A MULTILEVEL SECURE LOCAL AREA NETWORK

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP89B01354R000200220004-2
Release Decision: 
RIFPUB
Original Classification: 
K
Document Page Count: 
7
Document Creation Date: 
December 27, 2016
Document Release Date: 
August 15, 2013
Sequence Number: 
4
Case Number: 
Content Type: 
MISC
File: 
AttachmentSize
PDF icon CIA-RDP89B01354R000200220004-2.pdf589.55 KB
Body: 
* Declassified and Approved For Release 2013/08/15 : CIA-RDP89B01354R000200220004-2 A MULTILEVEL SECURE LOCAL AREA NETWORK Deepinder P. Sidhu Research & Development Burroughs Corporation Paoli, Pennsylvania 19301 This paper presents a high-level design for a local area network (LAN) that will support sub, scribers (terminals or hosts) operating at various security levels. Subscribers may be "single- level", which means they are untrusted and, can operate at only one security level, or they may be "multilevel" and trusted to operate at a range of security levels INibalcti791. For single-level subscribers, communication is restricted to those at the same security level. This restriction is enforced by trusted interface units (TIUs) used by each subscriber to interface' to the LAN, and is based on a security level field in the header of each packet. The TIUs are trusted to enforce and check the security markings in the packets--the hosts or terminals themselves are not. ' For multilevel subscribers (a multilevel secure terminal or host), communication is res- tricted according to the usual security con- straints. That is, a multilevel host can transmit at a range of levels between the minimum and max- imum. The minimum and maximum are enforced by the TIU for the multilevel host, with the host trusted to choose the specific level of each packet it transmits. Likewise, the multilevel host is trusted to receive packets at the range of its lev- els and to properly protect the data according to the classification in the packet header. Figure 1 shows a simple multilevel LAN with single-level and multilevel subscribers. TOP SECRET SECRET HOST HOST Morrie Gasser The MITRE Corporation Bedford, Massachusetts 01730 Because the data on the,network medium (e.g., coaxial cable) is not encrypted, appropriate physi- cal protection is required. In a broadcast LAN, this would imply that the entire cable and the TIUs would have to be protected to system-high, since all packets on the network are visible at all loca- tions. For subscribers operating at lower security 'levels (and in less-protected environments) it might not be feasible to protect the medium to system-high at all points, especially since both the TIU-subscriber and TIU-LAN interfaces usually consist of relatively short cables. For example, the physical and procedural controls necessary to provide a DoD Top Secret environment are extremely costly. It would be unreasonable to expect such protection to be required for all the TIUs and the entire LAN medium in a network whose majority of users are unclassified. To allow for realistic combination of environ- mental controls we extend the secure LAN architec- ture to incorporate the concept of separate physi- cal subnetworks whose mediums are each protected to some maximum level that may be less than the max- imum level of the entire local network. The sub- networks are connected by "bridges" in such ?a way that the entire set of subnetworks appear as a sin- gle local network to each TIU and subscriber [Clark78]. An example of a LAN composed of several subnetworks is shown in figure 2. Where portions of the medium, TIU-subscriber link, or bridge link must pass through unprotected areas, data_ is UNCLASSIFIED MULTILEVEL HOST MULTILEVEL LOCAL AREA NETWORK HOST TOP SECRET SECRET Figure 1. Simple Multilevel LAN EH0208-9/83/0000/0281$01.00 1982 IEEE 281 UNCLASSIFIED Reprinted from Proceedings of the 1982 Symposium on Security and Privacy. 1982. pages 137-143. Copyright ? 1982 by The Institute of Electrical and Electronics Engineers. Inc. Declassified 'and Approved For Release 2013/08/15: CIA-RDP89B01354R000200220004-2 Declassified and Approved For Release 2013/08/15: CIA-RDP89B01354R000200220004-2 ? a 1 1 1 SECRET (A) Loameftmomo..? 0 .CRYPTO UNITS monomot LAN CABLE CLASSIFIED ENVIRONMENT BOUNDARY (8) 4,4 cii) CONFIDENTIAL HOST (D) ...... ??? .? gni Olt TOP SECRET s. I. KEY ??? Mt iMp. HOST TOP SECRET HOST HOST 0 (C) (4> .6 owe mi. am en amid' TRUSTED/UNTRUSTED LAN INTERFACE UNITS H6000 HOST OR USER TERMINAL(SUBSCRIBER) BRIDGE, HALF-BRIDGES Figure 2. Subnetwork Structure encrypted using mostly standard link encryption techniques. While this paper does not address encryption as a solution to multilevel data protec- tion, some encryption issues peculiar to this architecture will be discussed below. The bridges implement a function similar to gateways in wide-area networks but are much simpler. ,Their job is to route packets between LAW subnetworks with identical protocols. They operate at a level of protocol that makes them transparent to TIUs and hosts or terminals, so that they have no effect-on the hardware and software in the TIUs. The bridges perform their routing function based on fixed 'tables within the bridges and destination addresses in the headers of the packets. They also perform a security check to insure that information from a high level TIU on one subnetwork does not flbw to a lover level subnetwork. In this way sub- networks need only be "trusted" (and physically protected) to maintain separation. of data within the range of levels of subscribers on that subnet- work. Even unclassified subnetworks can be sup- ported as shown at the bottom of figure 2. 