2012 45th Hawaii International Conference on System Sciences 2012
DOI: 10.1109/hicss.2012.518
|View full text |Cite
|
Sign up to set email alerts
|

Seeing the Real World: Sharing Protected Data in Real Time

Abstract: We describe a new capability for "owners" of protected data to quickly and securely share realtime data among networked decision-support and real-time control devices with whom the "owners" of the data have explicitly decided to "share the data. The service is based upon implementation of a recent formal definition and mathematical result ) derived from the decades-old Bell-LaPadula information security result (Bell and LaPadula, 1973

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…Our effort will extend recent results in sharing protected information among network nodes based upon information owner declaration of "need to share" protection policies while maintaining existing security policies based upon "need to know" information protection policies . [4] D. Compare measured cyber-physical system state to predicted cyber-physical system state: The driving force behind the continuing difficulties in creating and maintaining an estimate of the cyber-physical situation is the fact that the ongoing information systems revolution continues to outpace security capabilities since costeffectiveness drives implementations and system security as a consideration does not compete with lower installed cost for implementation decisions. Current challenges include those technical gaps listed in a Department of Homeland Security (DHS) sponsored study from a few years ago [5].…”
Section: Returning To Step 1 [3]mentioning
confidence: 99%
“…Our effort will extend recent results in sharing protected information among network nodes based upon information owner declaration of "need to share" protection policies while maintaining existing security policies based upon "need to know" information protection policies . [4] D. Compare measured cyber-physical system state to predicted cyber-physical system state: The driving force behind the continuing difficulties in creating and maintaining an estimate of the cyber-physical situation is the fact that the ongoing information systems revolution continues to outpace security capabilities since costeffectiveness drives implementations and system security as a consideration does not compete with lower installed cost for implementation decisions. Current challenges include those technical gaps listed in a Department of Homeland Security (DHS) sponsored study from a few years ago [5].…”
Section: Returning To Step 1 [3]mentioning
confidence: 99%