Abstract
This paper presents GDoM, a multilevel security document manager. GDoM is an application that offers to diversely cleared users, secure services to store, consult, manage and transfer classified information. It relies on a specific Unix kernel, a multilevel network and a particular machine (M 2 S: Machine for Multilevel Security) which enforce a complete multilevel security of their data and their processes. This multilevel security makes it possible to enforce a complete security inside an untrusted application like GDoM.
Chapter PDF
Keywords
Bibliographic references
B. d'Ausbourg, P. Bieber “Plate-forme expérimentale pour réseau local de haute sécurité: définition des fonctions de communication”-Rapport 1/3361.01, Toulouse, Janvier 1991.
B. d'Ausbourg, J-H. Llareus “M2S: A Machine for Multilevel Security”-Proceeding of Esorics 92-Toulouse, November 1992
D.E. Bell, L.J. LaPadula “Secure Computer Systems: Uified Exposition and Multics Interpretation”-MTR-75-306, MITRE Corporation, Bedford, Mass, March 1975
P. Bieber, F. Cuppens “A Logical view of Secure Dependencies” — Journal of Computer Security, Vol 1, Nr 1, 1992
B. d'Ausbourg, C. Calas “Unix services for multilevel storage and communications over a secure LAN” — Proceeding of USENIX Winter 1993 Technical Conference, January 25–29 1993.
DoD Computer Security Center “DoD Trusted Computer System Evaluation Criteria” — Technical Report DoD 5200.28-STD, National Computer Security Center, Fort Meade, MD, 1985
G. Eizenberg “Mandatory policy: secure system model” — AFCET editor, European Workshop on Computer Security, Paris 1989
L.J. Fraim “SCOMP: a solution to the Multilevel Security Problem” — IEEE Computers, July 1983, pp 26–34.
C.L. Harrold “An introduction to the SMITE approach to Secure Computing” — Computers & Security Journal, Vol 8, Nr 6, October 1989
C.L. Harrold “An example secure system specified using the Terry-Wiseman approach”-Report 90011, RSRE, Malvern, Worcestershire, July 1990.
S. Saydjari, J. Beckman, J. Leaman “LOCK Trek: Navigating Uncharted Space” — Proceedings of the IEEE Symposium on Security and Privacy, 1989, pp 167–175
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1992 Springer-Verlag
About this paper
Cite this paper
Calas, C. (1992). GDoM a multilevel document manager. In: Deswarte, Y., Eizenberg, G., Quisquater, JJ. (eds) Computer Security — ESORICS 92. ESORICS 1992. Lecture Notes in Computer Science, vol 648. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0013909
Download citation
DOI: https://doi.org/10.1007/BFb0013909
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-56246-7
Online ISBN: 978-3-540-47488-3
eBook Packages: Springer Book Archive