282 The overall design is intended to be easily implementable with minimal changes to existing off-the-shelf technology and protocols. As such it is felt that it is a practical solution for many installations that have near-term requirements to incorporate a local area network into existing or planned data processing facilities and cannot afford to spend the time or money for more sophis- ticated long-term options. It is far more flexible than a "system-high" approach where all subscribers must be protected to the highest level [D0D72]. It provides a foundation for multilevel communications at sites that may initially only require communica- tion between single-level entities, but may later upgrade to multilevel hosts and terminals. A pro- posed implementation would take place in three phases, allowing an initial capability-for single- level communication with increMental upgrade to multilevel communication. This phasing matches the anticipated availability of multilevel computers and terminals, where only single-level components are available today, followed by controlled-mode (two-level) hosts, "variable-level" terminals (to be discussed below), and finally .multilevel termi- nals and hosts. . neclassified and Approved For Release 2013/08/15: CIA-RDP89B01354R000200220004-2 Declassified and Approved For Release 2013/08/15: CIA-RDP89B01354R000200220004-2 The concept deals with practical matters such as physical protection of the medium, terminals and hosts. It also takes into account the difficulty of certifying large pieces of hardware or software for multilevel operation by reducing to an absolute minimum the components of the system that must be trusted. No "security kernel" or sophisticated trusted mechanisms are required. The design deals with a phased implementation that will satisfy many initial needs in the near future and can later be upgraded, with no disruption of service, for more sophisticated applications as the need for mul- tilevel service increases and a greater volume of traffic must be supported. The next sections discuss the protocols and. the architecture of the TIU and bridge. Some encryption issues are addressed at the end of this paper. PROTOCOLS In order to design multilevel security into any network specific protocols must be examined. To insure feasibility of implementation and opera- tion, we ?are basing our design on an existing pro- tocol that is known to be operational and thus presumably has its bugs worked out. Our goal is to minimize the modifications to the protocol so as not to affect any existing performance studies or implementation techniques. While many of the basic concepts of the approach in this paper are applica- ble to a number of existing LAN protocols, we have chosen to center our design around the carrier sense multiple access with collision detection (CSMA/CD) protocol that has been proposed for the IEEE standard 802 [IEEE81]. This protocol was chosen because similar protocols are fairly widely (though by no means universally) accepted in indus- try (Ethernet being the prime example [Ether- net80)). We are not specifying that CSMA/CD is the Only protocol that can be used for a multilevel network. However, as design details are presented here it will be apparent where CSMA/CD is specific to this particular design. Certain aspects of the design would have to be modified to use another protocol. When we refer to CSMA/CD in this paper we are specifically referring to the IEEE version, although other versions (e.g., Ethernet) would probably be suitable will little change. We are not concerned with the issue of whether the LAN medium is a broadband or baseband cable. That is, the physical layer (layer 1 of the ISO reference model [IS0811) is not an issue for our design, although many aspects of the physical interface (e.g., TEMPEST) must be addressed in an implementation for secure applications. Many of the other aspects of the CSMA/CD protocol not men- tioned here remain unchanged from that in the pro- posed IEEE 802 standard. Figure 3 shows a simplified format of the IEEE 802 CSMA/CD packet, along with the modified version for our secure LAN. We have subdivided the source and destination address fields into two components, to provide a two-level hierarchical address based on subnetwork number and TIU number. The other 283 Destination Source Data Frame check _ Destination Subnet Destination TIU Source Subnet Source TIU Security Level Date Frame Check IEEE 802 (CSMA/CD) Secure LAN Figure 3. .Packet Formats change is the addition of a security level field at the beginning of the data field. The packet and header length is unchanged, and all the CSMA/CD protocol processing logic is unchanged from that in the standard. Of course, CSMA/CD is only a low-level link prfaocol (layer 2 of the ISO reference model), and there are higher layer protocols to be considered in any full implementation. However, our solution is oriented around implementing multilevel security at the link level, with