Information barriers and authentication. Page: 4 of 6
This article is part of the collection entitled: Office of Scientific & Technical Information Technical Reports and was provided to UNT Digital Library by the UNT Libraries Government Documents Department.
Extracted Text
The following text was automatically extracted from the image on this page using optical character recognition software:
mutually agreed unclassified thresholds to generate a series of binary outputs indicating
agreement or disagreement with the agreed thresholds. These binary results pass through an
output data barrier and are displayed as a series of green (agreement) or red (disagreement)
indicator lights. The output data barrier ensures that no classified information can be passed
to the display, and that data flows only from inside the enclosure to the outside. Attribute
verification systems are described in more detail in Refs. {4} and {5}.
A simple schematic realization of this type of attribute measurement system is shown in Fig. 1. All
potentially classified information is contained within a protective shell, and only unclassified results
are displayed outside the shell. In this case, the shell characteristics are more important than the
characteristics of the internal elements in determining the protection afforded by the complete
system.
Gamma
Analysis
Control Input Svstem Threshold Output
and - Data Comparison - Data Display
Power Barrier Neutron Analyzer Barrier
Analysis
System
Information Barrier
- Potentially Contains Classified Information
- Unclassified Information Inside the Barrier
- Barrier Components
Unclassified Information Outside the Barrier
Fig. 1. Core concept of an attribute measurement system. The data
barriers are the only points of contact between the internal computing
systems (potentially containing classified information) and the external
environment.
THE TWO REQUIREMENTS FOR THE INFORMATION BARRIER
Although the primary purpose of an IB is to prevent the release (either accidental or intentional) of
Host Country classified information, the implementation of the IB should allow the Inspecting Party
to have confidence that the measurement system is producing meaningful results. Protecting
classified information is relatively straightforward if that is the only goal. Strict access control is2
Upcoming Pages
Here’s what’s next.
Search Inside
This article can be searched. Note: Results may vary based on the legibility of text within the document.
Tools / Downloads
Get a copy of this page or view the extracted text.
Citing and Sharing
Basic information for referencing this web page. We also provide extended guidance on usage rights, references, copying or embedding.
Reference the current page of this Article.
MacArthur, D. W. (Duncan W.) & Wolford, J. K. (James K.). Information barriers and authentication., article, January 1, 2001; United States. (https://digital.library.unt.edu/ark:/67531/metadc929237/m1/4/: accessed April 25, 2024), University of North Texas Libraries, UNT Digital Library, https://digital.library.unt.edu; crediting UNT Libraries Government Documents Department.