Security technology, the Security technology, the latest & greatest(?) latest & greatest(?) March 23, 2004 March 23, 2004 Alan Harbitter, Ph.D. Alan Harbitter, Ph.D. CTO, PEC Solutions, Inc. CTO, PEC Solutions, Inc. [email protected][email protected]• Security issues in a service-oriented Security issues in a service-oriented architecture architecture • GJXDM 3.0 security metadata GJXDM 3.0 security metadata • Underlying need for PKI Underlying need for PKI
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Security technology, the latest & Security technology, the latest & greatest(?)greatest(?)
Security technology, the latest & Security technology, the latest & greatest(?)greatest(?)
Details about upgrading the level of classification of information.
SecurityControlText TextType A SCI control system or systems that may be applicable to a document, e.g., SI, TK, NONE.
SecurityFGIText TextType Foreign government distribution information or country codes included in a United States controlled document, e.g., "FGI, AUS, DEU", "FGI, DEU, GBR, NATO", "FGI".
SecurityFGICode j-iso_3166:CountryAlpha3CodeTypeA code that identifies foreign government distribution information included in a United States controlled document.
SecurityDisseminationText TextType Dissemination control markings as designated by CAPCO Classification Markings Register, e.g., NOFORN, ORCON, FOUO, SETTEE.
SecurityForeignReleasabilityText TextType The foreign releasability of information.SecurityLevelText TextType A level of security of information, e.g., personal, supplier proprietary.
SecurityLevelCode j-dod:SecurityLevelCodeType A code identifying a level of security of information, e.g., personal, supplier proprietary.
SecurityNonICMarkingsText TextType Non-Intelligence Community markings authorized for use by entities outside of the Intelligence Community as designated by CAPCO Classification Markings Register., e.g., SPECAT, SIOP-ESI, SENSITIVE INFORMATION, LIMDIS.
“New” Role for Public Key Infrastructure (PKI)
10
PKI: A Complex mixtures of people, process, and computers