no requirement for any par- ticular protocols at a higher layer. This further minimizes the effect of our approach on any exist- ing software making use of and implementing those higher layers. Focussing on the link layer alone does have its drawbacks, however. These are seen as minor in an initial scenario where a multilevel LAN would be installed to provide a basic communications capa- bility and also to handle existing security requirements. As the traffic load increases and the type of multilevel processing becomes more sophisticated, the Tills and bridges on the LAN would be upgraded (in fully compatible manner) so as to provide additional services. These services require the consideration of higher-level proto- cols, such as the DoD standard Transmission Control Protocol (TCP) with Internet (IP) [Poste181a, Poste181b1. Further discussion of this upgrade capability will be presented in the relevant sec- tions. TRUSTED INTERFACE UNIT The TIU is responsible for enforcing the secu- rity policy based on the level(s) of its subscriber and the level of packets. TIUs come in three ver- sions, in increasing order of complexity. Ini- tially there would only be the need for single- level TIUs that provide the single-level type lf Declassified and Approved For Release 2013/08/15: CIA-RDP89B01354R000200220004-2 Declassified and Approved For Release 2013/08/15: CIA-RDP89B01354R000200220004-2 protection for untrusted subscribers discussed ear- lier. Another version would provide variable-level operation. This means that the TIU is not per- manently fixed to communicate at just one level, but can vary its level based on some human operator action. This type of TIU would allow, for example, a terminal to sometimes operate at one security level (to communicate with a certain set of hosts) aid sometimes operate at another security level. Hosts whose levels change due to periods processing would also use 4 variable-level TIU. Finally, 'there is a multilevel TIU that properly coordinates with its terminal or host to support full mul- tilevel operation. . Single-level TIU The trusted interface unit shown. in figure, 4 allows a single-level subscriber (untrusfed host or terminal) to communicate with another subscriber at the same security level, via a local network to which subscribers of several levels are connected. The TIU must be physically protected to the level of network-high, and is designed to reliably iso- late the ,traffic at one particular security level from the traffic at all other levels. We are using the IEEE 802 standard (CSMA/CD) physical and link layer interface on the network, and envision that off-the-shelf hardware will even- tually be available, in the form of a chip or cir- cuit board, that facilitates construction of a microcomputer-based TIU for the CSMA/CD protocol. In our security architecture we have anticipated the functions of such hardware and have made an attempt to use it to simplify the TIU implementa- tion, though our design is by no means dependent on its availability. ' The header of the CSMA/CD packet begins with a destination address, followed by the source address. The packet ends with a frame check sequence. The function of the CSMA/CD interface is to recognize valid packets received from thenet- work and to transfer the entire packet into the TIU's memory. (We are describing the interface's function as if it were loading data into a micro- computer memory as a DMA device, although there may be variations on this approach.) When the packet has been successfully received and loaded into memory, the TIU CPU is signalled that a successful DMA transfer has occurred. The CSMA/CD hardware is assumed to be pro- grammed (or "burned in") with the. ability to recognize one particular destination address as its own. As data arrives from the network the first few bytes of header are examined and, if the desti- nation is correct, the remaining data is 'passed through to TIU memory. If the destination is incorrect, or if a collision is. detected, the-rest of the packet is ignored (not passed into memory). The CSMA/CD protocol is designed so as to detect all collisions while reading the header of the packet (though this attribute is not currently specified in the standard), so that receipt of a correct destination, coupled with no collision, nearly guarantees that the remainder of the packet . in memory is valid (i.e., no collision will occur) and is addressed for the current recipient. Once the packet has been read into memory, it is still possible that a frame-check error will be detected by the hardware as the last byte is read. In this case the TIU CPU is not signalled, so the data, even though now resident in memory, will be ignored. (LAN MEDIUM) 1 CPU UNTRUSTED MEMORY TRUSTED 11?1111?? 