Abstract
Current DoD information systems need to support many different missions through cooperation with different organizations and allies. In todays fast paced and dynamic environment, it is almost impossible to design and implement a different information system for each mission. Therefore, DoD needs MLS workflow management systems (WFMS) to enable globally distributed users and existing applications to cooperate across classification domains to achieve mission critical goals. An MLS WFMS that allows users to program multilevel mission logic, securely coordinate widely distributed tasks, and monitor the progress of the workflow across classification domains is required. In this paper, we present requirements for MLS workflow and a strategy for implementing it, especially the method for decomposing an MLS workflow into multiple single-level workflows.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35508-5_22
Chapter PDF
Similar content being viewed by others
References
Anderson, M., North, C., Griffin, J., Milner, R., Yesberg, J. and Yiu, K. (1996). Starlight: Interactive link Proceedings of the Twelfth Annual Computer Security Applications Conference.
Atluri, V., Huang, W.K. and Bertino, E. (n.d.). A semantic based execution model for multilevel secure workflows. Journal of Computer Security (to appear).
Chang, L.W. and Moskowitz, I.S. (1998). Bayesian methods applied to the database inference problem.Proceedings of the Twelfth IFIP WG 11.3 Working Conference on Database Security.
Kang, M.H., Moskowitz, I.S. and Lee, D. (1996). A network pump. IEEE Transactions on Software Engineering, 22 (5), pp. 329–338.
Kang, M.H., Froscher, J. and Moskowitz, I.S. (1997). An architecture for multilevel secure interoperability. Proceedings of the Thirteenth Annual Computer Security Applications Conference.
Kang, M.H., Froscher, J. and Eppinger, B. (1998). Toward an infrastructure for MLS distributed computing. Proceedings of the Fourteenth Annual Computer Security Applications Conference.
Kang, M.H., Eppinger, B. and Froscher, J. (1999). Tools to support secure enterprise computing. Proceedings of the Fifteenth Annual Computer Security Applications Conference.
Krishnakumar, N. and Sheth, A. (1995). Managing heterogeneous multi-system tasks to support enterprise-wide operations. Distributed and Parallel Database Journal,3(2).
METEOR home page, http://lsdis.cs.uga.edu/proj/meteor/meteor.html.
Miller, J., Palaniswani, D., Sheth, A., Kochut, K. and Singh, H. (1998). WebWork: METEORs web-based workflow management system. Journal of Intelligent Information Systems, 10(2).
Moskowitz, I.S. and Chang, L.W. (1999). The rational downgrader. Proceedings of PADD’99.
OMG jFlow submission, ftp:///fpt.omg.org/pub/bom/98–06–07.pdf.
Security Architecture for the AITS Reference Architecture, http://www.web ext2.darpamilliso/ia/Arch/SecArchl/SecArchl.htm
Thomas, R. and Sandhu, R. (1997). Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. Proceedings of the Eleventh IFIP WG 11.3 Working Conference on Database Security.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Kang, M.H., Froscher, J.N., Eppinger, B.J., Moskowitz, I.S. (2000). A Strategy for an MLS Workflow Management System. In: Atluri, V., Hale, J. (eds) Research Advances in Database and Information Systems Security. IFIP — The International Federation for Information Processing, vol 43. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35508-5_11
Download citation
DOI: https://doi.org/10.1007/978-0-387-35508-5_11
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-6411-6
Online ISBN: 978-0-387-35508-5
eBook Packages: Springer Book Archive