a trusted device that "pumps" data from a low security level to a higher one. The authors describe the software design and assurance argument strategy for this device, the Network NRL Pump, which can be used in any multilevel secure distributed architecture.

References

[1]
M. Kang J. Froscher and I. Moskowitz, "A Framework for MLS Interoperability," Proc. High-Assurance Systems Eng. Workshop, IEEE CS Press, Los Alamitos, Calif., 1996, pp. 198-205.
[2]
M. Kang J. Froscher and I. Moskowitz, "An Architecture for Multilevel Secure Interoperability," Proc. Computer Security Applications Conf., IEEE CS Press, Los Alamitos, Calif., 1997, pp. 194-204.
[3]
M. Kang and I. Moskowitz, "A Pump for Rapid, Reliable, Secure Communication," Proc. ACM Conf. Computer and Comm. Security, ACM Press, New York, 1993, pp. 119-129.
[4]
M. Kang I. Moskowitz and D. Lee, "A Network Pump," IEEE Trans. Software Eng., May 1996, pp. 329-338.
[5]
I. Moskowitz and M. Kang, "Covert Channels—Here to Stay?" Proc. Computer Assurance Conf., IEEE CS Press, Los Alamitos, Calif., 1994, pp. 235-243.
[6]
A. Moore and C. Payne, "Increasing Assurance with Literate Programming Techniques," Proc. Computer Assurance Conf., IEEE CS Press, Los Alamitos, Calif., 1996, pp. 187-198.
[7]
D. Harel, et al., "Statemate: A Working Environment for the Development of Complex Reactive Systems," IEEE Trans. Software Eng., Apr. 1990, pp. 403-414.
[8]
S. Kromodimoeljo, et al., "EVES: An Overview," Tech. Report CP-91-5402-43, ORA Canada, Ottawa, Ontario, 1993.
[9]
Whitebox DeepCover: User Reference Manual, Reliable Software Technologies, Sterling, Va., 1996.
[10]
M. Kang A. Moore and I. Moskowitz, "Design and Assurance Strategy for the NRL Pump," NRL Memo 5540-97-7991, Naval Research Laboratory, Washington, D.C., Dec. 1997.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Computer
Computer  Volume 31, Issue 4
April 1998
76 pages

Publisher

IEEE Computer Society Press

Washington, DC, United States

Publication History

Published: 01 April 1998

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media