411M. IINTERFACE ICSMAJCD I SECURITY PROCESSOR La .._ __ a MICROPROCESSOR BUS I/0 PORT , TERMINAL OR HOST Figure 4. Single-level TIU 284 Declassified and Approved For Release 2013/08/15: CIA-RDP89B01354R000200220004-2 Declassified and Approved For Release 2013/08/15: CIA-RDP89B01354R000200220004-2 On output to the network, a DMA transfer is initiated by the CPU and the interface handles the contention part of the protocol required to get the packet out on the network. It may also, perhaps, handle source address insertion and frame-check computation. What is important to note is that, between the second field of the header (the source address) and the frame-check sequence. the CSMA/CD interface attaches no particular meaning to the data. For our secure local network we have added an addi- tional field, immediately after the source address, that is the security level of the data. The secure TIU has been designed so as to totally, isolate the security-relevant processing (CSMA/CD protocol han- dling and security field checking) from the remainder of the protocol processing, thus maximiz- ing the flexibility of TIU functions without having to worry about verifying that remainder of the software within the TIU. This concept is particu- larly important if more complex protocols, such as TCP and IP, are implemented in TIUs. Of course, the security field checking mechanism and many pro- perties of the CSMA/CD protocol handler must be verified. In the figure we have added a security-proces- sor between the CSMA/CD interface and the rest of the TIU. so that there is a distinct trusted/untrusted separation of functions*. On data input from the network, the function of the security processor is to look at the third field of the header, the security level, and only accept the remainder of the packet data if the security level is equal to that of the subscriber. Thus, data will only arrive in the TIU's memory if both the destination and security level are correct. On output to the network, the security processor inserts the subscriber's security level in the packet as the packet is transferred to the network from memory. We envision the security processor to consist of hardwired logic or perhaps a single-chip com- puter with an on-board program. This processor has a very simple function since it only processes "good" packets, due to the outboard handling of the contention protocol by the CSMA/CD interface. Also, it need only have the throughput of the sub- scriber device, not that of the network, since only the subscriber's input and output need be pro- cessed. However, depending on the interface characteristics of the CSMA/CD hardware, instan- taneous speed might have to be much higher. Note that, on input from the network, security rules require that.no data arrive in the memory of the TIU unless that data is of the proper level. Thus we may be forced to buffer the destination and source fields of an incoming packet within the security processor until we can be sure of the security level, instead of simply passing the *This separation is similar to the "red/black" separation employed with crypto hardware. In fact, when the "untrusted" side is unclassified, many of the conventional physical red/black separation requirements would have to be adhered to. 285 fields into TIU memory "on the fly". Also, if a collision has occurred, which will always be detected during reading of the destination or source fields, we may not want to have the partially-read data in memory. Finally, there is the possibility that a packet with a frame-check error will be fully read into memory before the error, is detected. There would then be a slight chance that the security level field was corrupted and that the packet should not have been accepted. The probability of this happening is extremely low, since untrusted TIU software cannot force a frame- check error to occur at will, and even if one should occur, there is little likelihood that the error will be such that both the destination and security level have precisely the required values. Furthermore, since the error is a random event, there is no way for malicious software in the TIU to modulate this type of error for covert communi- cation. In any case, full-frame buffering in the security processor could be implemented. The reason only single-level subscribers can be supported with the architecture outlined here is that nothing outside of the TIU CSMA/CD interface and security processor (e.g., terminals, hosts, TIU software) is trusted to maintain separation of data of different levels. This is the most common situation in today's environments. Variable-level TIUs A variable-level TIU is the same as a single- level TIU, except that an operator can change the level of the TIU from time to time. This is accom- plished via some manual interface to the security processor (e.g., rotary switch). Procedural con- trols should insure that the host or terminal is appropriately sanitized when the level of the TIU is lowered. This sanitization can be accomplished automatically using a number of techniques. The variable-level TIU might also interface to special-purpose keys on a user's terminal keyboard?keys that are electrically linked to the security processor. A more complex variable-level TIU for a termi- nal might allow the operator to communicate the change of security level via the normal keyboard and screen of his terminal. This would entail, however, significantly more complex mechanisms that must be trusted. In figure 4, for example, all of the software in the TIU would have to be trusted, since that code processes keyboard input before it is seen by the security processor. Sophisticated, but well-understood, techniques to implement a log- ical "trusted communications path" from operator to security processor would have to be employed. Of- course for a