22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

453<br />

keeping from the Filter, which needs to 1) Fetch a latest version of the whole document<br />

from the Storage (cloud); 2) Identify changed elements by their UNSIGNED<br />

HASH CONTENT signature-elements <strong>and</strong> their correct location in the tree – it is<br />

assumed the User Agent makes use of the tree structure it received from the Filter<br />

(it cannot, for example, remove or relocate parts that contain subelements inaccessible<br />

to it); 3) Replace contents, <strong>and</strong> their respective WRITE-User <strong>and</strong> ADMIN-user<br />

signatures; 4) Update security attribute history (recompute the signature as well);<br />

5) Create a new document version (if versioning is in use); <strong>and</strong> 6) Recompute<br />

the compound element integrity signatures, where elements are merged; recompute<br />

all compound hash values.<br />

VI. Conclusion<br />

In this paper we introduced <strong>and</strong> canonized a structured content format complying<br />

to multi-level security practices <strong>and</strong> the cryptographic access control paradigm.<br />

The format was aligned with the XML-st<strong>and</strong>ard. We explored the motivation<br />

behind different types of elements <strong>and</strong> their relatios, as well as the operation with<br />

such a structured document. Our approach was independent of the keying architecture.<br />

Future work includes e.g. many open questions from the re-construction<br />

of a modified document. On a different track, there is also the task to implement<br />

a schema validator <strong>and</strong> appropriate Filter components for the document.<br />

References<br />

[1] E. Barker, W. Barker, W. Burr, W. Polk, <strong>and</strong> M. Smid, “Recommendation for Key<br />

Management – Part 1: General (Revised)”, NIST Special Publication 800-57, NIST,<br />

March 2007.<br />

[2] M. Bartel, J. Boyer, B. Fox, B. LaMacchia, <strong>and</strong> E. Simon, “XML-Signature Syntax<br />

<strong>and</strong> Processing, W3C Recommendation 12.2.2002”, in http://www.w3.org/TR/2002/<br />

REC-xmldsig-core-20020212/Overview.html, World Wide Web Consortium, 2002<br />

(retrieved 23.4.2012).<br />

[3] D. Bell, L. LaPadula, “Secure Computer Systems: Mathematical Foundations”,<br />

MITRE Technical Report 2547, vol. I, 1.3.1973.<br />

[4] E. Bertino, S. Castano, <strong>and</strong> E. Ferrari, “On Specifying Security Policies for Web<br />

Documents with an XML-Based Language,” in Proc. Sixth ACM Symp. Access Control<br />

Models <strong>and</strong> Technologies, pp. 57-65, 2001.<br />

[5] E. Bertino, B. Carminati, E. Ferrari, B. Thuraisingham, <strong>and</strong> A. Gupta, “Selective<br />

<strong>and</strong> Authentic Third-Party Distribution of XML Documents”, in IEEE Transactions<br />

on Knowledge <strong>and</strong> Data Engineering, vol. 16, no 10, pp. 1263-1278, October 2004.<br />

[6] D. Boneh, M. Franklin, “Identity based encryption from the Weil pairing, extended<br />

version”, in SIAM J. of Computing, vol. 32, no. 3, pp. 586-615, 2003.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!