dc.contributor.author | Engelstad, Paal E. | en_US |
dc.date.accessioned | 2016-04-11T10:35:51Z | |
dc.date.available | 2016-04-11T10:35:51Z | |
dc.date.issued | 2015-10 | en_US |
dc.identifier.citation | Engelstad, P. E. (2015, October). Security challenges with cross-domain information exchange: Integrity and guessing attacks. In Military Communications Conference, MILCOM 2015-2015 IEEE (pp. 1596-1605). IEEE. | en_US |
dc.identifier.issn | 2155-7578 | en_US |
dc.identifier.other | FRIDAID 1327755 | en_US |
dc.identifier.uri | https://hdl.handle.net/10642/3229 | |
dc.description.abstract | Current research on cross-domain information ex-
change is advocating to move away from the inflexible Bell-La
Padula (BLP) model, into a more complex policy-driven security
model where information objects and end-users are characterized
in terms of complex meta-data. It will lead to higher flexibility
but will also rely not only on guards, but also on automatic
or semi-automatic tools for forming and processing the meta-
data. In this paper, we point out some potential pitfalls with
this approach. The paper focuses specifically on the relaxation of
the BLP security model for confidentiality and discusses security
concerns that arise from the use of such tools in combination
with guards. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Security | en_US |
dc.subject | Classification | en_US |
dc.subject | Labeling | en_US |
dc.subject | Cross-domain information exchange | en_US |
dc.title | Security Challenges with Cross-Domain Information Exchange: Integrity and Guessing Attacks | en_US |
dc.type | Journal article | en_US |
dc.type | Peer reviewed | en_US |
dc.identifier.doi | http://dx.doi.org/10.1109/MILCOM.2015.7357673 | |