Objectif This project addresses the control of the relationships between users, applications and services by means of establishing a consistent architectural framework. This framework, consisting of a set of formally defined security services, facilities and protocols, is firmly based on the work of ECMA TC32/TG9. In addition, recent parallel work by industry groups is taken fully into account. The needs for portability and interoperability, and the need to provide a route forward overcoming identified limitations, are contained within the major objectives of the project.The overall objective of the research was to help to bring about generally available, effective and usable protection of information processing and communication systems, together with the control and protection of the processes that use, handle, transmit and manage the infirmation in an integrated broadband communications (IBC) environment. The need for such protection is well established in the light of the increasing trust placed on electronic information for personal and private, commercial and economic and governmental and administrative use.Given this general requirement for protection of information and services, the key issue in the ability to deliver to the user efficient and effective solutions which balance security needs with on going operational cost effectiveness. These solutions should be applicable to all aspects of IBC including applications, services and infrastructure management.The research aims to develop and deliver a set ofhigh quality software components, forming the elements of a secure network architecture. Recognising the need for assurable products and systems, these components must be engineered to a very high standard. Application programming interfaces, to provide ease of use and portability also have to be developed and standardized.During 1992 the functional requirements, system specification and system design were produced. These are under formal change control and will provide the basis for the subsequent activities in detail design and implementation. An end user group has been established.Technical Approach The project is developing and delivering a set of high quality software components, forming the elements of the architecture. Recognising the need for assurable products and systems, these components are being engineered to a very high standard, targeted at ITSEC E3 level. Application Programming Interfaces, to provide ease of use and portability, are being developed and standardised. The project has involved a user-group in the requirements specification, integration and evaluation activities, to ensure the validity and practicability of the results. Users will also provide visibility and feedback within their respective fields of operation, during the third year. A wide range of user population sizes and spectrum of security policies will be covered. Requirements for administrative aspects of systems and networks are seen as the greatest challenge, from considerations of both the necessary levels of trust and the extents of the populations served. The core of the project is the integration work package, which delivers the quality components and provides demonstration capabilities. This is supported by work packages covering the development of the architecture, investigation and specification of requirements and functionality, overall technical and quality process specification, and module implementation and test. Results are being delivered to the partners for validation in real-world environments, and for potential subsequent incorporation into products and systems. Results have been made available for use more widely in RACE and other RTD programmes. Key Issues The overall objective of the project is to help to bring about generally available, effective and usable protection of information in distributed information processing and communication systems, together with the control and protection of the processes that use, handle, transmit and manage the information in an IBC environment. The need for such protection is well established in the light of the increasing trust placed on electronic information for the conduct of affairs - personal and private, commercial and economic, governmental and administrative. Given this general requirement for protection of information and services, the key issue is the ability to deliver to the user efficient and effective solutions which balance security needs with on-going operational cost-effectiveness. These solutions will be applicable to all aspects of IBC: applications, services and infrastructure management. Expected Impact It is a strategic objective that the results of the project should have a major influence and take-up. The project is working with the major groupings establishing industry standards, in addition to participating in concerted contributions to the European and International Standards for security. An extension to the work of this project has been agreed for 1995. Champ scientifique natural sciencescomputer and information sciencessoftwarenatural sciencescomputer and information sciencesdata sciencedata processing Programme(s) FP3-RACE 2 - Specific research and technological development programme (EEC) in the field of communication technologies, 1990-1994 Thème(s) Data not available Appel à propositions Data not available Régime de financement Data not available Coordinateur BULL SA Contribution de l’UE Aucune donnée Adresse 68 ROUTE DE VERSAILLES 78430 LOUVECIENNES France Voir sur la carte Coût total Aucune donnée Participants (2) Trier par ordre alphabétique Trier par contribution de l’UE Tout développer Tout réduire International Computers Ltd (ICL) Royaume-Uni Contribution de l’UE Aucune donnée Adresse Lovelace Road RG12 4SN Bracknell Voir sur la carte Coût total Aucune donnée Siemens Nixdorf Informationssysteme Ag Allemagne Contribution de l’UE Aucune donnée Adresse Otto-Hahn-Ring 6 81739 Muenchen Voir sur la carte Coût total Aucune donnée