host that undergoes periods processing to handle classified data of different levels at different times, only a manual interface to.the TIU security' processor would be appropriate. Multilevel TIUs The multilevel TIU for a host or terminal is likely to contain fully trusted software. - The security processor in such a TIU would only be able to limit communications to the range of levels at which the host or terminal is authorized to npdassified and Approved For Release 2013/08/15: CIA-RDP89B01354R000200220004-2 Declassified and Approved For Release 2013/08/15: CIA-RDP89B01354R000200220004-2 operate. The rest of the TIU would have to be trusted to properly identify the security level of the data to the host within that range, so that the host (which is trusted) can make the correct deci- sions to provide the necessary protection of the multilevel data. In terms of total functionality and complexity, a multilevel TIU is the same as a single-level TIU. The only difference is in the degree of trust given to the software and hardware in the TIU that is not in the security processor. Thus, the difficulty ?of building a multilevel TIU over that. of. a single-level TIU is dependent on software engineering techniques (e.g., verifica- tion) rather than on inherent complexity. BRIDGES Bridges operate strictly at the CSMA/CD proto- col level. A bridge always connects exactly two subnetworks (a simplifying requirement). Its job is to pick packets from one subnetwork, check their destinations and security levels, and send them to the other subnetwork. To prevent congestion, bridges must operate at a speed fast enough to han- dle a reasonable load of traffic from one subnet- work to another, although multiple bridges could be used to help. Figure 5 shows the logical operation of the bridge. Note that the destination check is made as the packet is read in from the network before it is buffered, exactly the same as is done by the CSMA/CD interface in the TIU. In the case of bridge, however, more than a single destination must be checked. The set of destinations accepted are stored in a fixed routing table that can be quickly scanned at network speeds. A two-level hierarchical addressing structure is employed to simplify this lookup and reduce the size of the table (see figure 3). Each bridge knows exactly which subnetworks it is responsible for: Thus, packets are buffered in the bridge only if they are definitely addressed to another subnetwork to which the bridge is logically linked. The security processor in the bridge makes the appropriate security checks on the buffered packets, based only on the levels of the two sub- networks immediately adjacent to the bridge. The bridge does not check final TIU or subnetwork des- tinations, nor does it verify that the level of the packet is correct with respect to the source. It only checks that the received packet is labelled within the range of levels of the subnetwork from which the packet is arriving, and that that level is within the range of levels of the next subnet- work. Outgoing packets are handled by the -CSMA/CD interface from output buffers in a manner identical to-outgoing packets in a TIU. Because the bridge contains no protocol software outside of the CSMA/CD interface, and the only function it implements is a simple security level check, we see the bridge as simple enough to be fully trusted to perform its job correctly and fast enough to handle a considerable load. The SENDING SUBNETWORK I 286 CSMA/CD1.0 RECEIVE BUFFERS= RECEIVING SUBNETWORK /ROUTING/ TABLE RECEIVING AND SENDING SUBNET SECURITY LEVELS illSECURITY PROCESSOR ICSMA/CD I TRANSMIT: .= BUFFERS REJECTED PACKETS PACKETS / Figure 5. Bridge buffers in the bridges smooth out temporary over- loads. It is not expected that the bridges would be a bottleneck in the overall system except in times of heavy continuous traffic. For this reason the approach is recommended in environments where high traffic density is not expected in the near term. To better deal with greater traffic loads, and to provide more flexibility in addressing and routing, the bridges should provide some form of congestion control as might be implemented in a higher protocol layer such as the DoD Internet Pro- tocol (IP). Such a change should be implemented as a future enhancement (along with corresponding changes to the TIUs to use IP) as it would signifi- cantly complicate the amount of trusted software in the bridges and TIUs. Adding certain key aspects of IP to the bridges, in place of some portions of the CSMA/CD protocol, would allow for internet routing among the local subnetworks and through gateways to wide area networks. This means that the subnetworks would be more like separate networks and the bridges would be more like gateways. IF in the bridges and TIUs would also allow incorporation of the security level field into the header where it is specified as an option in IP, rather than usurp- ing part of the data field of CSMA/CD. Finally, IP would allow a primitive form of congestion control--a bridge could return a control packet to a sender to turn off further transmissions due to overload in the bridge or adjoining subnetwork. While there are many advantages to putting IF in the bridge, we do not feel at /his point that the extra complexity in the TIUs and bridges