Please use this identifier to cite or link to this item: https://dair.nps.edu/handle/123456789/1926
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDaniel Smullen
dc.contributor.authorTravis Breaux
dc.date.accessioned2020-03-16T18:03:11Z-
dc.date.available2020-03-16T18:03:11Z-
dc.date.issued2016-05-05
dc.identifier.citationPublished--Unlimited Distribution
dc.identifier.urihttps://dair.nps.edu/handle/123456789/1926-
dc.descriptionAcquisition Management / Defense Acquisition Community Contributor
dc.description.abstractThe Department of Defense (DoD) Risk Management Framework (RMF) for IT systems is aligned with the National Institute for Standards and Technology (NIST) guidance for federal IT architectures, including emergent mobile and cloud-based platforms. This guidance serves as a prescriptive lifecycle for IT engineers to recognize, understand, and mitigate security risks. However, integrators are left with the challenge during acquisition and during runtime integration with external services to reason about the actions on data inherent in their system designs that may have confidentiality risks. These risks may lead to data spills, loss of confidentiality for mission data, and/or revelations about private data related to service members and their families. Solutions are needed to assist acquisition professionals to align system data practices with the RMF and NIST guidance, as well as DoD IA directives particularly with respect to the collection, usage, transfer, and retention of data. To provide support to this end, we extended our initial automation framework to support reasoning over data retention actions using a formal language. We propose an evaluation method for these extensions, carried out through simulations of real-world IT systems using imitation but statistically accurate synthetic data. Our language aims to address dynamically composable, multi-party systems that preserve security properties and address incipient data privacy concerns. Software developers and certification authorities can use these profiles expressed in first-order logic with an inference engine to advance the RMF, express data retention actions that promote confidentiality, and re-evaluate risk mitigation and compliance as IT systems evolve over time.
dc.description.sponsorshipAcquisition Research Program
dc.languageEnglish (United States)
dc.publisherAcquisition Research Program
dc.relation.ispartofseriesInformation Technology
dc.relation.ispartofseriesSYM-AM-16-042
dc.subjectCybersecurity
dc.subjectSoftware Acquisition
dc.titleImproving Security in Software Acquisition and Runtime Integration With Data Retention Specifications
dc.typeArticle
Appears in Collections:Annual Acquisition Research Symposium Proceedings & Presentations

Files in This Item:
File SizeFormat 
SYM-AM-16-042.pdf180.44 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.