13.07.2015 Views

Mission Operations Reference Model. Draft ... - CCSDS

Mission Operations Reference Model. Draft ... - CCSDS

Mission Operations Reference Model. Draft ... - CCSDS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

DRAFT RECOMMENDED PRACTICE FOR MISSION OPERATIONS REFERENCE MODEL– ConfidentialityKeeping information secret from all but those who are authorised to see it.– IntegrityDetecting that information has not been altered by unauthorised or unknownmeans.– Non-RepudiationPreventing the denial of previous commitments or action.a) In the MO concept it is assumed that confidentiality is provided by the lowerTransport layer and is transparent to the MAL and above. The effect of this is thatonce a message rises above the Transport layer all encryption will have beenremoved.b) Alternative methods must be employed to support the case where confidentiality isrequired all the way to the payload. One possible mechanism relies on a customencoding scheme that encodes specific messages privately and uses the normalmessage-handing functionality to transfer the encrypted information.c) Authentication and authorisation are the main areas of concern for MO. Nonrepudiationand integrity are supported by certain authentication solutions andtherefore are possible only with specific message encodings.d) Authorisation is not possible without authentication (one cannot authorise anoperation if one does not know from whom that operation originated) soauthentication is mandatory if authorisation is required in a deployment.e) Therefore there shall be three modes of access control supported:1) NothingAn open system in which anyone can perform any operation. The system can onlylog operations performed but not by whom.2) Authentication OnlyA closed system in which clients must log in but once in they can perform anysupported operation. The system can log who performed what.3) Authentication and AuthorisationA closed system in which everyone must log in and with different levels ofaccess. The system can restrict who performs what.f) It is a deployment decision which mode of access control a specific system uses.<strong>CCSDS</strong> 520.1-R-1 Page 3-8 October 2009

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!