is desirable in an initial configuration considering the need to trust the software. It may be very likely that an initial installation of a secure LAN would indeed require IF in the TIUs for internet- working ISkelton80], but that IP implementation would reside in the untrusted portion of the TIU Declassified .and Approved For Release 2013/08/15: CIA-RDP89B01354R000200220004-2 Declassified and Approved For Release 2013/08/15 : CIA-RDP89B01354R000200220004-2 and would not be interpreted by the bridges. A smooth transition to installation of IF in the bridges may involve, in part, verifying the exist- ing IP software in the TIUs for multilevel opera- tion. The two half-bridges shown in figure 2 comprise a special form of bridge required when encryption is necessary between two classified sub- networks. This will be discussed further in the following section. ENCRYPTION In Figure 2 several locations are shown where encryption is required. At the top an encrypted line is shown between the confidential host and its TIU that resides in the secret environment. This line would probably employ conventional bit-serial link encryption at the appropriate speed (ignore, at this. point the dubious need for encryption on a confidential line). Another encrypted line is shown on the right side between the Top Secret subnetworks. Encryp- tion here is employed directly between the media of the two subnetworks, without the use of a bridge. This is intended to illustrate encryption of the LAN medium where a cable may pass, for example, between two Top Secret protected buildings. We have not studied the problem of encrypting the LAN medium directly, and what affect it might have on the physical and CSMA/CD protocols. However, our design is not dependent on the ability to encrypt such media, as the subnetworks could be separate and bridges could be used instead. Near the center of the figure are shown two "split-bridges"--one in the Top Secret environment and the other on the Secret subnetwork. Each half of the bridge communicates with its subnetwork directly using the straightforward CSMA/CD proto- col. The two halves of the bridge communicate via a serial line that can be encrypted using conven- tional means. The functionality of the bridge is allocated between the two halves according to the security requirements. For example, the security processor, which checks that incoming packets from the high side only go to the low side if they have the appropriate security level, must be located on the high side. Buffering for transmission to the low side, and part of the IP protocol handling, if implemented, could be on the low side. Note that the split bridge concept, while introduced here to deal with the encryption problem, is a general solution where two subnetworks cannot be brought into close physical proximity. The split-bridge is considerably more complex than a single bridge, and it would not be needed in cases where encryption is not required and the media of the two subnetworks -could be brought close together. A bridge between a classified subnetwork to an unclassified subnetwork would not have to be split. 287 CONCLUSION This secure local area network architecture presented here is one of several means by which multilevel data on a local network can be pro- tected. This design stresses very near-term avai- lability, and as such makes maximum use of well- understood concepts, existing protocols, and off- the-shelf hardware. In order to assist certifica- tion for multilevel operation, a minimal amount of trusted software or firmware is required. The TIU design provides a basic trusted multilevel service that Allows for implementing in additional TIU software a wide range of applications. This addi- tional software need not be certified or verified. Finally, the architecture is designed to be imple- mented in phases, providing an initial capability that integrates well into existing operations, and is then upgradable to full service as the need arises. REFERENCES Clark78 Clark, D. D., Pogran, K. T., and Reed, D. P., "An Introduction to Local Area Networks," Proc. IEEE, Vol. 66, No. 11, pp. 1497-1517, November 1978. ' DoD72 Department of Defense. Directive, DoD 5200.28 "Security Requirements for Automatic Data Processing .(ADP) Sys- tems," December 18, 1972. Ethernet80 IEEE81 IS081 The Ethernet: A Local Area Network Specification, Version 1.0, DEC, INTEL, XEROX, September 30, 1980. Local Network Standards Committee, A Status Report, Draft B, IEEE Computer Society, October 19, 1981. ISO/TC97/SC16, "Data Processing--Open Systems Interconnection--Basic Refer- ence.Model," Computer Networks, Vol. 5, 1981, pp. 81-118. Nibaldi79 Nibaldi, G. H., "Specification of a Trusted Computing Base (TCB)," M79-228, The MITRE Corporation, Bedford, HA, November 30, 1979. Postel8la Postel, J. (ed.), "DoD Standard Inter- net Protocol," Defense Advanced Research Projects Agency, 1981.. Postel8lb Postel, J. (ed.), "DoD Standard Transmission Control Protocol," Defense Advanced Research Projects Agency, 1981. Skelton80 Skelton, A. P., Nabielsky, .J., . and Holmgren, S. F., "FY80 'Final Report: Cable Bus Application in Command Centers," MTR780W00319, The MITRE Cor- poration, McLean, VA, December 1980. Declassified and Approved For Release 2013/08/15: CIA-RDP89B01354R000200220004-2