Framework for managing metadata security tags as the basis for making security decisions
This thesis presents an analysis of a capability to employ CAPCO (Controlled Access Program Coordination Office) compliant Metadata security tags as the basis for making security decisions. My research covers all the security aspects of the related technologies, such as XML, Web Services, Java API...
Main Author: | |
---|---|
Other Authors: | |
Published: |
Monterey, California. Naval Postgraduate School
2012
|
Online Access: | http://hdl.handle.net/10945/4336 |
id |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-4336 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-43362014-11-27T16:05:15Z Framework for managing metadata security tags as the basis for making security decisions Aposporis, Panagiotis. Lewis, Ted G. Computer Science This thesis presents an analysis of a capability to employ CAPCO (Controlled Access Program Coordination Office) compliant Metadata security tags as the basis for making security decisions. My research covers all the security aspects of the related technologies, such as XML, Web Services, Java API's for XML, .NET Architecture to help determine how security conscious enterprises such as the Intelligence Community can implement this approach in the real insecure world, with commercial off-the-self products, to meet their needs. There were many concerns about using the XML Metadata Label Tags as the basis for making security decisions, due to an un -trusted environment. By using appropriate trusted parts, when really necessary, and new technologies , we can find secure solutions for creating, storing and disseminating XML documents. Besides the theoretical research, this thesis also presents a prototype development of a Web Service that can handle most of the tasks (save, save locally, review etc), which are required to securely manage XML documents. In order to implement the above Web Service, open -source products, such as Java and Apache Tomcat Web Server, are used. These are not only available free, easily testable and commonly used, but they pro vide us with a great interoperability among almost all the platforms. The implementation can also be done by using other competitive technologies or platforms or can even use similar or related commercial products. 2012-03-14T17:41:35Z 2012-03-14T17:41:35Z 2002-12 Thesis http://hdl.handle.net/10945/4336 51547884 This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted. Monterey, California. Naval Postgraduate School |
collection |
NDLTD |
sources |
NDLTD |
description |
This thesis presents an analysis of a capability to employ CAPCO (Controlled Access Program Coordination Office) compliant Metadata security tags as the basis for making security decisions. My research covers all the security aspects of the related technologies, such as XML, Web Services, Java API's for XML, .NET Architecture to help determine how security conscious enterprises such as the Intelligence Community can implement this approach in the real insecure world, with commercial off-the-self products, to meet their needs. There were many concerns about using the XML Metadata Label Tags as the basis for making security decisions, due to an un -trusted environment. By using appropriate trusted parts, when really necessary, and new technologies , we can find secure solutions for creating, storing and disseminating XML documents. Besides the theoretical research, this thesis also presents a prototype development of a Web Service that can handle most of the tasks (save, save locally, review etc), which are required to securely manage XML documents. In order to implement the above Web Service, open -source products, such as Java and Apache Tomcat Web Server, are used. These are not only available free, easily testable and commonly used, but they pro vide us with a great interoperability among almost all the platforms. The implementation can also be done by using other competitive technologies or platforms or can even use similar or related commercial products. |
author2 |
Lewis, Ted G. |
author_facet |
Lewis, Ted G. Aposporis, Panagiotis. |
author |
Aposporis, Panagiotis. |
spellingShingle |
Aposporis, Panagiotis. Framework for managing metadata security tags as the basis for making security decisions |
author_sort |
Aposporis, Panagiotis. |
title |
Framework for managing metadata security tags as the basis for making security decisions |
title_short |
Framework for managing metadata security tags as the basis for making security decisions |
title_full |
Framework for managing metadata security tags as the basis for making security decisions |
title_fullStr |
Framework for managing metadata security tags as the basis for making security decisions |
title_full_unstemmed |
Framework for managing metadata security tags as the basis for making security decisions |
title_sort |
framework for managing metadata security tags as the basis for making security decisions |
publisher |
Monterey, California. Naval Postgraduate School |
publishDate |
2012 |
url |
http://hdl.handle.net/10945/4336 |
work_keys_str_mv |
AT aposporispanagiotis frameworkformanagingmetadatasecuritytagsasthebasisformakingsecuritydecisions |
_version_ |
1716720983781408768 |