22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

450 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 3. Hierarchical conventions of the CBIS schema<br />

If super-encryption would be used, it would also make sense to define access<br />

control lists for the first-order access control information (metadata of metadata,<br />

or meta-metadata). Even in more theoretical work ([12]), the metalevels are recommended<br />

to be restricted to at most two, <strong>and</strong> we are using only one level.<br />

For versioning purposes, it is not necessary to archive all security metadata.<br />

More specifically, if signatures concern the content as well, they were considered to be<br />

out of scope. Thus we introduce yet another level, cbis:securityAttribute,<br />

which hosts all the data meant to be archived.<br />

The XML-document <strong>and</strong> architecture model [5] consider only hashes of the elements,<br />

<strong>and</strong> only the hash of the document whole is eventually signed. Our<br />

model considers a more interactive setting, <strong>and</strong> allows the document to be more<br />

fine-grained. We then sign each level (certain types of elements) individually, <strong>and</strong><br />

the compound sub-documents hierarchically.<br />

V. The CBIS schema<br />

The actual schema is presented here with Fig. 4. for brevity. The Figure depicts<br />

what an XML-formatted CBIS-document would look like, but with element <strong>and</strong><br />

type names, enumerations <strong>and</strong> type definitions.<br />

Legend for Fig. 4 is as follows:<br />

• Multiple labels “behind” the first one indicate that multiple instances are<br />

allowed<br />

• Dashed line round the label indicate a set of optional elements. If there are<br />

multiple dashed-line labels, there can be more than one optional element<br />

• ENUM labels represent XML schema restriction on a specific type<br />

• TYPE labels represents inheritance from another type, depicted the way<br />

a C-language structure would: the parent type is included in the child type

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!