scispace - formally typeset
Search or ask a question
Topic

Cross-domain solution

About: Cross-domain solution is a research topic. Over the lifetime, 13 publications have been published within this topic receiving 299 citations. The topic is also known as: guard & cross domain solution.

Papers
More filters
Patent
12 Feb 2007
TL;DR: The Collaborate Access-Browse (CAB) Cross-Domain Solution (CDS) as mentioned in this paper enables high-side users to browse low-side material with the same privileges as any other low side user.
Abstract: Systems and methods for providing a cross-domain, remote terminal secure browse capability are disclosed. The Collaborate-Access-Browse (CAB) Cross-Domain Solution (CDS) enables high-side users to browse low-side material with the same privileges as any other low-side user. The Assured File Transfer (AFT) CDS allows the high-side user to initiate file transfers from the low side to the high side so the browser-found data can be manipulated on the high side if needed. AFT provides for a bi-directional file exchange. High-side users can also initiate a file exchange from their high side to the low side, assuming the file contains only the appropriately classified information.

271 citations

01 Sep 2010
TL;DR: USSTRATCOM has and is hosting CSM Workshops to ensure satellite operators fully understand the data contained in the CSM in order to provide an informed recommendation to their leadership, as JFCC SPACE matures its ability to accept ephemeris data from a satellite operator, it will be necessary to automatically transfer data from one security level to another.
Abstract: : United States Strategic Command (CDRUSSTRATCOM) accepted responsibility for sharing space situational awareness (SSA) information/services with commercial and foreign entities from the US Air Force on 22 Dec 09 (formerly the Commercial and Foreign Entities Pilot Program) The requirement to share SSA services with non-US Government (USG) entities is derived from Title 10, United States Code, Section 2274 (2010) and is consistent with the new National Space Policy US Strategic Command's (USSTRATCOM's) sharing of SSA services consists of basic services (Two-Line Elements, decay data and satellite catalog details) available on wwwspace-trackorg and advanced services (conjunction assessment, launch support, etc) available with a signed agreement USSTRATCOM has requested USG permission to enter into international agreements to enable SSA data exchange with our foreign partners USSTRATCOM recently authorized Joint Functional Component Command for Space (JFCC SPACE) to share Conjunction Summary Messages (CSMs) with satellite owner/operators whose satellites have been identified as closely approaching another space object CSMs contain vector and covariance data computed using Special Perturbations theory To facilitate the utility of the CSMs, USSTRATCOM has and is hosting CSM Workshops to ensure satellite operators fully understand the data contained in the CSM in order to provide an informed recommendation to their leadership As JFCC SPACE matures its ability to accept ephemeris data from a satellite operator, it will be necessary to automatically transfer that data from one security level to another USSTRATCOM and Air Force Space Command are coordinating the integration of a cross domain solution that will allow JFCC SPACE to do just that

14 citations

Proceedings ArticleDOI
01 Oct 2015
TL;DR: A novel Multiple Independent Levels of Security/Safety solution that enforces the security policies in a cross-domain environment and is evaluated in a theoretical way, supported by tools specifically designed to analyze security protocols and by preliminary vulnerability and penetration tests.
Abstract: Contexts like Defense and Aerospace are steadily focused on high assurance solutions designed to protect their data. One of the most relevant and unresolved issue is the Multilevel Security problem. Information and Communications Technology systems have to exchange data, to be regularly patched and updated hence, they require a link to the Internet. Through this connection and through a compromised host, an attacker could illicitly disclose sensitive information. In this paper is presented a novel Multiple Independent Levels of Security/Safety solution that enforces the security policies in a cross-domain environment. The innovative approach is explained in detail and the robustness of the solution is evaluated in a theoretical way, supported by tools specifically designed to analyze security protocols and by preliminary vulnerability and penetration tests.

6 citations

Proceedings ArticleDOI
01 Nov 2008
TL;DR: The goals and objectives within the cross domain community to satisfy war fighter information sharing requirements, reduce duplication of effort and ensure CD capabilities are available when needed are focused on.
Abstract: The modern war fighters require information sharing systems that are simple, secure, agile, flexible and robust in order to achieve their mission. This often includes the requirement to share information across a variety of networks with different security domains. The technology needed to meet this requirement is known as a cross domain solution (CDS). Modern war fighter requirements and legislative mandates for information sharing have increased demand for a simple, secure, agile and robust CDS to support the war fighter COCOMs, services, and intelligence agencies and pushed them to coordinate efforts as part of a larger cross domain community. This paper focuses on the goals and objectives within the cross domain community to satisfy war fighter information sharing requirements, reduce duplication of effort and ensure CD capabilities are available when needed. The methodology used to address existing gaps between current solutions and desired capabilities is discussed, with specific emphasis on the war fighterpsilas Top 5 priorities. Also discussed is the unified cross domain management office (UCDMO) approach to improve CD technologies and identify modular components, technologies, and capabilities needed to meet unified requirements, to include those of the emerging enterprise service (ES) architectures.

4 citations

Proceedings ArticleDOI
24 Aug 2015
TL;DR: This paper presents a novel Multi Independent Levels of Security solution that enforces the separation of networks and data flow control through the use of a Separation Kernel Hypervisor and shows the robustness of the solution through a theoretical evaluation.
Abstract: Many contexts dealing with sensitive data are constantly looking for high assurance security solutions. The Multilevel Security represents one of the toughest unresolved problems faced over many years. Information and Communications systems need to exchange data, their software needs to be patched and updated hence, they need a connection to the Internet. Attacks can be launched using this connection, and through a compromised host attackers can steal and illicitly disclose information. In this paper we present a novel Multi Independent Levels of Security solution that enforces the separation of networks and data flow control through the use of a Separation Kernel Hypervisor. We show the robustness of our solution through a theoretical evaluation, supported by tools designed for the analysis of security protocols.

3 citations

Network Information
Related Topics (5)
Locale (computer hardware)
599 papers, 9K citations
90% related
Market fragmentation
581 papers, 8.7K citations
88% related
Computer security model
18.1K papers, 352.9K citations
86% related
Information security
25.2K papers, 327.7K citations
85% related
Security information and event management
14.1K papers, 254.1K citations
85% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20201
20191
20152
20133
20122
20101