Framework for managing metadata security tags as the basis for making security decisions

This thesis presents an analysis of a capability to employ CAPCO (Controlled Access Program Coordination Office) compliant Metadata security tags as the basis for making security decisions. My research covers all the security aspects of the related technologies, such as XML, Web Services, Java API&#...

Full description

Bibliographic Details
Main Author: Aposporis, Panagiotis.
Other Authors: Lewis, Ted G.
Published: Monterey, California. Naval Postgraduate School 2012
Online Access:http://hdl.handle.net/10945/4336
id ndltd-nps.edu-oai-calhoun.nps.edu-10945-4336
record_format oai_dc
spelling ndltd-nps.edu-oai-calhoun.nps.edu-10945-43362014-11-27T16:05:15Z Framework for managing metadata security tags as the basis for making security decisions Aposporis, Panagiotis. Lewis, Ted G. Computer Science This thesis presents an analysis of a capability to employ CAPCO (Controlled Access Program Coordination Office) compliant Metadata security tags as the basis for making security decisions. My research covers all the security aspects of the related technologies, such as XML, Web Services, Java API's for XML, .NET Architecture to help determine how security conscious enterprises such as the Intelligence Community can implement this approach in the real insecure world, with commercial off-the-self products, to meet their needs. There were many concerns about using the XML Metadata Label Tags as the basis for making security decisions, due to an un -trusted environment. By using appropriate trusted parts, when really necessary, and new technologies , we can find secure solutions for creating, storing and disseminating XML documents. Besides the theoretical research, this thesis also presents a prototype development of a Web Service that can handle most of the tasks (save, save locally, review etc), which are required to securely manage XML documents. In order to implement the above Web Service, open -source products, such as Java and Apache Tomcat Web Server, are used. These are not only available free, easily testable and commonly used, but they pro vide us with a great interoperability among almost all the platforms. The implementation can also be done by using other competitive technologies or platforms or can even use similar or related commercial products. 2012-03-14T17:41:35Z 2012-03-14T17:41:35Z 2002-12 Thesis http://hdl.handle.net/10945/4336 51547884 This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted. Monterey, California. Naval Postgraduate School
collection NDLTD
sources NDLTD
description This thesis presents an analysis of a capability to employ CAPCO (Controlled Access Program Coordination Office) compliant Metadata security tags as the basis for making security decisions. My research covers all the security aspects of the related technologies, such as XML, Web Services, Java API's for XML, .NET Architecture to help determine how security conscious enterprises such as the Intelligence Community can implement this approach in the real insecure world, with commercial off-the-self products, to meet their needs. There were many concerns about using the XML Metadata Label Tags as the basis for making security decisions, due to an un -trusted environment. By using appropriate trusted parts, when really necessary, and new technologies , we can find secure solutions for creating, storing and disseminating XML documents. Besides the theoretical research, this thesis also presents a prototype development of a Web Service that can handle most of the tasks (save, save locally, review etc), which are required to securely manage XML documents. In order to implement the above Web Service, open -source products, such as Java and Apache Tomcat Web Server, are used. These are not only available free, easily testable and commonly used, but they pro vide us with a great interoperability among almost all the platforms. The implementation can also be done by using other competitive technologies or platforms or can even use similar or related commercial products.
author2 Lewis, Ted G.
author_facet Lewis, Ted G.
Aposporis, Panagiotis.
author Aposporis, Panagiotis.
spellingShingle Aposporis, Panagiotis.
Framework for managing metadata security tags as the basis for making security decisions
author_sort Aposporis, Panagiotis.
title Framework for managing metadata security tags as the basis for making security decisions
title_short Framework for managing metadata security tags as the basis for making security decisions
title_full Framework for managing metadata security tags as the basis for making security decisions
title_fullStr Framework for managing metadata security tags as the basis for making security decisions
title_full_unstemmed Framework for managing metadata security tags as the basis for making security decisions
title_sort framework for managing metadata security tags as the basis for making security decisions
publisher Monterey, California. Naval Postgraduate School
publishDate 2012
url http://hdl.handle.net/10945/4336
work_keys_str_mv AT aposporispanagiotis frameworkformanagingmetadatasecuritytagsasthebasisformakingsecuritydecisions
_version_ 1716720983781408768