Seeing the Real World: Sharing Protected Data in Real Time

We describe a new capability for "owners" of protected data to quickly and securely share real time data among networked decision-support and real-time control devices with whom the "owners" of the data have explicitly decided to "share the data. The service is based upon implementation of a recent formal definition and mathematical result (James et al. 2009) derived from the decades-old Bell-LaPadula information security result (Bell and LaPadula, 1973). The service provides decision makers a means of securely and automatically sharing critical information across security barriers based upon declaration of sharing policies. The declaration and implementation of information sharing policies based upon a need-to-share has been shown to be compatible with information protection policies based upon a need-to-know. Indeed, the implementation of the need-to-share service is based upon extending the mathematical foundations of need-to-know information security systems (the Bell-LaPadula result of 1973).

[1]  David Elliott Bell,et al.  Looking back at the Bell-La Padula model , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[2]  Nobuko Yoshida,et al.  A uniform type structure for secure information flow , 2002, POPL '02.

[3]  John James,et al.  Flowing valued information based on a need to share , 2011, 2011 IEEE Network Science Workshop.

[4]  Edward A. Lee,et al.  Structure and interpretation of signals and systems , 2002 .

[5]  Kenneth R. Thompson "GENERAL SYSTEM" DEFINED FOR PREDICTIVE TECHNOLOGIES OF A-GSBT (AXIOMATIC-GENERAL SYSTEMS BEHAVIORAL THEORY) , 2006 .

[6]  Pravin Varaiya,et al.  Viable Control of Hybrid Systems , 1994, Hybrid Systems.

[7]  Simon N. Foley A model for secure information flow , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[8]  Ulrik Brandes,et al.  What is network science? , 2013, Network Science.

[9]  Michael T. Kleinman,et al.  BOARD ON ARMY SCIENCE AND TECHNOLOGY , 1999 .

[10]  John McLean,et al.  Security models and information flow , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[11]  John R. James,et al.  Building trustworthy systems: guided state estimation as a feasible approach for interpretation, decision and action based on sensor data , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[12]  R. Ross,et al.  Guide for the Security Certification And Accreditation of Federal Information Systems , 2004 .

[13]  D. E. Bell,et al.  Secure Computer Systems : Mathematical Foundations , 2022 .

[14]  Li Gong,et al.  Java Security: A Ten Year Retrospective , 2009, 2009 Annual Computer Security Applications Conference.

[15]  Michael S. Branicky,et al.  Introduction to Hybrid Systems , 2005, Handbook of Networked and Embedded Control Systems.

[16]  J. Lygeros,et al.  AN INTRODUCTION TO HYBRID SYSTEM MODELING ANALYSIS AND CONTROL JOHN LYGEROS GEORGE PAPPAS AND SHANKAR SASTRY , 1999 .

[17]  J. James Thoughts on information operation detection as a nonlinear, mixed-signal identification problem: a control systems view , 2000, CACSD. Conference Proceedings. IEEE International Symposium on Computer-Aided Control System Design (Cat. No.00TH8537).

[18]  J. R. James,et al.  Tools and techniques for evaluating control architecture , 1999, Proceedings of the 1999 IEEE International Symposium on Computer Aided Control System Design (Cat. No.99TH8404).

[19]  Carl E. Landwehr,et al.  A security model for military message systems , 1984, TOCS.

[20]  Edward A. Lee,et al.  INTRODUCING SIGNALS AND SYSTEMS - THE BERKELEY APPROACH , 2000 .

[21]  Justin T. Lanahan Need To Share: Flowing Valued Information and Secure Networking , 2011, 2011 IEEE Network Science Workshop.

[22]  Steve Zdancewic,et al.  Run-time principals in information-flow type systems , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[23]  Jean-Pierre Aubin,et al.  Viability theory , 1991 .

[24]  William J. Adams,et al.  Secure Computer Systems: Extensions to the Bell-La Padula Model , 2009 .

[25]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.