27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Harm Schotanus et al.<br />

conditions that are guaranteed by the operating system, but on the other hand a user must also be<br />

capable of performing his regular tasks on the same platform. We see opportunities to establish this<br />

based on a virtualisation layer on top of a minimal, but trusted core operating system. One virtual<br />

machine will comprise normal functionality and a second will form the labelling application with strict<br />

limitations, this concept is further elaborated upon in (Verkoelen 2010).<br />

An architecture of a workstation that is suitable for creating labels in a trusted manner, is shown in<br />

Figure 5 (Hartog 2010). In essence, this is a virtualisation platform with two virtual machines. One is<br />

used as a workstation with the common applications. The other is used specifically for labelling which<br />

is focussed on binding a label to a given information object in such a way that the process cannot be<br />

disrupted and assurance can be given that only the provided information object is labelled and<br />

nothing else. The information to be labelled has to be exported from the generic to the specific virtual<br />

machine where a label can be created. Then the label can be transferred back to the workstation.<br />

Workstation<br />

Desktop<br />

Labelling<br />

High Assurance<br />

Platform<br />

Hardware<br />

Figure 5: Architecture of a workstation for trusted labelling<br />

The needed level of assurance is created by a high assurance platform. The core component<br />

therefore can be a separation kernel (Rushby 1981)(Information Assurance Directorate 2007), which<br />

is in control of all resources in the system and all communication between the virtual machines. The<br />

virtualisation is layered on top of the HAP. In certain cases with high assurance requirements, specific<br />

hardware requirements may have to be used, but mostly it can be based on generic hardware.<br />

3.4 Secure labelled release<br />

The final objective of this incremental approach is the secure labelled release. The label can then be<br />

used to validate the suitability of exchanging a document across different security domains where the<br />

security policies of the domains may be different. The suitability is determined by different metainformation<br />

stored in a protected label. This could for example refer to the classification of the<br />

information in the document, but may also refer to capabilities of the source of the information<br />

(Smulders 2010),such as the quality of the camera used to take an aerial photograph, or the range of<br />

radar. And of course combinations are also possible. The validation takes place at the border of the<br />

information domain. The label is intended for internal usage, and does not have to be included after<br />

the information has been released. However, it is also a possibility to translate the label to use as in<br />

the case of “Disseminating release information”.<br />

To extend the integrity protection set-up to a full secure labelled release setup we have to add an<br />

extended release mechanism. This extension is twofold. In the first place the release mechanism<br />

must be capable of integrating with the PKI to validate the authenticity of the label and match it<br />

against the document. The release mechanism has to validate the certificate of the user that created<br />

234

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!