Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where David J. Shifflett is active.

Publication


Featured researches published by David J. Shifflett.


Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004. | 2004

Overview of a high assurance architecture for distributed multilevel security

Cynthia E. Irvine; Timothy E. Levin; Thuy D. Nguyen; David J. Shifflett; Jean Khosalim; Paul C. Clark; Albert Wong; Francis B. Afinidad; David Bibighaus; Joseph Sears

A high assurance architecture is described for the protection of distributed multilevel secure computing environments from malicious code and other attacks. Component security services and mechanisms extend and interoperate with commodity PCs, commodity client software, applications, trusted components, and legacy single level networks, providing new capabilities for composing secure, distributed multilevel security. This architecture results from the realization that unless a secure system offers users comfortable and familiar interfaces for handling routine information, it will fail due to lack of user acceptability.


military communications conference | 2010

A cloud-oriented cross-domain security architecture

Thuy D. Nguyen; Mark A. Gondree; David J. Shifflett; Jean Khosalim; Timothy E. Levin; Cynthia E. Irvine

The Monterey Security Architecture addresses the need to share high-value data across multiple domains of different classification levels while enforcing information flow policies. The architecture allows users with different security authorizations to securely collaborate and exchange information using commodity computers and familiar commercial client software that generally lack the prerequisite assurance and functional security protections. MYSEA seeks to meet two compelling requirements, often assumed to be at odds: enforcing critical, mandatory security policies, and allowing access and collaboration in a familiar work environment. Recent additions to the MYSEA design expand the architecture to support a cloud of cross-domain services, hosted within a federation of multilevel secure (MLS) MYSEA servers. The MYSEA cloud supports single-sign on, service replication, and network-layer quality of security service. This new cross-domain, distributed architecture follows the consumption and delivery model for cloud services, while maintaining the federated control model necessary to support and protect cross-domain collaboration within the enterprise. The resulting architecture shows the feasibility of high-assurance, cross-domain services hosted within a community cloud suitable for inter-agency, or joint, collaboration. This paper summarizes the MYSEA architecture and discusses MYSEAs approach to provide an MLS-constrained cloud computing environment.


annual computer security applications conference | 1998

Security architecture for a virtual heterogeneous machine

Roger Wright; David J. Shifflett; Cynthia E. Irvine

We describe security for a virtual heterogeneous machine (VHM). Our security architecture is based upon separation of services into four distinct domains. It is designed to take advantage of operating system support for domains, where available. We have chosen to use emerging public key technology as an interim solution to provide domain separation. A prototype demonstration of our architecture has been developed.


scalable trusted computing | 2009

MYSEA: the monterey security architecture

Cynthia E. Irvine; Thuy D. Nguyen; David J. Shifflett; Timothy E. Levin; Jean Khosalim; Charles Prince; Paul C. Clark; Mark A. Gondree

Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while providing protection from malicious code and attacks devised by highly motivated adversaries. The MYSEA architecture uses component security services and mechanisms to extend and inter-operate with commodity PCs, commodity client software, applications, trusted components, and legacy single level networks, providing new capabilities for composing secure, distributed multilevel secure solutions. This results in an architecture that meets two compelling requirements: first, that users have a familiar work environment, and, second, that critical mandatory security policies are enforced.


Requirements Engineering | 2002

An Approach to Security Requirements Engineering for a High Assurance System

Cynthia E. Irvine; Timothy E. Levin; Jeffery D. Wilson; David J. Shifflett; Barbara Pereira

Requirements specifications for high-assurance secure systems are rare in the open literature. This paper examines the development of a requirements document for a multilevel secure system that must meet stringent assurance and evaluation requirements. The system is designed to be secure, yet combines popular commercial components with specialised high-assurance ones. Functional and non-functional requirements pertinent to security are discussed. A multidimensional threat model is presented. The threat model accounts for the developmental and operational phases of system evolution and for each phase accounts for both physical and non-physical threats. We describe our team-based method for developing a requirements document and relate that process to techniques in requirements engineering. The system requirements document presented provides a calibration point for future security requirements engineering techniques intended to meet both functional and assurance goals.


darpa information survivability conference and exposition | 2003

Monterey security enhanced architecture project

Cynthia E. Irvine; David J. Shifflett; Paul C. Clark; Timothy E. Levin; George W. Dinolt

This research project has produced an innovative architecture and corresponding engineering prototype consisting of trusted security services and integrated operating system mechanisms for the protection of distributed multi-domain computing environments from malicious code and other attacks. These security services and mechanisms extend and interoperate with existing workstations, applications and open source operating systems, providing new capabilities for composing secure distributed systems using commercial off-the-shelf (COTS) components. The latter construct results from the realization that unless a secure system offers users comfortable and familiar interfaces for handling routine information, the secure system will fail due to lack of user acceptability. The work was supported in part by the MYSEA project of the DARPA/ATO CHATS program.


darpa information survivability conference and exposition | 2003

MYSEA technology demonstration

Cynthia E. Irvine; David J. Shifflett; Paul C. Clark; Timothy E. Levin; George W. Dinolt

The MYSEA project has produced an innovative architecture and corresponding engineering prototype consisting of trusted security services and integrated operating system mechanisms for the protection of distributed multi-domain computing environments from malicious code and other attacks. These security services and mechanisms extend and interoperate with existing workstations, applications and open source operating systems, providing new capabilities for composing secure distributed systems using commercial off-the-shelf (COTS) components. The MYSEA technical demonstration illustrates the MYSEA architecture, as well as the mechanisms for providing multi-domain information protection, trusted path extension and quality of security service.


systems man and cybernetics | 2005

Initial documentation requirements for a high assurance system: lessons learned

Paul C. Clark; Cynthisa E. Irvine; Timothy E. Levin; Thuy D. Nguyen; David J. Shifflett; Donna Miller

The validation that a system is high assurance is provide via an independent third-party evaluation. A key aspect of a high assurance evaluation is the documented methodologies, standards, and processes that are used throughout the product lifecycle. This paper presents the lessons learned to date through the creation of document required prior to the engineering phase of development.


Archive | 2001

A Case Study in Security Requirements Engineering for a High Assurance System

David J. Shifflett; Bereira Pereira; Cynthia E. Irvine; Jeffery D. Wilson; Timothy E. Levin


Naval Postgraduate School (U.S.) | 2002

MYSEA Security Architecture

Cynthia E. Irvine; David J. Shifflett; Paul C. Clark; Timothy E. Levin; George W. Dinolt

Collaboration


Dive into the David J. Shifflett's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Paul C. Clark

Naval Postgraduate School

View shared research outputs
Top Co-Authors

Avatar

Thuy D. Nguyen

Naval Postgraduate School

View shared research outputs
Top Co-Authors

Avatar

Jean Khosalim

Naval Postgraduate School

View shared research outputs
Top Co-Authors

Avatar

Timothy Vidas

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mark A. Gondree

Naval Postgraduate School

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Roger Wright

Naval Postgraduate School

View shared research outputs
Researchain Logo
Decentralizing Knowledge