22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

393<br />

<strong>and</strong> the Object Level Protection concepts. The focus of the group includes high<br />

assurance guards, as well as extensions to the existing security labelling specifications.<br />

The results of IST-114 can potentially influence the requirements <strong>and</strong> design<br />

of the HAAG.<br />

Acknowledgment<br />

This research has been sponsored by the NATO Allied Comm<strong>and</strong> Transformation<br />

Scientific Programme of Work 2011/2012.<br />

References<br />

[1] K. Wrona, S. Oudkerk, <strong>and</strong> G. Hallingstad, “Designing medium assurance<br />

XML-labelling guards for NATO,” in Proceedings of the <strong>Military</strong> <strong>Communications</strong><br />

Conference (MILCOM), San Jose, CA, USA, 2010.<br />

[2] K. Wrona <strong>and</strong> G. Hallingstad, “Controlled <strong>Information</strong> Sharing in NATO<br />

Operations,” in Proceedings of the IEEE <strong>Military</strong> <strong>Communications</strong> Conference<br />

(MILCOM), Baltimore, 2011.<br />

[3] R. Danyliw, J. Meijer, <strong>and</strong> Y. Demchenko, “The Incident Object Description<br />

Exchange Format,” Request for Comments RFC 5070, 2007.<br />

[4] J. Baker, M. Hansbury, <strong>and</strong> D. Haynes, “The OVAL Language Specification Version<br />

5.10.1,” The MITRE Corporation, 2012.<br />

[5] L. Ward, “Improving your custom Snort rules,” Sourcefire, 2010.<br />

[6] S. Oudkerk, “NATO Profile for the ‘Binding of Metadata to Data Objects’ – version 1.0,”<br />

The Hague, Technical Note TN-1455, 2011.<br />

[7] S. Oudkerk, “NATO Profile for the ‘XML Confidentiality Label Syntax’ – version<br />

1.0,” The Hague, Technical Note TN-1456, 2011.<br />

[8] T. Wilson, “OGC KML Version 2.2.0,” Open Geospatial Consortium Inc., OGC<br />

St<strong>and</strong>ard OGC 07-147r2, 2008.<br />

[9] Common Criteria, “Common Criteria for <strong>Information</strong> <strong>Technology</strong> Security Evaluation<br />

Version 3.1 Revision 3,” CCMB-2009-07-001, 2009.<br />

[10] IAD, “U.S. Government Protection Profile for Separation Kernels in Environments<br />

Requiring High Robustness, Version 1.03,” 2007.<br />

[11] D. Baier et al., A Guide to Claims-Based Identity <strong>and</strong> Access Control – Authentication<br />

<strong>and</strong> Authorization for Services <strong>and</strong> the Web.: Microsoft Corporation, 2010.<br />

[12] Nigel P. Smart <strong>and</strong> Frederik Vercauteren, “Fully Homomorphic Encryption with<br />

Relatively Small Key <strong>and</strong> Ciphertext Sizes,” in Public Key Cryptography, 2010,<br />

pp. 420-443.<br />

[13] M. Abdalla et al., “Wildcarded Identity-Based Encryption,” Journal of Cryptology,<br />

vol. 24, no. 1, pp. 42-82, 2011.<br />

[14] NC3B, “NATO Architecture Framework v3,” Brussels, Belgium, ANNEX 1 TO<br />

AC/322-D(2007)0048, 2007.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!